• slide


Dtex helps eliminate insider threat. It can catch breaches and stop data theft with answers you can’t get anywhere else. Dtex helps catch outside infiltrators who may be targeting vulnerable users inside an organizationby preventing unusual data aggregation and privilege escalation. It finds malicious insiders and prevents them from stealing valuable data by showing you when your security controls are being bypassed. Dtex also helps protect organizations from negligent insiders by keeping data safe — both on and off the network — without restricting employees’ productivity or violating their privacy.


Dtex Advanced User Behavior Intelligence Platform

The Dtex Advanced User Behavior Intelligence Platform combines technology, intelligence, and services to provide cutting-edge protection from user threats. With the platform, you can:

  • Prevent unusual data aggregation
  • Detect privilege escalation
  • See lateral movement tools
  • Detect ransomware
  • Stop data exfiltration and offline risky user behavior
  • See when security controls are misconfigured or bypassed
  • Find employees who are using equipment for illegal activities

It features:

  • Ultra-lightweight endpoint data collector
  • Advanced user behavior analytics
  • Privacy compliance
  • Thousands of known bad behavior patterns
  • Targeted alerts dashboard
  • Full integration with SIEM
  • Expert analysts and threat assessments


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021



Latest News

Dtex Systems, the leader in insider threat intelligence and detection, today announced that its solution has been approved to deliver critical cyber capabilities in support of the Department of ...
Dtex Systems™, a leading insider threat detection provider, today announced that it has signed a partner agreement with Carahsoft Technology Corp., the trusted government IT solutions provider and a ...



Many enterprises of all sizes are turning to Endpoint Detection and Response for security at the endpoint.Here’s how top companies are creating a two-pronged endpoint security approach, fighting both malware and insider threats.

Dtex provides unparalleled user behavior visibility directly from the endpoint. This uninterrupted audit trail provides visibility into nearly every item in the MITRE matrix, resulting in stronger detection for each of these categories. Dtex also offers dashboards and alerts mapped to the ATT&CK Fra...

With the new data anonymization feature in the Dtex Analytics Server, personal data is safer and more privacy-conscious than ever before.

Dtex is a proven cyber security platform within the U.S. Federal sector and is being actively used to detect data breaches, report on compliance and provide real time forensic reporting. In July 2019, Dtex earned the U.S. Department of Defense Authority to Operate and in October 2019, Dtex was added...

As a company that’s on the front lines fighting insider threats, Dtex sees a number of trends converging that are making insider threat a top area of concern for CIOs and CISOs. Check out this whitepaper to see how Dtex helps public sector organizations build effective insider threat programs by g...


Effectively fighting insider threats is impossible without tools that enable the modern government organization. Dtex's modern user activity monitoring solution combines user-focused visibility, machine learning, and behavioral insights to give public-sector organizations a high-fidelity, scalable a...

Dtex Systems’ modern User Activity Monitoring capability is an innovative insider threat solution that detects developing, active and recent insider threats using an endpoint collector, machine learning algorithms, and big data.


View this 7-minute video to learn how Dtex’s new Work from Home Dashboard can monitor off-network behavior, including printing and USB transfers, to help close security gaps, empower your analysts, and be “left of boom,” detecting early warning signs before it’s too late.


A lot of organizations try to protect their critical data with endpoint or network DLP. These are powerful tools, but they aren’t enough to protect data from all user threats. DLP solutions rely on rules and lock-and-block techniques to protect confidential data, and Dtex builds upon this with a c...

Insider threats can come from just about any angle. To stop them, the right solution needs to take an intelligent, user-centric approach.Dtex combines unique endpoint visibility with actionable analytics to find, target, and identify insider threats with unprecedented accuracy.