Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
Thought Leadership
The cyber landscape is always changing. Stay on top of it with the latest insights from Darktrace experts.
Latest Blog Posts
Uncovering the Sysrv-Hello Crypto-Jacking Bonet
Discover the cyber kill chain of a Sysrv-hello botnet infection in France and gain insights into the latest TTPs of the botnet in March and April 2022.
Cyber Security Insights from Zak Brown at McLaren
Learn from two leaders in their fields about cyber risks in Formula 1 and McLaren's unique approach. Explore cyber risks and strategies that set McLaren apart.
How Darktrace AI Blocked Emotet Malspam
Explore Darktrace AI's success in combating Emotet malspam, enhancing security and minimizing risks with cutting-edge artificial intelligence.
How AI Keeps Priefert Productive and Secure
Find out how AI empowers Priefert Manufacturing to stay productive and secure, with insights from Darktrace.
Email Compromise To Mass Phishing Campaign
Read Darktrace's in-depth analysis on the shift from business email compromise to mass phishing campaigns. Gain the knowledge to safeguard your business.
Efficient Incident Reporting: Darktrace AI Analyst
Discover how Darktrace's Cyber AI Analyst accelerates incident reporting to the US federal government, enhancing cybersecurity response times.
How Darktrace Antigena Thwarted Cobalt Strike Attack
Learn how Darktrace's Antigena technology intercepted and delayed a Cobalt Strike intrusion. Discover more cybersecurity news and analyses on Darktrace's blog.
Explore Internet-Facing System Vulnerabilities
Read about 2021's top four incidents and how Darktrace's advanced threat detection technology identified and mitigated vulnerabilities. Learn more.
Analyzing Log4j Vulnerability in Crypto Mining Attack
Discover how Darktrace detected a campaign-like pattern that used the Log4j vulnerability for crypto-mining across multiple customers.
NJ State Bar Moves Towards Business-Wide Autonomous Security
See how the New Jersey State Bar Association adopted Darktrace’s Autonomous Response technology across and stopped a sophisticated SaaS attack. Read more.
Protecting Stadiums & Events with AI
Discover how Self-Learning AI tackles event security challenges like the 'access paradox' and IT/OT convergence with speed and precision.
Cybersprint Attack Management Joins Darktrace
Learn how the addition of Cybersprint improves our attack surface management solutions, providing better visibility and security.
REvil's Ransomware Business Model & Staying Ahead with AI
Learn more about REvil by exploring a REvil ransomware campaign discovered by Darktrace's AI. Find out how the recent arrests impact cyber security.
The Impact of Conti Ransomware on OT Systems
Learn how ransomware can spread throughout converged IT/OT environments, and how Self-Learning AI empowers organizations to contain these threats.
Ransomware Groups Aim for Maximum Disruption
Discover key ransomware trends and effective strategies to safeguard your organization. Marcus Fowler provides insights on combating cyber threats!
Why AAA Washington Chose Autonomous Response
Learn how AAA Washington improved cybersecurity with an autonomous response. Explore the reasons and benefits behind this strategic decision.
Brand DNA: The Key to a Strong Security Posture
Learn how AI can enhance security measures by detecting malicious assets, and safeguarding against vulnerabilities. Stay secure with advanced technology.
Software Supply Chain Attacks Become a Given
Explore key insights on supply chain cyber attacks. Learn why IT and communication sectors are targeted and how to protect your business. Learn more!
9 Stages of Ransomware & How AI Responds
Discover the 9 stages of ransomware attacks and how AI responds at each stage. Learn how you can protect your business from cyber threats.
Log4Shell Vulnerability Detection & Response With Darktrace
Learn how Darktrace's AI detects and responds to Log4Shell attacks. Explore real-world examples and see how Darktrace identified and mitigated cyber threats.
Previous
Next