Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
McLaren
Latest Blog Posts
Defending Against Cyber Attacks on San Diego & Barcelona Ports
Discover how Darktrace AI safeguards ports globally against cyber-attacks, including those in San Diego and Barcelona, enhancing maritime cyber security!
Unsupervised Machine Learning and JA3 for Enhanced Security
Unlock the true power of Darktrace's algorithms. Learn how JA3 enhances cybersecurity defenses with unique TLS/SSL fingerprints & unsupervised machine learning.
Ransomware Tactics One Year After WannaCry
Learn about common infection vectors & how Darktrace Enterprise Immune System helps catch ransomware threats. Enhance your security strategy now.
How Profitable is Crypto-Mining Malware?
Prevent crypto-mining malware with Darktrace. Learn how Monero-miner infections spread on networks. Stop cyber-criminals earning from illegal activities.
How Malware Abused Sixt.com and Breitling.com
See how Darktrace neutralized an advanced malware infection on a customer's devices by pinpointing the source of communication and anomalous behavior.
The Rise of Cryptocurrency Attacks & Cyber Defense Solutions
Darktrace can detect cryptocurrency-related attacks with machine learning. Identify nefarious use of resources and protect against Coinhive drive-by mining.
Instant Domain Fluxing Identification with Darktrace AI
In this case study, Darktrace demonstrates how instant domain fluxing identification can stop domain generating algorithms (DGAs) in their tracks.
Implications of TRITON attack on the Future of ICS Security
Explore how the TRITON malware attack reshapes OT cybersecurity strategies and the necessary steps to protect ICS networks effectively. Learn more here!
Darktrace: Investigating Widespread Trojan Infections
Discover how Darktrace expedites the investigation of widespread Trojan infections, enhancing cybersecurity and response times.
Employee Uses Rogue Devices & Attempts to Steal Passwords
Learn how Darktrace detected rogue devices on the network of a healthcare provider and how Darktrace ensured no users fell victim to the attack.
New Botnet Utilizes IoT Drawing Pads for Attacks
Discover how a new botnet is utilizing IoT drawing pads for reflection attacks. Stay informed on evolving cyber security threats with Darktrace experts.
Investigating the BadRabbit Cyber Threat
This blog post describes the currently-circulating ransomware called BadRabbit and how Darktrace’s machine learning technology detects it.
Stealth Attacks: The ‘Matrix Banker’ Reloaded
Over the last few weeks, Darktrace has confidently identified traces of the resurgence of a stealthy attack targeting Latin American companies. Learn more!
Feodo Banking Trojan Threatens Government Network
Learn how AI detected new Feodo banking Trojan on a government network and the resurgence of the Feodo banking trojan on a government network.
Protecting Manufacturing IP Leaks with Darktrace AI Security
Learn how a cloud server mishap almost exposed sensitive IP at a leading manufacturing firm and how Darktrace helped mitigate this leak.
Detecting Metamorphic Malware with Darktrace's AI Technology
Detect metamorphic malware with Darktrace's AI. Learn how it uncovers self-modifying cyber-attacks and stops threats that evade traditional security measures.
Detecting Insider Threats Without Rules
Read how to detect insider threats without relying on traditional rules. Learn effective strategies to protect your organization's data from Darktrace experts.
Darktrace's Response Against WannaCry Ransomware
Read more about Darktrace's machine-learning technology which can effortlessly identify anomalous behavioral patterns from ransomware like WannaCry.
How Darktrace AI Responded To A Ransomware Attack In Seconds
Learn how to defend against ransomware with Darktrace's live threat scenario. Discover key strategies to protect your organization from cyber attacks.
Employee Access: The Cyber Threat is Already Inside
Disgruntled employees have the potential to do serious damage from within and cannot be ignored. Learn what steps you can take to mitigate risks!
Previous
Next