Predict your next investment

DTEX company logo
SOFTWARE (NON-INTERNET/MOBILE) | Security Software
dtexsystems.com

See what CB Insights has to offer

Founded Year

2002

Stage

Series D | Alive

Total Raised

$57.49M

Last Raised

$17.5M | 1 yr ago

About DTEX

DTEX offers a Workforce Cyber Intelligence Platform. It captures hundreds of elements of behavioral telemetry to produce dynamic “Indicators of Intent” and deliver holistic, real-time awareness about your workforce’s activities – without invading personal privacy. DTEX empowers users to easily see, understand and act on contextual intelligence using scoring frameworks proven to stop insider threats, prevent data loss, maximize software investments and protect their workforce, wherever they may be.

DTEX Headquarter Location

19630 Allandale Ave Suite 2218

Saratoga, California, 95070,

United States

408-418-3786

Latest DTEX News

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

Jul 23, 2021

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user groups in large enterprises sometimes deploy due to a perceived lack of urgency, responsiveness and/or support from the central IT organization. For IT department leaders, shadow IT is a resource over which they have no control or influence, leading to greater fragmentation, inefficiency, waste, expense and unmanageability in the enterprise IT environment. For cyber security leaders, shadow IT is something more concerning: a major, untrackable source of risk beyond the reach of traditional Insider Threat and Data Loss Prevention (DLP) solutions. By not conforming to IT and cloud security best practices, shadow IT systems and the devices connected to them are vulnerable to becoming easily breached access points for bad actors. The shadow IT issue has only grown over time as the barriers to application deployment have fallen. Today, a department eager to adopt, say, a new marketing automation solution can do so with minimal investment and configuration work and zero IT department involvement. They could then feed valuable corporate data into the solution without proper safeguards. Thus, a shadow IT system can operate for months beyond the scrutiny of traditional Insider Threat and endpoint DLP solutions. The larger the organization, the more shadow IT proliferates and the harder it is for security teams to root out these rogue solutions and bring them in line with corporate cybersecurity standards. So how can enterprise security teams ensure that their hard work is not undone by shadow IT systems they didn’t even know existed? For one company, the answer was DTEX. VicTrack is a diversified company that owns the majority of railway-related infrastructure in Australia’s second-largest state, Victoria. With close to 400 employees and an extensive network of public transport resources to protect, VicTrack deployed DTEX Workforce Cyber Intelligence & Security Platform to up its game against insider threats and endpoint data loss. But after working with it for a while, the VicTrack team realized that DTEX had another vital use – it can spot shadow IT quickly and enable security teams to take the steps necessary to safeguard those non-IT systems from internal and external malicious attacks. The key is the vast amount of information that DTEX collects and analyzes. Immediately upon being deployed, DTEX begins tracking how, when, why, where and for how long employees and third parties interact with data, machines, applications and their peers across the enterprise network. It is able to identify all devices, applications and users – quickly bringing shadow IT out from the shadows and into the light. VicTrack’s Chief Information Officer, Bruce Moore, sees DTEX as essential, not only to protecting VicTrack’s data, resources and reputation, but also to keeping IT costs under control. “In this world, the cost of IT is one of the critical features for every organization,” said Moore. “And one of the things that always works against us is shadow IT. With DTEX, we’re able to understand exactly what is going on and how our IT infrastructure is being used. And these scenarios where shadow IT or unnecessary applications are running, we’re able to identify and take remedial action to shut them down.” The result is greater IT control, better enforcement of corporate cybersecurity protocols , reduced risk, and the confidence of knowing there are no undiscovered holes in their security perimeter to provide an exit for insider threats or endpoint data loss. VicTrack provides an excellent example on how DTEX combats shadow IT, and more. Email*

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing DTEX

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

DTEX is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

4,596 items

DTEX Patents

DTEX has filed 2 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Computer security
  • Cyberwarfare
patents chart

Application Date

Grant Date

Title

Related Topics

Status

4/18/2018

8/20/2019

Computer security, Computer network security, Cyberwarfare, Data security, Domain name system

Grant

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

Application Date

4/18/2018

00/00/0000

Grant Date

8/20/2019

00/00/0000

Title

Subscribe to see more

Related Topics

Computer security, Computer network security, Cyberwarfare, Data security, Domain name system

Subscribe to see more

Status

Grant

Subscribe to see more

DTEX Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

DTEX Rank

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.