Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
OT
Latest Blog Posts
How Cyber-Attacks Take Down Critical Infrastructure | Darktrace
Cyber-attacks can bypass IT/OT security barriers and threaten your organization's infrastructure. Here's how you can stay protected in today's threat landscape.
Cyber-Crime Terrorism as a National Security Threat Status
Ransomware continues to plague organizations and the US administration has announced this action as a terrorist threat. Learn how to protect your company.
Post-Mortem Analysis of a SQL Server Exploit
Learn about the post-mortem analysis of a SQL Server exploit. Discover key insights and strategies to enhance your cybersecurity defenses.
Crypto-Mining on a DNS Server: Open Port Threats
Darktrace explains how cyber criminals hacked into an exposed Internet-facing server and mined cryptocurrency, showing the capabilities of open port threats.
Stopping Corp-Internal Phishing Attacks with Darktrace
Discover how Darktrace Email stopped a series of multi-language phishing attacks, including an Emotet campaign in Japanese. Learn how Darktrace can help!
Neutralizing QakBot: Darktrace SOC's Success Story
Learn about the strategies used by Darktrace's SOC team to neutralize the QakBot banking trojan and safeguard financial data.
Enhancing Cybersecurity: Attack Surface Management
Explore effective strategies and learn how organizations can enhance Attack Surface Management using artificial intelligence (AI) automation. Read more.
Multi-Account Hijack Detection with AI
Discover the analysis of a sophisticated SaaS-based attack using Microsoft 365 accounts. Learn how attackers launch & maintain their offensive strategies.
When Cyber-Attacks Become Ransomware-as-a-Service
Cyber attacks have occurred since the early days of the Internet. They can be extremely unpredictable. Learn about the dangers and unintended consequences!
Understanding your organization's attack surface and why it poses a risk
As business infrastructures continue to increase in breadth and complexity, it's important to keep ahead of changes within your own organization's attack surface and stay ahead of attackers.
Exploiting Compliance: Ransomware Gang Tactics
Understand the methods ransomware gangs use to exploit security compliance and how Darktrace's AI can mitigate these threats.
How Autonomous Cyber AI Scaled to Protect Arrow McLaren SP
Darktrace's Cyber AI has seamlessly scaled, extended, and adapted to protect Arrow McLaren's Formula 1 and IndyCar teams from machine-speed cyberattacks.
The Dangers of Double Extortion Ransomware Attacks
Learn about the latest trend in ransomware attacks known as double extortion. Discover how Darktrace can help protect your organization from this threat.
How AI Protects Critical Infrastructure From Ransomware
Explore the role of AI in safeguarding critical infrastructure from ransomware, as revealed by Darktrace's latest insights.
Securing Networks After SolarWinds Breach
Uncover strategies to protect your business after SolarWinds with Darktrace. Get actionable insights for enhanced cybersecurity."
Understanding Modern-Day Cyber Attacks
Discover how Darktrace detects and mitigates threats in IoT ecosystems and globalized supply chains that are constantly evolving.
How AI Email Security Benefits Human Defenders
Learn how autonomous AI frees up IT teams and allows them to focus on what matters. Say goodbye to weighed-down teams and lengthy security processes.
Darktrace Identifies APT35 in Pre-Infected State
Learn how Darktrace identified APT35 (Charming Kitten) in a pre-infected environment. Gain insights into the detection and mitigation of this threat.
AI Neutralizes Hafnium Cyber Attack in December 2020
Protect your business from cyber attacks with AI technology. Learn how Darktrace neutralized the Hafnium attack against Exchange servers in December 2020.
Uncovering a Cryptocurrency Farm | Crypto-Mining Malware
Uncover the secrets of a cryptocurrency farm hidden in a warehouse. Learn about the rise of crypto-mining and its impact on the global cyber-threat landscape.
Previous
Next