Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Cloud
Latest Blog Posts
Investigating the BadRabbit Cyber Threat
This blog post describes the currently-circulating ransomware called BadRabbit and how Darktrace’s machine learning technology detects it.
Stealth Attacks: The ‘Matrix Banker’ Reloaded
Over the last few weeks, Darktrace has confidently identified traces of the resurgence of a stealthy attack targeting Latin American companies. Learn more!
Feodo Banking Trojan Threatens Government Network
Learn how AI detected new Feodo banking Trojan on a government network and the resurgence of the Feodo banking trojan on a government network.
Protecting Manufacturing IP Leaks with Darktrace AI Security
Learn how a cloud server mishap almost exposed sensitive IP at a leading manufacturing firm and how Darktrace helped mitigate this leak.
Detecting Metamorphic Malware with Darktrace's AI Technology
Detect metamorphic malware with Darktrace's AI. Learn how it uncovers self-modifying cyber-attacks and stops threats that evade traditional security measures.
Detecting Insider Threats Without Rules
Read how to detect insider threats without relying on traditional rules. Learn effective strategies to protect your organization's data from Darktrace experts.
Darktrace's Response Against WannaCry Ransomware
Read more about Darktrace's machine-learning technology which can effortlessly identify anomalous behavioral patterns from ransomware like WannaCry.
How Darktrace AI Responded To A Ransomware Attack In Seconds
Learn how to defend against ransomware with Darktrace's live threat scenario. Discover key strategies to protect your organization from cyber attacks.
Employee Access: The Cyber Threat is Already Inside
Disgruntled employees have the potential to do serious damage from within and cannot be ignored. Learn what steps you can take to mitigate risks!
Preparing for Cyber Monday Cyber Attacks
Stay informed about Cyber Monday holiday hacking and cyber attacks. Learn how to protect your online security during your Cyber Monday shopping spree.
Unraveling 2016 Election Tampering Controversy
While the 2016 U.S. election was roiled by fears over election tampering, it generated discussion on the intersection of cyber-security & voting.
Six Emerging Cyber-Threats You Didn't See in the News
Darktrace shines the spotlight on six emerging cyber-threats that are getting overlooked, including biometric footprint hacks, new malware strains, and more.
Implications of NIS2 on cybersecurity and AI
Explore the key aspects of the NIS2 Directive, the latest EU cyber security legislation coming into effect in 2024. Learn how it impacts AI and security teams.
Mirai Malware: Impact on CCTV Cameras
Learn how Darktrace’s AI identified the Mirai malware in an Internet-connected CTV camera, breaking down each stage of the attack life cycle.
Lessons Learned from the Florida Water Attack
Learn how the Florida water plant attack reshapes our approach to cybersecurity. It’s time to enhance defenses against modern digital threats.
Previous