Produkte
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Umfassendes Risikomanagement
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/ Proactive Exposure Management
/ Attack Surface Management
/ Incident Readiness & Recovery
Cyber-KI Analyst
Untersucht jeden Alarm wie ein Mensch Analyst, mit der Geschwindigkeit und dem Umfang von KI
Darktrace-Dienste
Maximieren Sie Ihre Sicherheitsinvestitionen mit rund um die Uhr verfügbarem Expertensupport und Störfallmanagement durch unser globales SOC-Team.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
KI-Forschungszentrum
Ressourcen
Kunden
Blog
Ereignisse
Im SOC
Die Inferenz
Glossar
Alle Ressourcen
Weißbuch
Das KI-Arsenal: Die Tools verstehen, die die Cybersicherheit prägen
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Partner
Überblick
Partnerportal
Technologiepartner
Integrationen
Ausgewählte Partner
Microsoft
AWS
Produkte
Überblick
/ NETWORK
Proaktiver Schutz
/ EMAIL
Cloud-native KI-Sicherheit
/ CLOUD
Vollständige Bewölkung
/ OT
Schützen Sie kritische Systeme
/ IDENTITY
360°-Benutzerschutz
/ ENDPOINT
Abdeckung für jedes Gerät
/Proaktives Expositionsmanagement
/Verwaltung der Angriffsfläche
/Vorfallbereitschaft und Wiederherstellung
Cyber-KI Analyst
Dienstleistungen
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
KI-Forschungszentrum
Ressourcen
Alle Ressourcen
Kunden
Blog
Ereignisse
Die Inferenz
Im SOC
Glossar
Firma
Über uns
Kontakt
Karriere
Führung
Neuigkeiten
föderal
Akademie
SDR Academy
Rechtliches
Partner
Überblick
Partnerportal
Technologiepartner
Werden Sie ein Partner
Integrationen
Microsoft
AWS
McLaren
Holen Sie sich eine Demo
Demo anfordern
Get a demo
Darktrace Blog
Threat Finds
Latest Blog Posts
Enhancing Cloud Security with Business Context
Discover cloud migration insights, security challenges, best practices, and Darktrace's unique approach to enhancing cloud visibility and risk management.
What are Botnets and How Darktrace Uncovers Them
Learn how Darktrace detected and implemented defense protocols against Socks5Systemz botnet before any threat to intelligence had been published.
How Phishing Attacks Are Becoming Harder to Identify
Learn about the cyber risks posed by advanced phishing attacks and how AI can enhance security solutions to defend against them.
Pikabot Malware: Insights, Impact, & Attack Analysis
Learn about Pikabot malware and its rapid evolution in the wild, impacting organizations and how to defend against this growing threat.
Simulated vs. Real Malware: What You Need To Know
Learn how Darktrace distinguishes between simulated and real malware. Discover the advanced detection techniques used to protect your network.
Cloud Migration Strategies, Services and Risks
Explore strategies, services, and risks associated with mastering cloud migration. Learn more here about hybrid cloud model, benefits, and migration phases.
Malicious Use of Dropbox in Phishing Attacks
Understand the tactics of phishing attacks that exploit Dropbox and learn how to recognize and mitigate these emerging cybersecurity threats.
Defending Against the New Normal in Cybercrime: AI
This blog outlines research & data points on the evolving threat landscape, the impact of malicious AI, and why proactive cyber readiness is essential.
How Community Housing LTD Enhanced Incident Response
Jamie Woodland - Head of Technology at Community Housing LTD - describes how Darktrace provides enhanced incident response for their security team.
Navigating Email Security Gaps Beyond DMARC
Discover Darktrace's strategies for navigating email security gaps beyond DMARC. Enhance your defenses with advanced threat detection and mitigation.
Protecting Against AlphV BlackCat Ransomware
Learn how Darktrace AI is combating AlphV BlackCat ransomware, including the details of this ransomware and how to protect yourself from it.
Quasar Remote Access Tool and Its Security Risks
Discover how the Quasar remote access tool can become a vulnerability in the wrong hands and strategies to mitigate these risks.
Attack Trends: VIP Impersonation in the Business Hierarchy
VIP Impersonation occurs when a cyber-threat actor impersonates a prominent employee to obtain sensitive data. Learn all about VIP impersonation here.
Detecting & Containing Gootloader Malware
Learn how Darktrace helps detect and contain multi-functional threats like the Gootloader malware. Stay ahead of cyber threats with Darktrace AI solutions.
Predicting the Future of Cyber Security and Cyber Threats
Read about cyber security predictions and cyber threats in 2024. Staying up-to-date on cyber attacks and cyber security is vital to all organizations.
How CoinLoader Hijacks Networks
Discover how Darktrace decrypted the CoinLoader malware hijacking networks for cryptomining. Learn about the tactics and protection strategies employed.
How Darktrace Defeated SmokeLoader Malware
Read how Darktrace's AI identified and neutralized SmokeLoader malware. Gain insights into their proactive approach to cybersecurity.
Post-Exploitation Activities of Ivanti CS/PS Appliances
Darktrace’s teams have observed a surge in malicious activities targeting Ivanti Connect Secure (CS) and Ivanti Policy Secure (PS) appliances. Learn more!
Detecting Trusted Network Relationship Abuse
Discover how Darktrace DETECT and the SOC team responded to a network compromise via a trusted partner relationship with this case study.
Three Ways AI Secures OT & ICS from Cyber Attacks
Explore the three challenges facing industries that manage OT and ICS Systems, the benefits of adopting AI technology, and Darktrace / OT’s unique role!
Previous
Next