プラットフォーム
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的リスク管理
/IDENTITY
360°ユーザーを守る
/ENDPOINT
あらゆるデバイスに対するカバレッジ
/ Proactive Exposure Management
/ Attack Surface Management
/ Forensic Acquisition & Investigation
/ Incident Readiness & Recovery
Cyber AI Analyst
すべてのアラートをAIのスピードとスケールで人間のアナリストのように調査
Darktrace Services
ダークトレースのグローバルSOCが提供する、エキスパートによる24時間、週7日のサポートおよびインシデント管理により、セキュリティへの投資を最大限に生かすことができます
ユースケース
Darktrace がいかにしてあらゆる攻撃ベクトルを守るかをご覧ください
Ransomware
新しい脅威を初めて阻止
Phishing
攻撃を 13 日前に阻止
アカウント乗っ取り
ユーザーを保護しましょう
サプライチェーン攻撃
すべての接続を保護
APTs
最も巧妙な攻撃を阻止
データロス
データを保護する
インサイダー脅威
危険な行動を特定
ビジネスEmail 詐欺
受信箱を超えた保護
顧客事例
あらゆる規模の組織向けのセキュリティ
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
ダークトレースのAI
リソース
導入企業
ブログ
イベント
Inside the SOC
The Inference
用語集
すべてのリソース
ホワイトペーパー
多層的AI 装備:サイバーセキュリティを構成するツールを理解する
企業情報
キャリア
経営陣
ニュース
米国連邦政府向け
IR情報
Darktraceアカデミー
法務
SDRアカデミー
ダークトレースについて
お問い合わせ
パートナー
概要
テクノロジーパートナー
インテグレーション
パートナーシップ紹介
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace Blog
Email
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Rhoncus aenean vel elit scelerisque mauris pellentesque. Sed cras ornare arcu dui vivamus arcu.
Latest Blog Posts
Forensic Victory: Catching the Ransomware EDR Couldn't See
This blog details a simulation of a ransomware attack that bypassed EDR, simulated via a ClickFix social engineering technique. The attack used an obfuscated HTML and custom C++ binary to encrypt files and establish a reverse shell. Cado's forensic platform then demonstrated how to trace the attack chain, highlighting the need for robust DFIR beyond EDR.
NIS2 Compliance: Interpreting 'State-of-the-Art' for Organisations
This blog explores key technical factors that define state-of-the-art cybersecurity. Drawing on expertise from our business, academia, and national security standards, outlining five essential criteria.
Defending Against Living-off-the-Land Attacks: Anomaly Detection in Action
Discover how Darktrace detected and responded to cyberattacks using Living-off-the-Land (LOTL) tactics to exploit trusted services and tools on customer networks.
From Hype to Reality: How AI is Transforming Cybersecurity Practices
AI hype is everywhere, but not many vendors are getting specific. Darktrace’s multi-layered AI combines various machine learning techniques for behavioral analytics, real-time threat detection, investigation, and autonomous response.
RansomHub Revisited: New Front-Runner in the Ransomware-as-a-Service Marketplace
Discover how RansomHub is rising in the ransomware landscape, using tools like Atera and Splashtop, reconnaissance tactics, and double extortion techniques.
Reimagining Your SOC: Unlocking a Proactive State of Security
Reimagining your SOC Part 3/3: This blog explores the challenges security professionals face in managing cyber risk, evaluates current market solutions, and outlines strategies for building a proactive security posture.
CNAPP Alone Isn’t Enough: Focusing on CDR for Real-Time Cross Domain Protection
This blog dives into the strengths and limitations of CNAPP, explaining how a CDR solution can enhance cloud security to identify and mitigate cross-domain threats.
Reimagining Your SOC: Overcoming Alert Fatigue with AI-Led Investigations
Reimagining your SOC Part 2/3: This blog explores how the challenges facing the modern SOC can be addressed by transforming the investigation process, unlocking efficiency and scalability in SOC operations with AI.
Bytesize Security: Insider Threats in Google Workspace
Insider threats pose significant risks due to access to internal systems. Darktrace detected a former employee attempting to steal data from the customer’s Google Workspace platform. Learn about this threat here.
Reimagining Your SOC: How to Shift Away From Reactive Network Security
Reimagining your SOC Part 1/3: This blog shows how security teams can move to autonomous detection and investigation of novel threats, reducing alert fatigue, and enabling tailored, real-time threat response.
RansomHub Ransomware: Darktrace’s Investigation of the Newest Tool in ShadowSyndicate's Arsenal
Between September and October 2024, Darktrace investigated several customer networks compromised by RansomHub attacks. Further analysis revealed a connection to the ShadowSyndicate threat group. Read on to discover how these entities are linked and the tactics, techniques, and procedures employed in these attacks.
Why AI-powered Email Protection Became Essential for this Global Financial Services Leader
Hear the cybersecurity transformation story of this leading money transmitter, who facilitates more than $9 billion in remittances via thousands of agent locations across the US serving more than two million active customers.
Agent vs. Agentless Cloud Security: Why Deployment Methods Matter
Cloud security solutions can be deployed with agentless or agent-based approaches or use a combination of methods. Organizations must weigh which method applies best to the assets and data the tool will protect.
Detecting and Mitigating Adversary-in-the-Middle Phishing Attacks with Darktrace Services
Threat actors often use advanced phishing toolkits and Adversary-in-the-Middle (AitM) attacks in Business Email Compromise (BEC) campaigns, Discover how Darktrace detected and mitigated a sophisticated attack leveraging Dropbox, highlighting the importance of robust cybersecurity measures.
Defending AITM Phishing and Mamba Attacks
Analyze the challenges posed by AITM phishing threats and Mamba 2FA, and discover how to safeguard your systems effectively.
Darktrace Recognized in the Gartner® Magic Quadrant™ for Email Security Platforms
Darktrace is proud to announce we’ve been recognized as a Challenger in our first appearance in the Gartner® Magic Quadrant™ for Email Security. In the report you’ll get key insights into the evolving email threat landscape, the requirements of a modern email security platform and the role of AI in advanced threat detection.
Cleo File Transfer Vulnerability: Patch Pitfalls and Darktrace’s Detection of Post-Exploitation Activities
File transfer applications are prime targets for ransomware groups due to their critical role in business operations. Recent vulnerabilities in Cleo's MFT software, namely CVE-2024-50623 and CVE-2024-55956, highlight ongoing risks. Read more about the Darktrace Threat Research team’s investigation into these vulnerabilities.
Breaking Down Nation State Attacks on Supply Chains
Explore how nation-state supply chain attacks like 3CX, NotPetya, and SolarWinds exploited trusted providers to cause global disruption, highlighting the urgent need for robust security measures.
Company Shuts Down Cyber-attacks with “Flawless” Detection and Response from Darktrace
This blog explores how Darktrace shut down a major third-party cyber-attack, preventing the deployment of ransomware. Read more to discover how the security team now spends 80-90% of their time working on more strategic projects vs. manual, low-level tasks.
Darktrace is Positioned as a Leader in the IDC MarketScape: Worldwide Network Detection and Response 2024 Vendor Assessment
Darktrace is recognized as a Leader in the IDC MarketScape. Read this blog to find out more about Darktrace's leadership in the market and our pioneering leadership in AI over the past decade, alongside a variety of other unique differentiators and innovations in the NDR industry.
Previous
Next