Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
Crypto
Latest Blog Posts
How Phishing Attacks Are Becoming Harder to Identify
Learn about the cyber risks posed by advanced phishing attacks and how AI can enhance security solutions to defend against them.
Pikabot Malware: Insights, Impact, & Attack Analysis
Learn about Pikabot malware and its rapid evolution in the wild, impacting organizations and how to defend against this growing threat.
Simulated vs. Real Malware: What You Need To Know
Learn how Darktrace distinguishes between simulated and real malware. Discover the advanced detection techniques used to protect your network.
Cloud Migration Strategies, Services and Risks
Explore strategies, services, and risks associated with mastering cloud migration. Learn more here about hybrid cloud model, benefits, and migration phases.
Malicious Use of Dropbox in Phishing Attacks
Understand the tactics of phishing attacks that exploit Dropbox and learn how to recognize and mitigate these emerging cybersecurity threats.
Defending Against the New Normal in Cybercrime: AI
This blog outlines research & data points on the evolving threat landscape, the impact of malicious AI, and why proactive cyber readiness is essential.
How Community Housing LTD Enhanced Incident Response
Jamie Woodland - Head of Technology at Community Housing LTD - describes how Darktrace provides enhanced incident response for their security team.
Navigating Email Security Gaps Beyond DMARC
Discover Darktrace's strategies for navigating email security gaps beyond DMARC. Enhance your defenses with advanced threat detection and mitigation.
Protecting Against AlphV BlackCat Ransomware
Learn how Darktrace AI is combating AlphV BlackCat ransomware, including the details of this ransomware and how to protect yourself from it.
Quasar Remote Access Tool and Its Security Risks
Discover how the Quasar remote access tool can become a vulnerability in the wrong hands and strategies to mitigate these risks.
Attack Trends: VIP Impersonation in the Business Hierarchy
VIP Impersonation occurs when a cyber-threat actor impersonates a prominent employee to obtain sensitive data. Learn all about VIP impersonation here.
Detecting & Containing Gootloader Malware
Learn how Darktrace helps detect and contain multi-functional threats like the Gootloader malware. Stay ahead of cyber threats with Darktrace AI solutions.
Predicting the Future of Cyber Security and Cyber Threats
Read about cyber security predictions and cyber threats in 2024. Staying up-to-date on cyber attacks and cyber security is vital to all organizations.
How CoinLoader Hijacks Networks
Discover how Darktrace decrypted the CoinLoader malware hijacking networks for cryptomining. Learn about the tactics and protection strategies employed.
How Darktrace Defeated SmokeLoader Malware
Read how Darktrace's AI identified and neutralized SmokeLoader malware. Gain insights into their proactive approach to cybersecurity.
Post-Exploitation Activities of Ivanti CS/PS Appliances
Darktrace’s teams have observed a surge in malicious activities targeting Ivanti Connect Secure (CS) and Ivanti Policy Secure (PS) appliances. Learn more!
Detecting Trusted Network Relationship Abuse
Discover how Darktrace DETECT and the SOC team responded to a network compromise via a trusted partner relationship with this case study.
Three Ways AI Secures OT & ICS from Cyber Attacks
Explore the three challenges facing industries that manage OT and ICS Systems, the benefits of adopting AI technology, and Darktrace / OT’s unique role!
Uncovering CyberCartel Threats in Latin America
Examine the growing threat of cyber cartels in Latin America and learn how to safeguard against their attacks.
How Darktrace Halted A DarkGate in MS Teams
Discover how Darktrace thwarted DarkGate malware in Microsoft Teams. Stay informed on the latest cybersecurity measures and protect your business.
Previous
Next