Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plattform
Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Network
Latest Blog Posts
How Cyberseer Detected Advanced Red Team Activity
This guest-authored blog post examines how Cyberseer detected highly advanced red team activities with Darktrace’s Enterprise Immune System.
[Part 2] Top Cyber Hygiene Issues Leading to a Breach
Spotting cyber hygiene issues caused by a lapse of attention requires AI tools that alert critical changes to network activity. Read part two here!
[Part 1] 10 Cyber Hygiene Issues Leading to a Security Breach
Spotting cyber hygiene issues caused by a lapse of attention requires AI tools that alert critical changes to network activity. Read part one here!
SaaS Security: Risks Cloud Collaboration
Discover how AI cyber defenses safeguard SaaS applications from cyber threats, ensuring efficiency without compromising security.
Anatomy of an Insider Breach From a Contractor's Laptop
Hear from a guest author how Darktrace identified an insider breach from a contractor's laptop, scanned the device, and removed the malware quickly.
The Invisible Threat: How AI Catches the Ursnif Trojan
The cyber AI approach successfully detected the Ursnif infections even though the new variant of this malware was unknown to security vendors at the time.
Detecting & Investigating Lateral Movement
This guest-authored blog post examines an advanced cyber-threat discovered by Expel, using Darktrace, on a customer’s network.
State-Sponsored Cyber Attacks on Colleges
Discover how universities should embrace cyber AI to safeguard research and intellectual property while maintaining campus connectivity.
The VR Goldilocks Problem and Value of Continued Recognition
Security and Operations Teams face challenges when it comes to visibility and recognition. Learn more about how we find a solution to the problems!
Anomaly Detection Techniques for Mimikatz Behavior
Learn how anomaly detection can identify Mimikatz behavior and enhance your cybersecurity measures against credential theft.
Unmasking Major Cyber-Threats of 2018
In the second installment of a 2-part series, Max Heinemeyer analyzes the rise of deceptive attacks & insider threats found by Darktrace AI in 2018.
Zero-Day Trojan Attack Caught by Darktrace Appliance
Hear from a guest author how Darktrace spotted and neutralized a hidden zero-day trojan attack through our Breach Logs and Intrusion Detection System.
Insider Analysis of Emotet Malware
Uncover the secrets of Emotet with our latest Darktrace expert analysis. Learn how to identify and understand trojan horse attacks.
How Darktrace Finds 'Low and Slow' Cyber Threats
The latest escalation in the cyber arms race sees attackers choosing stealth over speed and cunning over chaos.
How Black Hats Take Advantage of Black Friday
The retail industry must be willing to adapt its cyber defenses against an ever-evolving adversary, or it may end Black Friday firmly in the red.
Darktrace on Law Firm Cybersecurity Challenges
Find out how Darktrace supports law firms in combating cyber threats, ensuring the security of valuable and sensitive information.
Defending Against Cyber Attacks on San Diego & Barcelona Ports
Discover how Darktrace AI safeguards ports globally against cyber-attacks, including those in San Diego and Barcelona, enhancing maritime cyber security!
Unsupervised Machine Learning and JA3 for Enhanced Security
Unlock the true power of Darktrace's algorithms. Learn how JA3 enhances cybersecurity defenses with unique TLS/SSL fingerprints & unsupervised machine learning.
Ransomware Tactics One Year After WannaCry
Learn about common infection vectors & how Darktrace Enterprise Immune System helps catch ransomware threats. Enhance your security strategy now.
How Profitable is Crypto-Mining Malware?
Prevent crypto-mining malware with Darktrace. Learn how Monero-miner infections spread on networks. Stop cyber-criminals earning from illegal activities.
Previous
Next