Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
プラットフォーム
製品
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的なリスク管理
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
すべてのアラートを人間のように調査します AIのスピードと規模のアナリスト
Darktrace サービス
グローバルSOCチームによる24時間365日の専門家サポートとインシデント管理により、セキュリティへの投資を最大限に活用できます。
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
AI Research Centre
リソース
顧客
ブログ
[イベント]
SOC 内部
ザ・インフェレンス
用語集
すべてのリソース
ホワイトペーパー
2024年半期脅威レポート
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
パートナー
概要
パートナーポータル
テクノロジーパートナー
インテグレーション
注目のパートナー
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace Blog
Network
Latest Blog Posts
How Malware Abused Sixt.com and Breitling.com
See how Darktrace neutralized an advanced malware infection on a customer's devices by pinpointing the source of communication and anomalous behavior.
The Rise of Cryptocurrency Attacks & Cyber Defense Solutions
Darktrace can detect cryptocurrency-related attacks with machine learning. Identify nefarious use of resources and protect against Coinhive drive-by mining.
Instant Domain Fluxing Identification with Darktrace AI
In this case study, Darktrace demonstrates how instant domain fluxing identification can stop domain generating algorithms (DGAs) in their tracks.
Implications of TRITON attack on the Future of ICS Security
Explore how the TRITON malware attack reshapes OT cybersecurity strategies and the necessary steps to protect ICS networks effectively. Learn more here!
Darktrace: Investigating Widespread Trojan Infections
Discover how Darktrace expedites the investigation of widespread Trojan infections, enhancing cybersecurity and response times.
Employee Uses Rogue Devices & Attempts to Steal Passwords
Learn how Darktrace detected rogue devices on the network of a healthcare provider and how Darktrace ensured no users fell victim to the attack.
New Botnet Utilizes IoT Drawing Pads for Attacks
Discover how a new botnet is utilizing IoT drawing pads for reflection attacks. Stay informed on evolving cyber security threats with Darktrace experts.
Investigating the BadRabbit Cyber Threat
This blog post describes the currently-circulating ransomware called BadRabbit and how Darktrace’s machine learning technology detects it.
Stealth Attacks: The ‘Matrix Banker’ Reloaded
Over the last few weeks, Darktrace has confidently identified traces of the resurgence of a stealthy attack targeting Latin American companies. Learn more!
Feodo Banking Trojan Threatens Government Network
Learn how AI detected new Feodo banking Trojan on a government network and the resurgence of the Feodo banking trojan on a government network.
Protecting Manufacturing IP Leaks with Darktrace AI Security
Learn how a cloud server mishap almost exposed sensitive IP at a leading manufacturing firm and how Darktrace helped mitigate this leak.
Detecting Metamorphic Malware with Darktrace's AI Technology
Detect metamorphic malware with Darktrace's AI. Learn how it uncovers self-modifying cyber-attacks and stops threats that evade traditional security measures.
Detecting Insider Threats Without Rules
Read how to detect insider threats without relying on traditional rules. Learn effective strategies to protect your organization's data from Darktrace experts.
Darktrace's Response Against WannaCry Ransomware
Read more about Darktrace's machine-learning technology which can effortlessly identify anomalous behavioral patterns from ransomware like WannaCry.
How Darktrace AI Responded To A Ransomware Attack In Seconds
Learn how to defend against ransomware with Darktrace's live threat scenario. Discover key strategies to protect your organization from cyber attacks.
Employee Access: The Cyber Threat is Already Inside
Disgruntled employees have the potential to do serious damage from within and cannot be ignored. Learn what steps you can take to mitigate risks!
Preparing for Cyber Monday Cyber Attacks
Stay informed about Cyber Monday holiday hacking and cyber attacks. Learn how to protect your online security during your Cyber Monday shopping spree.
Unraveling 2016 Election Tampering Controversy
While the 2016 U.S. election was roiled by fears over election tampering, it generated discussion on the intersection of cyber-security & voting.
Six Emerging Cyber-Threats You Didn't See in the News
Darktrace shines the spotlight on six emerging cyber-threats that are getting overlooked, including biometric footprint hacks, new malware strains, and more.
Implications of NIS2 on cybersecurity and AI
Explore the key aspects of the NIS2 Directive, the latest EU cyber security legislation coming into effect in 2024. Learn how it impacts AI and security teams.
Previous
Next