Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Plateforme
Produits
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Gestion complète des risques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion de la surface d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Enquête sur chaque alerte comme un humain analyste, à la vitesse et à l'échelle de l'IA
Services Darktrace
Optimisez vos investissements en matière de sécurité grâce à l'assistance d'experts 24h/24 et 7j/7 et à la gestion des incidents assurée par notre équipe SOC mondiale.
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
Our AI
Ressources
Clientèle
Blogue
Évènements
À l'intérieur du SOC
L'inférence
Glossaire
Toutes les ressources
Livre blanc
Rapport semestriel sur les menaces 2024
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Intégrations
Partenaires en vedette
Microsoft
AWS
Produits
Vue d'ensemble
/NETWORK
Protection proactive
/E-MAIL
Sécurité de l'IA native du cloud
/CLOUD
Couverture nuageuse complète
/OT
Défendez les systèmes critiques
/IDENTITY
Protection des utilisateurs à 360°
/ENDPOINT
Une couverture pour tous les appareils
/Gestion proactive de l'exposition
/Gestion des surfaces d'attaque
/Préparation aux incidents et reprise
Cyber AI Analyst
Des services
Centre de Recherche IA
Ressources
Toutes les ressources
Clientèle
Blogue
Évènements
L'inférence
À l'intérieur du SOC
Glossaire
L'entreprise
À propos de nous
Contacter
CARRIÈRES
Leadership
Actualités
Fédéral
Académie
SDR Academy
Légal
PARTENAIRES
Vue d'ensemble
Portail des partenaires
Partenaires technologiques
Devenez partenaire
Intégrations
Microsoft
AWS
McLaren
OBTENIR UNE DÉMO
OBTENIR UNE DÉMO
Get a demo
Darktrace Blog
Thought Leadership
The cyber landscape is always changing. Stay on top of it with the latest insights from Darktrace experts.
Latest Blog Posts
US Distributor Hit by LeChiffre Ransomware
Discover how LeChiffre ransomware targeted a US distributor and the measures taken to mitigate the attack, as reported by Darktrace.
How Darktrace Email Protects Against IT Impersonation
Protect your organization from email impersonation attacks. Learn how Darktrace's AI technology can detect phishing threats in real-time on our blog.
Resurgence of Ursnif Banking Trojan "May's Most Wanted Malware"
The Ursnif banking trojan tries to blend into the network as legitimate Zoom and Webex activity, trying to capture credentials. See how Darktrace stops it!
Industrial Sabotage Threats Uncovered
Protect your industrial systems from cyber threats with Darktrace's OT Threat Finder and learn how to prevent industrial sabotage.
Email Security: Darktrace's Approach to Safe New Contacts
Effective email security should provide full protection and keep business running smoothly. Learn about the security approach that Darktrace Email uses!
Uncovering Microsoft Teams Impersonation
Active daily users on Microsoft Teams has increased exponentially, and cyber-criminals are taking advantage of this shift in our working habits.
Darktrace AI Email Finds Chase Fraud Alert
Stop Chase fraud alerts! Learn how Darktrace AI email security caught a malicious email impersonating Chase bank, preventing credential theft in real time.
Why CCPA Compliance Matters & How Cyber AI Helps
Learn why CCPA is important and how Cyber AI can assist, plus discover insights on data privacy and protection.
Cryptomining Campaigns & Technical Analysis of Vulnerability
Crypto-mining campaigns stood no chance against Darktrace's AI as it identified the threat in real time. Put your trust in Darktrace's assistance!
How Darktrace Stopped Impersonation Attack on Board Member
Prevent impersonation attacks with Darktrace. Learn how AI identified & neutralized phishing attempts targeting high-profile individuals in a Gmail environment.
Academic Institution Loses $60k to Email Attack
An academic institution turned to Darktrace after an email attack slipped through their existing security stack and cost them over $60,000.
Ekans Ransomware: Insights on OT Cyber Attacks
Uncover the impacts of the Ekans ransomware attack on operational technology and what organizations can do to enhance their cybersecurity posture.
QuickBooks Impersonation Phishing Exposed
Protect your business from QuickBooks impersonation phishing attacks with Darktrace Email and learn how to defend against cyber threats.
The Advanced Email Attacks of Hacker Group Dark Basin
Discover an overview of the different techniques used by Dark Basin, and how AI can respond to email impersonation attacks that other tools miss.
How Darktrace AI Identified Microsoft 365 Breaches
We cover two real cases on how Darktrace stopped Microsoft 365 account takeovers by correlating insights across SaaS applications & email activity.
Securing AWS Cloud Environments
Discover how self-learning AI in AWS environments detects and beats threats early with enterprise-wide analysis.
Understanding a SaaS Attack and How AI Can Investigate
The Cyber AI Platform recently detected and investigated two incidents of SaaS account takeover in real-time. Learn about the importance of cyber security here!
The Ongoing Threat of Dharma Ransomware Attacks
Stay informed about the dangers of Dharma ransomware and its methods of attack, ensuring your defenses are strong against potential intrusions.
How Email Attackers Are Buying Domain Names to Get Inboxes
Explore how mass domain purchasing allows cyber-criminals to stay ahead of legacy email tools — and how cyber AI stops the threats that slip through.
How Cyber-Criminals Leverage AI in Attacks
Cyber attacks are relentless and ever-evolving. Learn how cyber-criminals are using AI to augment their attacks at every stage of the kill chain.
Previous
Next