Skip to main content

External Compromise of Devices

As external attackers become more sophisticated, reliance on signatures and even heuristics to detect cybercrime becomes less effective. Dtex automatically builds a profile of each your user's normal activity, and alerts your security teams to anomalies.

Dtex picks up indicators of compromise like unusual use of admin / hacking tools, unusual transfers or consolidation of data, and unusual after hours activity.

When used in combination with your threat intel feeds and/or perimeter security tools, Dtex can also be used to identify compromised machines and the source of an attack.

  • Hits: 2342