Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Cloud
Latest Blog Posts
Evil Corp's WastedLocker Ransomware Attacks Observation
Darktrace detects Evil Corp intrusions with WastedLocker ransomware. Learn how AI spotted malicious activity, from initial intrusion to data exfiltration.
How Off-the-Shelf Tools Are Used for Ransomware
Discover how off-the-shelf tools empower cyber-criminals. Explore a ransomware incident involving a low-skilled threat actor targeting a retail organization.
Darktrace Uncovers COVID-19 Relief Email Scam
Learn about Darktrace's findings on a COVID-19 relief email spoof and how to protect against similar phishing attacks.
Darktrace Email Finds: Fake ShareFile Notification
Stay safe from phishing by recognizing fake ShareFile alerts and compromised supplier accounts in your email.
Darktrace AI Detects Anomalous Behavior in Empty Office
AI uncovered hackers mining cryptocurrency on a biometric server in a deserted office during COVID-19. Learn how Darktrace detected this attack in real-time.
Ransomware-As-A-Service Threat: Eking Targets Government
Discover how Eking ransomware targeted a government organization in APAC. Learn about ransomware as a service & the cyber AI technology that stopped the threat.
Guarding Against Threats Beyond IT
We explore insights from a vast customer database, exposing the widespread adoption of ICS protocols within IT settings.
How to Prevent Spear Phishing Attacks Post Twitter Hack
Twitter confirmed spear phishing as the cause of last month's attack. Learn about the limits of current defenses against spear phishing and how AI can stop it.
Insider Threats: Microsoft 365 Account Hijack
Darktrace's Cyber AI Platform swiftly detects and alerts on anomalous behavior in Microsoft 365 accounts in real-time.
WeTransfer Impersonation Attacks Caught by Darktrace AI
Darktrace email finds two WeTransfer impersonation attacks caught by AI. Learn how Antigena Email detected and stopped malicious spoofing attempts effectively.
US Distributor Hit by LeChiffre Ransomware
Discover how LeChiffre ransomware targeted a US distributor and the measures taken to mitigate the attack, as reported by Darktrace.
How Darktrace Email Protects Against IT Impersonation
Protect your organization from email impersonation attacks. Learn how Darktrace's AI technology can detect phishing threats in real-time on our blog.
Resurgence of Ursnif Banking Trojan "May's Most Wanted Malware"
The Ursnif banking trojan tries to blend into the network as legitimate Zoom and Webex activity, trying to capture credentials. See how Darktrace stops it!
Industrial Sabotage Threats Uncovered
Protect your industrial systems from cyber threats with Darktrace's OT Threat Finder and learn how to prevent industrial sabotage.
Email Security: Darktrace's Approach to Safe New Contacts
Effective email security should provide full protection and keep business running smoothly. Learn about the security approach that Darktrace Email uses!
Uncovering Microsoft Teams Impersonation
Active daily users on Microsoft Teams has increased exponentially, and cyber-criminals are taking advantage of this shift in our working habits.
Darktrace AI Email Finds Chase Fraud Alert
Stop Chase fraud alerts! Learn how Darktrace AI email security caught a malicious email impersonating Chase bank, preventing credential theft in real time.
Why CCPA Compliance Matters & How Cyber AI Helps
Learn why CCPA is important and how Cyber AI can assist, plus discover insights on data privacy and protection.
Cryptomining Campaigns & Technical Analysis of Vulnerability
Crypto-mining campaigns stood no chance against Darktrace's AI as it identified the threat in real time. Put your trust in Darktrace's assistance!
How Darktrace Stopped Impersonation Attack on Board Member
Prevent impersonation attacks with Darktrace. Learn how AI identified & neutralized phishing attempts targeting high-profile individuals in a Gmail environment.
Previous
Next