Skip to main content
J2-software-dtex
Security and Privacy go Hand-in-Hand

Dtex Advanced User Behavioural Monitoring

A malicious insider doesn’t act on a whim

Insider Cyber Threat

Dtex provides an incredibly lightweight micro-agent on each end point.

  • Advanced User Behavioural Monitoring  
  • Dtex’s Anonymisation
  • Insider Cyber Threat
  • Detect Theft of Intellectual Property
  • Security Controls
  • Spot Malicious Employees
  • Off-Network Risky Behaviour
  • Fraud and Embezzlement
  • Accidental Misuse
  • External Compromise of Devices
  • Operational Efficiency Analysis
  • IT Regulatory Compliance
  • IT Visibility and Support

Solution

Dtex Advanced User Behavioural Monitoring

Dtex provides an incredibly lightweight micro-agent on each end point and is paired with a powerful big data analysis engine to deliver user-focused visibility, intelligence, user behavioural monitoring and anomaly detection to reduce risk by showing how your users really interact with your systems and data.

J2 Software and Dtex will give you:

  • Unique user data not available in your existing logs
  • No impact to the end user
  • Detailed reporting and comprehensive analysis using only 1 MB per user per week
  • Highly scalable technology capable of servicing more than 100,000 devices
  • Incredibly lightweight, stable micro-agent
  • Over 12 years insider threat experience
  • The ability to provide intelligence using only metadata
  • Privacy compliance - no content, keylogging or videos

Security and Privacy go Hand-in-Hand: Dtex’s Anonymisation Makes it Possible

With the data anonymisation feature in Dtex’s Analytics Server, personal data is safer and more privacy-conscious than ever before allowing you to comply with local and international privacy legislation. We allow you to anonymise personal data – including user name and machine/domain name so that only authorised people will ever see it. 

This approach ensures allows enterprises to respect company culture, maintain security, and establish privacy regulation compliance seamlessly.

INSIDER CYBER THREATS
A malicious insider doesn’t act on a whim – their behaviour changes weeks or months in advance.

J2 Software and Dtex allow you to catch these early indicators of insider events before they happen. Using powerful machine learning and behaviour patterns, Dtex is able to find warning signs of impending threats instead of relying solely on reactive detection. Advance warning through anomaly detection gives you the capability to respond before disaster strikes. 

J2 Software and Dtex shows you the bigger picture.

Dtex provides you with the visibility and analytics needed to identify both malicious insiders and employees who accidentally put the company at risk. Common findings include:

Theft of Intellectual Property

J2-software-insider-threat

Theft of Intellectual Property

Detect the theft of sensitive data (by internal and external actors) that other security systems miss. Predict the flight risk for departing employees.

  • Theft of Intellectual Property

    Detect the theft of sensitive data (by internal and external actors) that other security systems miss. Predict the flight risk for departing employees.

Off-Network Risky Behaviour

J2-software-Off-Network-Risky-Behavior

Off-Network Risky Behaviour

Fill the visibility gap that most organisations have - understand what users are doing with corporate devices whether they are on or off your network. 

  • Off-Network Risky Behaviour

    Fill the visibility gap that most organisations have - understand what users are doing with corporate devices whether they are on or off your network. 

Failed Security Controls

J2-software-failed-security-controls

Failed Security Controls

See which controls employees have figured out how to bypass, or identify misconfigurations before they result in compromise. 

  • Failed Security Controls

    See which controls employees have figured out how to bypass, or identify misconfigurations before they result in compromise. 

Fraud and Embezzlement

J2-software-Fraud-and-Embezzlement

Fraud and Embezzlement

Detect the theft of inventory and/or customer data for sale to external parties.

  • Fraud and Embezzlement

    Detect the theft of inventory and/or customer data for sale to external parties.

Malicious Employees

J2-software-failed-security-controls

Malicious Employees

Spot employees who are using corporate equipment for illegal activity or are trying to sabotage corporate systems.

  • Malicious Employees

    Spot employees who are using corporate equipment for illegal activity or are trying to sabotage corporate systems.

Accidental Misuse

J2-software-training

Accidental Misuse

Insider threats leave your organisation exposed. Knowing what is really taking place means that you can target training and awareness to those who need it most. 

  • Accidental Misuse

    Insider threats leave your organisation exposed. Knowing what is really taking place means that you can target training and awareness to those who need it most. 

EXTERNAL COMPROMISE OF DEVICES
External Compromise of Devices

As external attackers become more sophisticated, reliance on signatures and even heuristics to detect cybercrime becomes less effective. Dtex automatically builds a profile of each your user's normal activity, and alerts you and your security team to anomalies.

Dtex picks up indicators of compromise like unusual use of admin / hacking tools, unusual transfers or consolidation of data, and unusual after-hours activity.

When used in combination with your threat intel feeds and/or perimeter security tools, Dtex can also be used to identify compromised machines and the source of an attack.
OPERATIONAL EFFICIENCY ANALYSIS
Operational Efficiency Analysis

For call centers, outsourced operations and any operation where throughput matters, use Dtex to clearly understand the differences between high performing teams and poor performing teams. Use advanced human analytics to understand what systems, resources, and sources of information are used by your successful teams. This will allow you to build training programs to address the gaps.

IT REGULATORY COMPLIANCE
IT Regulatory Compliance

With Dtex, you can move away from checkbox compliance and show the world that you use real data-driven validation to maintain compliance.

Use Dtex to verify that you IT security controls are working and are enforced.
IT VISIBILITY AND SUPPORT
IT Visibility and Support

Dtex answers common IT support questions in seconds that can take hours or even days with other systems:

  • An employee left the company - what files did they take with them?
  • A user "lost" a file somewhere on the network - where is it?
  • A laptop was lost or stolen - what data was on it?

Advanced Human Analytics 

Dtex uses four sophisticated analytical methods to show you the users who matter:

J2-software-user-profiling

User Profiling


Dtex automatically builds a user-level profile of activity based on Dtex data not found in other log files, and automatically identifies sudden changes in behaviour that indicate high-risk activity.

J2-software-Advanced-Machine-Learning

Advanced Machine Learning

Self-updating algorithms look for advanced indications of user behavioural changes, such as an increased risk that an employee is getting ready to leave an organisation or is becoming disengaged. 

J2-software-High-Risk

Hundreds of High Risk Behaviour Patterns

Dtex comes pre-installed with hundreds of patterns of known-risky behaviour collected as the result of Dtex and J2 Software’s years of insider threat experience.

J2-software-reporting

Query and Reporting Engine

What data is a user lining up to steal? What data was copied to a stolen or lost laptop? What is really happening on your workstations? We give you immediate answers to questions that you cannot answer now. 

Dtex is the effective solution to your insider threat problem. J2 Software and Dtex give you real visibility into the things you do not know about. Threats evolve daily and without visibility you will constantly be guessing.   

You do not need to be scared of the things you know about. Fighting the “known knowns” is simply not good enough. 

Get in touch
with us today.