Health Insurance Portability and Accountability Act (HIPAA) Best Practices

Highlighting the key elements of The Health Insurance Portability and Accountability Act to ensure HIPAA best practices  The Health Insurance Portability and Accountability Act (HIPAA) is a vital piece of legislation that ...

Microsegmentation Success Starts with Application-Mesh Visibility

Microsegmentation visibility is key for best cybersecurity practices Gartner’s new Market Guide for Microsegmentation (login req.) states that “Gartner sees interest across all verticals and geographies. Midsize organizations are evaluating microsegmentation solutions, ...

DTEX EDR Integrations: The Next Partner Opportunity

In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact, the DTEX i3 2022 Insider Risk Investigations Report found 75% of insider ...
Closing the trust-risk loop with file lineage

Closing the trust-risk loop with file lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike a balance to prevent data loss while maintaining loyalty. As an IT specialist ...

7 Reasons to Ditch Endpoint DLP for Endpoint Visibility

Companies really don't have any business collecting or managing. The post 7 Reasons to Ditch Endpoint DLP for Endpoint Visibility appeared first on DTEX Systems Inc ...

2023 Insider Risk Investigations Report ~ The Rise of Employee Attrition and Data Exfiltration

Today we released our 2023 Insider Risk Investigations Report. Our report, released annually since 2017, is driven by one key goal: To empower organizations to better understand and mitigate insider risk, so ...

Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale

The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other financial institutions, the cost of a security incident can quickly add up to ...

Cloud Security Best Practices To Increase Visibility Across Applications

As enterprises are accelerating the adoption of digital transformation, the attack surface is rapidly expanding into cloud and multi-cloud environments.  In order to effectively detect and respond to threats, the visibility that ...

Case Study: DTEX Provides Visibility and Context to Global Materials Company

A global materials science company that invests heavily in research and holds thousands of patents worldwide realized it needed a modern and scalable solution to protect against malicious insiders, competitors and other ...

Crawl, Walk, Run: How to Kickstart your Insider Risk Program

Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing an Insider Risk Program should be a top priority. Off the back ...