Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

What was once the thing of spy movies and corporate espionage news headlines is now, sadly, a common occurrence for public organizations and private enterprises around the globe. Insiders… employees, consultants, partners… have emerged as one of the most immediate and serious threats facing IT and cyber security teams and practitioners today.

It is not however because every insider has turned malicious. To the contrary, employees are more in-tune with cyber security, privacy and information protection than ever before. The vast majority understand their role in protecting their organizations information and why it is important to their employer and for themselves to be vigilant and take an active role as a ‘human firewall.’

Unfortunately, what were positive gains has seen a regression in the last 18 months due in large part to the sudden shift to remote work, anxiety about job security and furloughs, and, more recently, a massive trend in career professionals proactively changing jobs in what has become an incredibly ‘hot’ job market termed the ‘Great Resignation’ Migration.

The decentralization of the modern enterprise — and the digital empowerment of the insider — have since expanded the attack surface, compounding the need for a zero trust strategy. As such it is important to adopt the premise that an attacker is already in your environment and may be a trusted insider. The way in which we need to approach security has changed dramatically and the actions and intent of the human must take center stage.

Splunk and DTEX Systems have partnered to offer an integrated solution that captures, analyzes and streams a single, noise-free endpoint data signal. This telemetry describes genuine user intent and delivers the contextual human activity intelligence and endpoint meta-data as ‘Indicators of Intent’ ignored by 'several' or 'many' NGAV, UEBA and DLP tools.

Splunk Enterprise Security (ES) takes DTEX InTERCEPT’s ‘Indicators of Intent’ and provides customers with forensic intelligence that answers the questions of who, what, when, where and for how long an insider interacts with data, applications, machines and other users. This real-time, user behavior lineage highlights deviations from baseline activity to identify emerging insider threats, compromised account events or data loss scenarios.

Early adopter customers are advancing three use-case scenarios and realizing immediate time to value including:

Diagram Description automatically generated

What makes Splunk ES and DTEX InTERCEPT unique is a simple and clear view of endpoint telemetry complete with human activity. The graphic below on the left illustrates a short sequence of user activities representing high-risk behavior that creates several thousand windows events that can be very difficult to review and interpret. By contrast, DTEX InTERCEPT data is filtered at the source, and the context provided reduces the number of truly notable events from 2500 Windows Security Event Logs to less than 100.

Graphical user interface, application, Teams Description automatically generated

In a similar construct with Splunk SOAR, DTEX InTERCEPT’s risk-score stacking and streaming behavioral analysis delivers a noise-free signal that expresses user activity to accurately inform automated response processes. The graphic below on the right is an example of a response orchestration utilizing DTEX InTERCEPT’s human intelligence telemetry.

Getting DTEX InTERCEPT telemetry into Splunk is fast and easy. The direct integration between DTEX InTERCEPT and Splunk Cloud makes endpoint telemetry and insider risk intelligence ingestion fast and simple. Data is streamed securely and reliably over HTTPS. With DTEX and Splunk, security teams can focus on security, not managing infrastructure. With this integration, actionable data is visible in a single console, reducing the need to pivot across disjointed point products during investigations.

Together, Splunk and DTEX are accelerating security response times and root cause analysis, driving faster event resolution with advanced analytics and reporting, and decreasing manual security and IT operations with DMAP+ telemetry that provides the full context regarding the data, machines, applications, and people involved in a notable event.

We’re very excited to partner with DTEX on this superior, cloud-to-cloud approach to security. We hope that you take advantage of this powerful integration to improve your zero trust maturity today.

To stay up to date on all things DTEX and Splunk, head over to our DTEX Global Strategic Partner Page. We’ll be updating this with all of the content that we create together.

This article was co-authored by Rajan Koo, Chief Customer Success Officer at DTEX Systems.

----------------------------------------------------
Thanks!
Jane Wong

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.