Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plattform
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Network
Latest Blog Posts
Darktrace Identifies APT35 in Pre-Infected State
Learn how Darktrace identified APT35 (Charming Kitten) in a pre-infected environment. Gain insights into the detection and mitigation of this threat.
Uncovering a Cryptocurrency Farm | Crypto-Mining Malware
Uncover the secrets of a cryptocurrency farm hidden in a warehouse. Learn about the rise of crypto-mining and its impact on the global cyber-threat landscape.
Why Most Ransomware Attacks Occur "After Hours"
Cyber-criminals target weekends and holidays to strike while employees are away. Discover how defensive AI can protect your business 24/7.
Detecting Vendor Email Compromise in Supply Chain Attacks
Learn how Antigena Email stopped a supply chain attack by identifying a behavioral shift in the emails, while still allowing legitimate traffic through.
AI Neutralized Hafnium-Inspired Cyber-Attacks
Learn from this real-life scenario where Darktrace detected a ProxyLogon vulnerability and took action to protect Exchange servers. Read more here.
Botnet and Remote Desktop Protocol Attacks
Understand the connection between botnet malware and RDP attacks, and how to safeguard your network from potential threats.
How VPC Traffic Mirroring Boosts Darktrace Security
Find out how Amazon VPC Traffic Mirroring enhances Darktrace's cloud security. Learn about its impact on advanced threat detection and management.
How AI Secures Cradlepoint's SaaS Environments
Explore how Darktrace's AI-driven technology fortifies Cradlepoint's SaaS environments, safeguarding against evolving cyber threats.
LockBit Ransomware Analysis: Compromised Credentials
Darktrace examines how a LockBit ransomware attack that took place over just four hours was caused by one compromised credential. Read more here.
Compromised 2FA: Preventing Microsoft Account Takeovers
Discover how Darktrace's Microsoft 365 connector detected and investigated a 2FA-compromised Microsoft account takeover. Learn these preventative measures!
Detecting IoT Threats in Control Systems
Discover how Darktrace uncovers pre-existing threats in Industrial IoT systems. Learn about advanced detection techniques in industrial control systems.
Antigena Email Version 5: The Future of Email Protection
Version 5 of Antigena Email enhances security operations with AI-powered threat detection and intuitive reporting for busy security teams.
Explore AI Email Security Approaches with Darktrace
Stay informed on the latest AI approaches to email security. Explore Darktrace's comparisons to find the best solution for your cybersecurity needs!
AI-Powered Cloud Security: Darktrace & Google
Discover how Darktrace uses AI and Google Packet Mirroring to enhance cloud security. Learn about their innovative immune system approach.
Darktrace Vers. 5: AI Transforming Enterprise Security
Darktrace's Immune System Version 5 revolutionizes cybersecurity with AI, cloud service coverage, and seamless integrations.
Darktrace Insights On SolarWinds Hack
Learn how Darktrace analyzed the SolarWinds hack without signatures. Understand the techniques used to identify and mitigate this major cyber threat.
How McLaren Racing Counters Advanced Email Threats
Learn how Darktrace helps McLaren Racing counter advanced email threats, ensuring robust cybersecurity for their operations.
How AI Stopped a WastedLocker Ransomware Intrusion & Fast
Stop WastedLocker ransomware in its tracks with Darktrace AI technology. Learn about how AI detected a recent attack using 'Living off the Land' techniques.
ZeroLogon Vulnerability Identified & Stopped
Learn how the ZeroLogon exploit was detected within 24 hours of the vulnerability notice and its implications on cybersecurity practices.
Darktrace Cyber Analyst Investigates Sodinokibi Ransomware
Darktrace’s Cyber AI Analyst uncovers the intricate details of a Sodinokibi ransomware attack on a retail organization. Dive into this real-time incident.
Previous
Next