Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plattform
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Network
Latest Blog Posts
Prevent Data Exfiltration & Know When to Respond
Over 300GB of data was exfiltrated from a customer network before Darktrace services intervened. Learn the power of Darktrace in autonomous mode.
Risk Reduction Strategies for Mergers & Acquisitions
Learn how to manage the internal and external cyber risks arising from mergers and acquisitions with AI-powered monitoring.
How to Cut Through Cyber Security Noise
Learn how Cyber AI Analyst tackles alert fatigue by categorizing vast amounts of data into actionable security incidents for your team's review.
How Darktrace Could Have Stopped a Surprise DDoS Incident
Learn how Darktrace could revolutionize DDoS defense, enabling companies to stop threats without 24/7 monitoring. Read more about how we thwart attacks!
How Darktrace Finds Misconfigurations
Explore Darktrace’s strategies for preventing IT misconfigurations. Our blog provides actionable insights and use cases.
Early-Adopter Customers on Darktrace PREVENT
Discover crucial insights from early adopters of Darktrace Prevent and how this cybersecurity tool is making a huge difference for organizations.
Prevent Brand Abuse with Darktrace | Protect Your Brand
Prevent brand abuse with Darktrace's AI-powered solution. Detect and stop impersonation attacks before they harm your reputation. Read to learn more here.
How Raccoon Stealer v2 Infects Systems
Learn about Raccoon Stealer v2's infection process and its implications for cybersecurity. Discover effective strategies to protect your systems.
[Part 1] Analysis of a Raccoon Stealer v1 Infection
Darktrace’s SOC team observed a fast-paced compromise involving Raccoon Stealer v1. See which steps the Raccoon Stealer v1 took to extract company data!
Behind Yanluowang: Unveiling Cyber Threat Tactics
Discover the latest insights into the Yanluowang leak organization, uncovering its members and tactics.
Uncover New Malicious Email Payloads in Google Translate
Discover how threat actors are concealing malicious email payloads within Google Translate domains. Learn how Darktrace responds to these attacks effectively.
How Darktrace Identifies Shadow IT
Find out how Darktrace identifies and manages shadow IT. Gain valuable insights into detecting unauthorized IT activities within your organization.
Securing Patient Data at Cullman Regional Medical Center
Discover how Cullman Regional Medical Center safeguards patient data with Darktrace AI. Learn how to keep sensitive data protected with the Darktrace experts!
Strategies to Prolong Quantum Ransomware Attacks
Learn more about how Darktrace combats Quantum Ransomware changing strategy for cyberattacks. Explore the power of AI-driven network cyber security!
How Darktrace AI Isn't Fooled by Impersonation Tactics
Learn how Darktrace AI outsmarts impersonation tactics in cybersecurity. Discover cutting-edge security insights and how to keep yourself safe.
Kill Chain Insights: Detecting AutoIT Malware Compromise
Discover how AutoIt malware operates and learn strategies to combat this emerging threat in our latest blog post.
Why American Kidney Fund Chose Darktrace
Find out how Darktrace's technology defends the American Kidney Fund against cyber threats, ensuring robust digital security.
Piloting Airline Cyber Security With Artificial Intelligence (AI)
The airline industry is constantly exposed to cyber threats. Darktrace has some tips to help airline professionals bolster their cyber-security efforts.
Understanding The Threat of Social Engineering
Learn why MFA and security awareness fall short and how Self-Learning AI can enhance your cyber defense strategy.
Modern Extortion: Detecting Data Theft From the Cloud
Darktrace highlights a handful of data theft incidents on shared cloud platforms, showing that cloud computing can be a vulnerable place for modern extortion.
Previous
Next