The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they reveal – in scrupulous detail – who in your organization is using which software products on which devices.
The post An Unexpected Cost-S… Continue reading An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

“Shadow IT” is the bane of many IT departments. The term refers to those non-IT department information systems that user groups in large enterprises sometimes deploy due to a perceived lack of urgency, responsiveness and/or support from the central IT … Continue reading Combating Shadow IT: A Customer Uses DTEX for Cybersecurity & More

VicTrack & DTEX: Security Product for Business Continuity Planning?

Most companies deploy insider threat solutions, yet few leverage this for Business Continuity Planning. Learn how VicTrack reaps extra benefits here through DTEX’s security product.
The post VicTrack & DTEX: Security Product for Business Continuity… Continue reading VicTrack & DTEX: Security Product for Business Continuity Planning?

DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

While cryptocurrency clearly will have its place in the future of the world economy, it’s important that organizations and individuals understand the risk that comes with buying and researching crypto on corporate devices…
The post DTEX C-InT Brief: … Continue reading DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices

Workforce Cyber Intelligence 106: Nine Workforce Cyber Intelligence Use Cases

Explore how Workforce Cyber Intelligence, a novel approach to learning from employees that enables informed business decisions, through nine use cases.
The post Workforce Cyber Intelligence 106: Nine Workforce Cyber Intelligence Use Cases appeared firs… Continue reading Workforce Cyber Intelligence 106: Nine Workforce Cyber Intelligence Use Cases

Workforce Cyber Intelligence 105: Improving Operational Efficiency with Workforce Visibility

We previously explored protection that Workforce Cyber Intelligence provides employers & employees. Now, learn how Workforce Visibility improves Operational Efficiency.
The post Workforce Cyber Intelligence 105: Improving Operational Efficiency wit… Continue reading Workforce Cyber Intelligence 105: Improving Operational Efficiency with Workforce Visibility

Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Behavior analysis and workforce monitoring can coexist and even flourish alongside privacy and security to detect malicious insiders. This blog post examines the protections for both employees and employers associated with Workforce Cyber Intelligence…. Continue reading Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats

Workforce Cyber Intelligence 103: The Importance of User Privacy & Trust

Dive deeper into one of the key pillars of Workforce Cyber Intelligence: privacy.
The post Workforce Cyber Intelligence 103: The Importance of User Privacy & Trust appeared first on Dtex Systems Inc.
The post Workforce Cyber Intelligence 103: The I… Continue reading Workforce Cyber Intelligence 103: The Importance of User Privacy & Trust

Workforce Cyber Intelligence 102: An Introduction to Workforce Cyber Intelligence

Dive deeper into workforce cyber intelligence and understand the shortcomings that this next generation technology helps address.
The post Workforce Cyber Intelligence 102: An Introduction to Workforce Cyber Intelligence appeared first on Dtex Systems … Continue reading Workforce Cyber Intelligence 102: An Introduction to Workforce Cyber Intelligence