Agent vs. Agentless: A New Approach to Insider Risk Monitoring

Agent vs. Agentless: A New Approach to Insider Risk Monitoring

A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The short answer is: “A bit of both, but better.” Technically speaking, InTERCEPT is ...

Bridging the Gap as OT Networks Integrate with IT Environments

As OT networks integrate with IT environments, how can we bridge the gap to promote robust security?  The (sometimes intricate) lines between Operational Technology (OT) networks and Information Technology (IT) environments are ...

Understanding and Preparing for PCI DSS 4.0

The March 2025 deadline for PCI DSS 4 compliance is closer than we think With the ongoing evolution of cybersecurity threats and payment technologies, adapting to newer compliance standards is more crucial ...

Why IoT and Endpoint Security Need to Go Granular

Microsegmentation offers some clear benefits for organizations looking to protect endpoints and the IoT There’s a growing and justified concern for organizations and individuals: the proliferating Internet of Things (IoT) and the ...

Managing Complexity: Business Dependency Mapping

What is, and how to achieve, effective business dependency mapping Organizations have found themselves navigating through a labyrinth of dependencies in the interconnected digital ecosystem of business. These dependencies span applications, infrastructure, ...
What is Microsegmentation?

Why Mapping Vulnerability is Key to Robust Cybersecurity 

Incidents of cyberattacks show no sign of slowing down and mapping vulnerability should be part of every organization’s security strategy Mapping vulnerability, also known as vulnerability assessment or vulnerability scanning, is an ...

Health Insurance Portability and Accountability Act (HIPAA) Best Practices

Highlighting the key elements of The Health Insurance Portability and Accountability Act to ensure HIPAA best practices  The Health Insurance Portability and Accountability Act (HIPAA) is a vital piece of legislation that ...

Microsegmentation Success Starts with Application-Mesh Visibility

Microsegmentation visibility is key for best cybersecurity practices Gartner’s new Market Guide for Microsegmentation (login req.) states that “Gartner sees interest across all verticals and geographies. Midsize organizations are evaluating microsegmentation solutions, ...

DTEX EDR Integrations: The Next Partner Opportunity

In the past few years, we have seen a massive correlation between data loss incidents and remote working. In fact, the DTEX i3 2022 Insider Risk Investigations Report found 75% of insider ...
Closing the trust-risk loop with file lineage

Closing the trust-risk loop with file lineage

The recent Pentagon leaks have drawn a fine line between trust and risk management, and the need to strike a balance to prevent data loss while maintaining loyalty. As an IT specialist ...