Dtex SystemSkan

IT Visibility and Support

Dtex answers common IT support questions in seconds that can take hours or even days with other systems:

An employee left the company - what files did they take with them?

A user "lost" a file somewhere on the network - where is it?

A laptop was lost or stolen - what data was on it?

Which systems have an increase in hanging / not responding conditions?

IT Regulatory Compliance

With Dtex, highly regulated companies are moving away from empty attestations to data-driven validation while maintaining compliance with the strictest privacy regulations.

Dtex verifies IT security controls, monitors access / editing of critical files, and audits all user activity to support compliance with regulations like SOX, GLBA, NERC-CIP, PCI, and HIPAA.

[No form id or name provided!]

Usage-Based IT Cost Savings

Typical IT asset management tools fail to provide visibility into usage data. To dramatically lower costs on enterprise software, organizations need visibility into user activity. Dtex provides usage based data and analysis capabilities that lets CIOs and CTOs make data-based decisions instead of pure guesswork:

Concurrent License Utilization

Right-size your use of expensive software based on concurrent usage data, not just install base. Find opportunities to uninstall or balance utilization to save costs.


Free Reader vs. Paid Editor

Reduce your reliance on expensive licenses like Visio, Project, and Acrobat by learning which users need a free viewer/reader.


Usage vs. Installation

At a glance, see which installed applications are or aren't being used across your enterprise.


Patch Level Insight

Quickly see who's using older, insecure software based on usage data, not just install base.


Cloud Planning & Utilization

Baseline current employee use of cloud services, and get accurate metrics for usage of on-site systems that you're considering moving to a cloud-based environment.


Virtualized Environment Planning

When planning to virtualize physical systems, IT teams are often missing accurate usage data about applications, users, and locations. Dtex provides the visibility to determine who is using an application, when they're using it, and from where.


Unused Hardware Detection

Detect unused hardware by comparing purchase records with directory information with usage data from Dtex. Save money by reducing leases and support contracts.

[No form id or name provided!]

Operational Efficiency Analysis

For call centers, outsourced operations, and any operation where throughput matters, use Dtex to clearly understand the differences between highly performing teams and poorly performing teams. Use human analytics to understand what systems, resources, and sources of information are used by highly performing teams, and build training programs to address the gaps.

[No form id or name provided!]

External Compromise of Devices

As external attackers become more sophisticated, reliance on signatures and even heuristics to detect cybercrime becomes less effective. Dtex automatically builds a profile of each your user's normal activity, and alerts your security teams to anomalies.

Dtex picks up indicators of compromise like unusual use of admin / hacking tools, unusual transfers or consolidation of data, and unusual after hours activity.

When used in combination with your threat intel feeds and/or perimeter security tools, Dtex can also be used to identify compromised machines and the source of an attack.

[No form id or name provided!]

More Articles ...

Copyright © 2019 J2 Software | Powered By Cartmell