Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
OT
Latest Blog Posts
How AI Stopped a WastedLocker Ransomware Intrusion & Fast
Stop WastedLocker ransomware in its tracks with Darktrace AI technology. Learn about how AI detected a recent attack using 'Living off the Land' techniques.
ZeroLogon Vulnerability Identified & Stopped
Learn how the ZeroLogon exploit was detected within 24 hours of the vulnerability notice and its implications on cybersecurity practices.
Darktrace Cyber Analyst Investigates Sodinokibi Ransomware
Darktrace’s Cyber AI Analyst uncovers the intricate details of a Sodinokibi ransomware attack on a retail organization. Dive into this real-time incident.
Mimecast Link Rewriting: A False Sense of Security Exposed
Gain insight into modern email security methods to ensure you avoid pitfalls of traditional email gateways. Learn why rewriting links isn't the best approach.
Protecting Healthcare Organizations from Maze Ransomware
Discover how Darktrace detected and protected a healthcare organization from a Maze ransomware attack. Stay informed and protect your data today.
Protecting Industrial Control Systems in the Cloud
The impact of water utility firms in the UK moving SCADA systems to the cloud. Explore ICSaaS and its security implications in practice.
How AI Detected A Hacker Hiding in Energy Grid Within Hours
Darktrace's AI swiftly detected a hacker infiltrating an energy grid within hours. Learn about how AI identified the threat and uncovered anomalous behavior.
Wide Scale Email Compromise Due to Mimecast Miss
Learn how a Mimecast misstep led to a large-scale email compromise and how DarkTrace AI detected the threat. Stay informed and protected against cyber threats.
Exploring AI Email Security & Human Behavior
Read how Darktrace AI is revolutionizing email security. Understand the human behavior of email attacks and how to mitigate your team's malware risks.
Detecting OT Threats: ICS Attack at International Airport
Learn how Darktrace's OT Threat Detection technology identified a sophisticated ICS attack on an international airport. Read more on Darktrace's blog.
The Rise of Stealthy Malware in Public Organizations
Gain insights into how malware attempts to infiltrate public organizations to steal data and the defenses needed to combat these threats.
Darktrace Detects Malicious ISO Files with AI Darktrace Email
Darktrace AI detects malicious ISO file in email attack. Learn more about how Antigena Email stopped the attack without relying on signatures or blacklists.
Emotet Resurgence: Email & Network Defense Insights
Explore how Darktrace's defense in depth strategy combats Emotet's resurgence in email and network layers, ensuring robust cybersecurity.
Evil Corp's WastedLocker Ransomware Attacks Observation
Darktrace detects Evil Corp intrusions with WastedLocker ransomware. Learn how AI spotted malicious activity, from initial intrusion to data exfiltration.
How Off-the-Shelf Tools Are Used for Ransomware
Discover how off-the-shelf tools empower cyber-criminals. Explore a ransomware incident involving a low-skilled threat actor targeting a retail organization.
Darktrace Uncovers COVID-19 Relief Email Scam
Learn about Darktrace's findings on a COVID-19 relief email spoof and how to protect against similar phishing attacks.
Darktrace Email Finds: Fake ShareFile Notification
Stay safe from phishing by recognizing fake ShareFile alerts and compromised supplier accounts in your email.
Darktrace AI Detects Anomalous Behavior in Empty Office
AI uncovered hackers mining cryptocurrency on a biometric server in a deserted office during COVID-19. Learn how Darktrace detected this attack in real-time.
Ransomware-As-A-Service Threat: Eking Targets Government
Discover how Eking ransomware targeted a government organization in APAC. Learn about ransomware as a service & the cyber AI technology that stopped the threat.
Guarding Against Threats Beyond IT
We explore insights from a vast customer database, exposing the widespread adoption of ICS protocols within IT settings.
Previous
Next