External Compromise of Devices
As external attackers become more sophisticated, reliance on signatures and even heuristics to detect cybercrime becomes less effective. Dtex automatically builds a profile of each your user's normal activity, and alerts your security teams to anomalies.
Dtex picks up indicators of compromise like unusual use of admin / hacking tools, unusual transfers or consolidation of data, and unusual after hours activity.
When used in combination with your threat intel feeds and/or perimeter security tools, Dtex can also be used to identify compromised machines and the source of an attack.
- Hits: 2001