Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
製品
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的なリスク管理
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
すべてのアラートを人間のように調査します AIのスピードと規模のアナリスト
Darktrace サービス
グローバルSOCチームによる24時間365日の専門家サポートとインシデント管理により、セキュリティへの投資を最大限に活用できます。
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
AI Research Centre
リソース
顧客
ブログ
[イベント]
SOC 内部
ザ・インフェレンス
用語集
すべてのリソース
ホワイトペーパー
2024年半期脅威レポート
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
パートナー
概要
パートナーポータル
テクノロジーパートナー
インテグレーション
注目のパートナー
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace Blog
RESPOND
Hear from Darktrace in-house experts and customers on real-world applications of Autonomous Response that can take targeted action to contain cyber-threats.
Latest Blog Posts
FedRAMP High-compliant email security protects federal agencies from nation-state attacks
Not only has Darktrace Federal achieved its FedRAMP High Authority to Operate, one of the few cybersecurity vendors to do this, but we have also released Darktrace Commercial Government Cloud High/Email, a FedRAMP High-compliant email security solution for customers using Microsoft Government Community Cloud High.
Cloud Security Evolution: Why Security Teams are Taking the Lead
While many internal teams contribute to general cloud hygiene, the security team has increasingly taken the lead on cloud security. Learn how AI-powered cloud detection and response tools can help these teams with new responsibilities.
Darktrace Named as Market Leader in the 2025 Omdia Market Radar for OT Cybersecurity Platforms
Darktrace / OT is recognized as a Market Leader in the Omdia Market Radar. Read this blog to find out more about Darktrace's leadership in the market and a variety of other unique differentiators and innovations in the OT security industry.
Fusing Vulnerability and Threat Data: Enhancing the Depth of Attack Analysis
This blog highlights how vulnerability data, collected using Cado's new vulnerability discovery feature, can be fused with threat data to help deepen the understanding of an attack, as well as guide remediation efforts.
Darktrace Recognized as the Only Visionary in the 2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
Darktrace is proud to announce we’ve been the only Visionary in the inaugural Gartner® Magic Quadrant™ for Cyber-Physical Systems (CPS) Protection Platforms. Read the blog to find out why!
Cyberhaven Supply Chain Attack: Exploiting Browser Extensions
In late 2024, Darktrace detected unusual activity linked to Cyberhaven's Chrome browser extension. Read more about Darktrace’s investigation here.
Global Technology Provider Transforms Email Threat Detection with Darktrace
To strengthen its distributed and complex operations, this global technology leader implemented Darktrace / EMAIL to monitor, detect, and mitigate potential email threats. Read the blog to discover their results.
Darktrace's Detection of State-Linked ShadowPad Malware
In 2024, Darktrace identified a cluster of intrusions involving the state-linked malware, ShadowPad. This blog will detail ShadowPad and the associated activities detected by Darktrace.
Fighting the Real Enemy: The Importance of Responsible Vulnerability Disclosure Between Email Security Vendors
This blog explores an exploitation capability observed by Darktrace in another email security vendor’s link rewriting and the steps Darktrace took to inform and resolve the issue.
New Threat on the Prowl: Investigating Lynx Ransomware
Lynx ransomware, emerging in 2024, targets finance, architecture, and manufacturing sectors with phishing and double extortion. Read on for Darktrace's findings.
Detecting and Containing Account Takeover with Darktrace
Account takeovers are rising with SaaS adoption. Learn how Darktrace detects deviations in user behavior and autonomously stops threats before they escalate.
Darktrace Releases Annual 2024 Threat Insights
Explore Darktrace's Annual Threat Report 2024 for insights on the latest cyber threats and trends observed throughout the year.
Unifying IT & OT With AI-Led Investigations for Industrial Security
Discover how AI-led investigations unify IT and OT security, reducing alert fatigue and accelerating alert investigation in industrial environments.
Why Darktrace / EMAIL Excels Against APTs
APTs are sophisticated threat actors with the resources to coordinate and achieve long-term objectives. Amidst the skyrocketing numbers of BEC attacks, every organization should be worried about the ability of intruders to infiltrate and exploit. This blog will look at several recent examples of complex email attacks and how Darktrace / EMAIL successfully disarmed and prevented intrusion.
NIS2 Compliance: Interpreting 'State-of-the-Art' for Organisations
This blog explores key technical factors that define state-of-the-art cybersecurity. Drawing on expertise from our business, academia, and national security standards, outlining five essential criteria.
Defending Against Living-off-the-Land Attacks: Anomaly Detection in Action
Discover how Darktrace detected and responded to cyberattacks using Living-off-the-Land (LOTL) tactics to exploit trusted services and tools on customer networks.
From Hype to Reality: How AI is Transforming Cybersecurity Practices
AI hype is everywhere, but not many vendors are getting specific. Darktrace’s multi-layered AI combines various machine learning techniques for behavioral analytics, real-time threat detection, investigation, and autonomous response.
RansomHub Revisited: New Front-Runner in the Ransomware-as-a-Service Marketplace
Discover how RansomHub is rising in the ransomware landscape, using tools like Atera and Splashtop, reconnaissance tactics, and double extortion techniques.
Reimagining Your SOC: Unlocking a Proactive State of Security
Reimagining your SOC Part 3/3: This blog explores the challenges security professionals face in managing cyber risk, evaluates current market solutions, and outlines strategies for building a proactive security posture.
CNAPP Alone Isn’t Enough: Focusing on CDR for Real-Time Cross Domain Protection
This blog dives into the strengths and limitations of CNAPP, explaining how a CDR solution can enhance cloud security to identify and mitigate cross-domain threats.
Previous
Next