Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Cloud
Latest Blog Posts
How Vidar Malware Spreads via Malvertising on Google
Discover how Vidar info stealer malware is distributed through malvertising on Google and the risks it poses to users and organizations.
Qatar World Cup 2022 Protected by Darktrace AI Cybersecurity
Discover how Darktrace's AI technology safeguarded the Qatar World Cup 2022 from cyber threats. Learn more about cutting-edge cybersecurity measures today!
Darktrace AI Innovation: A Year in Review
Discover the latest trends, innovations, and achievements of Darktrace in this year-in-review. Stay informed about cutting-edge cybersecurity developments here.
BlackMatter's Smash-and-Grab Ransom Attack Incident Analysis
Stay informed on cybersecurity trends! Read about a BlackMatters ransom attack incident and Darktrace's analysis on how RESPOND could have stopped the attack.
How an Insider Exfiltrated Corporate Data to Google Cloud
Darktrace examines an insider exfiltrating corporate data from a Singaporean file server to Google Cloud. Explore Bytesize Security on Darktrace's blog.
Analyst's Guide to the ActiveAI Security Platform
Understand Darktrace's full functionality in preventing and detecting cyber threats, and how analysts can benefit from Darktrace's AI technology.
How to Select the Right Cybersecurity AI
Choosing the right cybersecurity AI is crucial. Darktrace's guide provides insights and tips to help you make an informed decision.
ML Integration for Third-Party EDR Alerts
The advantages and benefits of combining EDR technologies with Darktrace: how this integration can enhance your cybersecurity strategy.
Prevent Data Exfiltration & Know When to Respond
Over 300GB of data was exfiltrated from a customer network before Darktrace services intervened. Learn the power of Darktrace in autonomous mode.
Risk Reduction Strategies for Mergers & Acquisitions
Learn how to manage the internal and external cyber risks arising from mergers and acquisitions with AI-powered monitoring.
How to Cut Through Cyber Security Noise
Learn how Cyber AI Analyst tackles alert fatigue by categorizing vast amounts of data into actionable security incidents for your team's review.
How Darktrace Could Have Stopped a Surprise DDoS Incident
Learn how Darktrace could revolutionize DDoS defense, enabling companies to stop threats without 24/7 monitoring. Read more about how we thwart attacks!
How Darktrace Finds Misconfigurations
Explore Darktrace’s strategies for preventing IT misconfigurations. Our blog provides actionable insights and use cases.
Early-Adopter Customers on Darktrace PREVENT
Discover crucial insights from early adopters of Darktrace Prevent and how this cybersecurity tool is making a huge difference for organizations.
Prevent Brand Abuse with Darktrace | Protect Your Brand
Prevent brand abuse with Darktrace's AI-powered solution. Detect and stop impersonation attacks before they harm your reputation. Read to learn more here.
How Raccoon Stealer v2 Infects Systems
Learn about Raccoon Stealer v2's infection process and its implications for cybersecurity. Discover effective strategies to protect your systems.
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Darktrace’s SOC team observed a fast-paced compromise involving Raccoon Stealer v1. See which steps the Raccoon Stealer v1 took to extract company data!
Behind Yanluowang: Unveiling Cyber Threat Tactics
Discover the latest insights into the Yanluowang leak organization, uncovering its members and tactics.
Uncover New Malicious Email Payloads in Google Translate
Discover how threat actors are concealing malicious email payloads within Google Translate domains. Learn how Darktrace responds to these attacks effectively.
How Darktrace Identifies Shadow IT
Find out how Darktrace identifies and manages shadow IT. Gain valuable insights into detecting unauthorized IT activities within your organization.
Previous
Next