Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Threat Finds
Latest Blog Posts
Darktrace Enhances Security with Amazon Lake Integration
Darktrace integrates AI with Amazon Security Lake for enhanced security investigations & threat detection. Learn how this collaboration benefits security teams.
Darktrace’s Detection of a Hive Ransomware-as-Service
This blog investigates a new strain of ransomware, Hive, a ransomware-as-a-service. Darktrace was able to provide full visibility over the attacks.
Darktrace Stops Large-Scale Account Hijack
Learn how Darktrace detected and stopped a large-scale account hijack that led to a phishing attack. Protect your business with these insights.
Securing OT Systems: The Limits of the Air Gap Approach
Air-gapped security measures are not enough for resilience against cyber attacks. Read about how to gain visibility & reduce your cyber vulnerabilities.
Breaking Down "ICES": An Umbrella Term With Wide Variety
Integrated Cloud Email Security (ICES) can be an effective email security solution, but Darktrace/Email's self-learning AI should be your solution of choice.
Gozi ISFB Malware Detection Insights and Analysis
Uncover how Gozi ISFB operates and how Darktrace’s detection capabilities help secure your systems against this versatile malware.
Flexible Deployments for Enhanced Email Security
Learn about the benefits of flexible deployment with Darktrace's cutting-edge technology. Explore how to stay ahead of email attacks and stay safe with AI.
Boosting Security Posture with Email Integration
Protect your organization from cyber-attacks with a strong security strategy. Learn how to safeguard against threats targeting email, cloud apps, and beyond.
Enhancing Darktrace with Microsoft Defender
Explore the integration of Microsoft Defender and Darktrace security solutions, and how they collaborate to enhance cybersecurity & support security teams.
Employee-Conscious Email Security Solutions in the Workforce
Email threats commonly affect organizations. Read Darktrace's expert insights on how to safeguard your business by educating employees about email security.
Detecting Malicious Email Activity & AI Impersonating
Discover how two different phishing attempts from some known and unknown senders used a payroll diversion and credential sealing box link to harm users.
Understanding Qakbot Infections and Attack Paths
Explore the network-based analysis of Qakbot infections with Darktrace. Learn about the various attack paths used by cybercriminals and Darktrace's response.
Enhancing Security Teams with AI-Powered Email Solutions
Discover email-based attack challenges & how AI security solutions can tackle these attacks with autonomous action, optimized workflows, and user visibility.
Cyber Security Threats - Email Compromise With Generative AI
Discover how generative AI is impacting email attacks and what companies can do to prepare for more sophisticated and targeted attacker campaigns.
Email Security & Future Innovations: Educating Employees
As online attackers change to targeted and sophisticated attacks, Darktrace stresses the importance of protection and utilizing steady verification codes.
Amadey Info Stealer and N-Day Vulnerabilities
Understand the implications of the Amadey info stealer on cybersecurity and how it exploits N-day vulnerabilities for data theft.
Multi-Factor Authentication: Not the Silver Bullet
Multi-Factor Authentication (MFA) is a widely used security measure, but it's not bulletproof. See how threat actors can exploit MFA to access your information.
Protecting Yourself from Laplas Clipper Crypto Theives
Explore strategies to combat Laplas Clipper attacks and enhance your defenses against cryptocurrency theft in the digital landscape.
Compliance Breach Mitigation
Uncover the significance of compliance in preventing cyber threats and learn strategies for effective breach mitigation in your organization.
Prevent Cryptojacking Attacks with Darktrace AI Technology
Protect your business from cryptojackers with Darktrace AI! Discover how your business can benefit round-the-clock defense with AI Cybersecurity.
Previous
Next