Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
Thought Leadership
The cyber landscape is always changing. Stay on top of it with the latest insights from Darktrace experts.
Latest Blog Posts
Darktrace Identifies APT35 in Pre-Infected State
Learn how Darktrace identified APT35 (Charming Kitten) in a pre-infected environment. Gain insights into the detection and mitigation of this threat.
Uncovering a Cryptocurrency Farm | Crypto-Mining Malware
Uncover the secrets of a cryptocurrency farm hidden in a warehouse. Learn about the rise of crypto-mining and its impact on the global cyber-threat landscape.
Why Most Ransomware Attacks Occur "After Hours"
Cyber-criminals target weekends and holidays to strike while employees are away. Discover how defensive AI can protect your business 24/7.
Detecting Vendor Email Compromise in Supply Chain Attacks
Learn how Antigena Email stopped a supply chain attack by identifying a behavioral shift in the emails, while still allowing legitimate traffic through.
AI Neutralized Hafnium-Inspired Cyber-Attacks
Learn from this real-life scenario where Darktrace detected a ProxyLogon vulnerability and took action to protect Exchange servers. Read more here.
Botnet and Remote Desktop Protocol Attacks
Understand the connection between botnet malware and RDP attacks, and how to safeguard your network from potential threats.
How VPC Traffic Mirroring Boosts Darktrace Security
Find out how Amazon VPC Traffic Mirroring enhances Darktrace's cloud security. Learn about its impact on advanced threat detection and management.
How AI Secures Cradlepoint's SaaS Environments
Explore how Darktrace's AI-driven technology fortifies Cradlepoint's SaaS environments, safeguarding against evolving cyber threats.
LockBit Ransomware Analysis: Compromised Credentials
Darktrace examines how a LockBit ransomware attack that took place over just four hours was caused by one compromised credential. Read more here.
Compromised 2FA: Preventing Microsoft Account Takeovers
Discover how Darktrace's Microsoft 365 connector detected and investigated a 2FA-compromised Microsoft account takeover. Learn these preventative measures!
Detecting IoT Threats in Control Systems
Discover how Darktrace uncovers pre-existing threats in Industrial IoT systems. Learn about advanced detection techniques in industrial control systems.
Antigena Email Version 5: The Future of Email Protection
Version 5 of Antigena Email enhances security operations with AI-powered threat detection and intuitive reporting for busy security teams.
Explore AI Email Security Approaches with Darktrace
Stay informed on the latest AI approaches to email security. Explore Darktrace's comparisons to find the best solution for your cybersecurity needs!
AI-Powered Cloud Security: Darktrace & Google
Discover how Darktrace uses AI and Google Packet Mirroring to enhance cloud security. Learn about their innovative immune system approach.
Darktrace Vers. 5: AI Transforming Enterprise Security
Darktrace's Immune System Version 5 revolutionizes cybersecurity with AI, cloud service coverage, and seamless integrations.
Darktrace Insights On SolarWinds Hack
Learn how Darktrace analyzed the SolarWinds hack without signatures. Understand the techniques used to identify and mitigate this major cyber threat.
How McLaren Racing Counters Advanced Email Threats
Learn how Darktrace helps McLaren Racing counter advanced email threats, ensuring robust cybersecurity for their operations.
How AI Stopped a WastedLocker Ransomware Intrusion & Fast
Stop WastedLocker ransomware in its tracks with Darktrace AI technology. Learn about how AI detected a recent attack using 'Living off the Land' techniques.
ZeroLogon Vulnerability Identified & Stopped
Learn how the ZeroLogon exploit was detected within 24 hours of the vulnerability notice and its implications on cybersecurity practices.
Darktrace Cyber Analyst Investigates Sodinokibi Ransomware
Darktrace’s Cyber AI Analyst uncovers the intricate details of a Sodinokibi ransomware attack on a retail organization. Dive into this real-time incident.
Previous
Next