• Security and Privacy go Hand-in-Hand

    Dtex Advanced User Behavioural Monitoring

  • A malicious insider doesn’t act on a whim

    Insider Cyber Threat

Dtex provides an incredibly lightweight micro-agent on each end point.

  • Advanced User Behavioural Monitoring  
  • Dtex’s Anonymisation
  • Insider Cyber Threat
  • Detect Theft of Intellectual Property
  • Security Controls
  • Spot Malicious Employees
  • Off-Network Risky Behaviour
  • Fraud and Embezzlement
  • Accidental Misuse
  • External Compromise of Devices
  • Operational Efficiency Analysis
  • IT Regulatory Compliance
  • IT Visibility and Support

Insider Cyber Threat

A malicious insider doesn’t act on a whim – their behaviour changes weeks or months in advance.

J2 Software and Dtex allow you to catch these early indicators of insider events before they happen. Using powerful machine learning and behaviour patterns, Dtex is able to find warning signs of impending threats instead of relying solely on reactive detection. Advance warning through anomaly detection gives you the capability to respond before disaster strikes. 

J2 Software and Dtex shows you the bigger picture.

Dtex provides you with the visibility and analytics needed to identify both malicious insiders and employees who accidentally put the company at risk. Common findings include:

Theft of Intellectual Property

J2-software-insider-threat

Theft of Intellectual Property

Detect the theft of sensitive data (by internal and external actors) that other security systems miss. Predict the flight risk for departing employees.

  • Theft of Intellectual Property

    Detect the theft of sensitive data (by internal and external actors) that other security systems miss. Predict the flight risk for departing employees.

Off-Network Risky Behaviour

J2-software-Off-Network-Risky-Behavior

Off-Network Risky Behaviour

Fill the visibility gap that most organisations have - understand what users are doing with corporate devices whether they are on or off your network. 

  • Off-Network Risky Behaviour

    Fill the visibility gap that most organisations have - understand what users are doing with corporate devices whether they are on or off your network. 

Failed Security Controls

J2-software-failed-security-controls

Failed Security Controls

See which controls employees have figured out how to bypass, or identify misconfigurations before they result in compromise. 

  • Failed Security Controls

    See which controls employees have figured out how to bypass, or identify misconfigurations before they result in compromise. 

Fraud and Embezzlement

J2-software-Fraud-and-Embezzlement

Fraud and Embezzlement

Detect the theft of inventory and/or customer data for sale to external parties.

  • Fraud and Embezzlement

    Detect the theft of inventory and/or customer data for sale to external parties.

Malicious Employees

J2-software-failed-security-controls

Malicious Employees

Spot employees who are using corporate equipment for illegal activity or are trying to sabotage corporate systems.

  • Malicious Employees

    Spot employees who are using corporate equipment for illegal activity or are trying to sabotage corporate systems.

Accidental Misuse

J2-software-training

Accidental Misuse

Insider threats leave your organisation exposed. Knowing what is really taking place means that you can target training and awareness to those who need it most. 

  • Accidental Misuse

    Insider threats leave your organisation exposed. Knowing what is really taking place means that you can target training and awareness to those who need it most. 

Get in touch
with us today.


Copyright © 2018 J2 Software