Bigdata
Now Reading
Dtex Systems
0
Review

Dtex Systems

Overview
Synopsis

Dtex provides total user visibility across global enterprises without negative impact to network traffic or systems. By applying machine learning algorithms to anonymized metadata, Dtex provides bulletproof insider threat detection and risk alerts without violating employee privacy.

Category

User and Entity Behavior Analytics

Features

Identify insider and outsider threat
Fill in data gaps

License

Proprietary Software

Price

Contact for Pricing

Pricing

Subscription

Free Trial

Available

Users Size

Small (<50 employees), Medium (50 to 1000 employees), Enterprise (>1001 employees)

Company

Dtex Systems

PAT Rating™ ( Beta)
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
8.4
8.8
Features & Functionality
8.6
7.2
Advanced Features
8.5
8.3
Integration
8.4
8.4
Performance
8.6
7.0
Training
7.1
Customer Support
8.5
9.3
Implementation
9.1
Renew & Recommend
9.3
Bottom Line

Dtex picks up on hard-to-catch changes in user and endpoint behavior, which exposes the unknown unknowns. With Dtex’s visibility and immediate alerts into anomalous behavior, you’ll know right away if your enterprise has been compromised by malware or malicious outsiders.

8.5
Editor Rating
8.3
Aggregated User Rating
3 ratings
You have rated this

Detex is capable of searching for information that won’t be available anywhere otherwise. The software can detect threats emerging from inside the organization. These threats may be from malicious employees, fraudulent activity, failed security controls, thefts of intellectual property, accidental misuse and so on.

The software has the ability to detect insider threats. Some software cannot identify threats due to unavailability of data and information. In this way they cannot have complete view of what’s going inside. The software provides complete data to identify and detect threats. It actually fills gap with data that makes its unable to identify threats.

By filling the gaps, threats are detected and can be eradicated. The software can be easily integrated with current system. This make the usage of the software much more effective and straight forward. The software catches changes to the behavior of users and endpoints.

These changes may be hard to detect but the software is skilled in identifying those changes. These charges may reflect malware and malicious activity. The software can actively identify outsider threat and insider too, in this way. The software is efficient in identifying threats that may comprise security measures of a company.

Exposing various threats many help users to take immediate action to eradicate them and avoid them in the future. The software is effective for smooth operation of a business. It serves as a shield to the security of a company. The software can be purchased and a free drive could be requested. The software provides a complete package for threat detection.

Filter reviews
User Ratings





User Company size



User role





User industry





Ease of use
Features & Functionality
Advanced Features
Integration
Performance
Training
Customer Support
Implementation
Renew & Recommend

What's your reaction?
Love It
0%
Very Good
0%
INTERESTED
0%
COOL
0%
NOT BAD
0%
WHAT !
0%
HATE IT
0%