Darktrace named a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
製品
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
包括的なリスク管理
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
すべてのアラートを人間のように調査します AIのスピードと規模のアナリスト
Darktrace サービス
グローバルSOCチームによる24時間365日の専門家サポートとインシデント管理により、セキュリティへの投資を最大限に活用できます。
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
Solutions
Ransomware
Stop novel threats first time
Account takeover
Insider threat
Phishing
Supply chain attack
Business email compromise
APT
Data loss
/ NETWORK
Proactive protection
About us
Contact
AI Research Centre
リソース
顧客
ブログ
[イベント]
SOC 内部
ザ・インフェレンス
用語集
すべてのリソース
ホワイトペーパー
2024年半期脅威レポート
Company
Careers
Leadership
News
Federal
Investors
Academy
Legal
SDR Academy
About us
Contact
パートナー
概要
パートナーポータル
テクノロジーパートナー
インテグレーション
注目のパートナー
マイクロソフト
AWS
製品
概要
/NETWORK
プロアクティブな保護
/EMAIL
クラウドネイティブ AI セキュリティ
/CLOUD
完全なクラウドカバレッジ
/OT
重要なシステムを守る
/IDENTITY
360°のユーザー保護
/ENDPOINT
すべてのデバイスのカバレッジ
/プロアクティブ・エクスポージャー・マネジメント
/アタックサーフェス管理
/インシデント対応とリカバリ
Cyber AI Analyst
サービス
Solutions
Use cases
Discover how Darktrace defends the full range of attack vectors
Ransomware
Stop novel threats first time
Phishing
Stop attacks 13 days earlier
Account Takeover
Protect your users
Supply Chain Attack
Defend every connection
APTs
Stop the most sophisticated attacks
Data Loss
Protect your data
Insider Threat
Spot risky behavior
Business Email Compromise
Protection beyond the inbox
Customer stories
Security for organizations of all sizes
AI Research Centre
リソース
すべてのリソース
顧客
ブログ
[イベント]
ザ・インフェレンス
SOC 内部
用語集
会社
私たちについて
連絡
採用情報
リーダーシップ
ニュース
連邦
学校
SDR Academy
リーガル
パートナー
概要
パートナーポータル
テクノロジーパートナー
パートナーになる
インテグレーション
マイクロソフト
AWS
マクラーレン
デモを申し込む
デモを申し込む
Get a demo
Darktrace / Cloud blog
Cloud insights from the experts
Explore real-world threats neutralized by Darktrace / Cloud, plus industry insights and advice for protecting your cloud environment.
Latest Blog Posts
Blog
Closing the Cloud Forensics and Incident Response Skills Gap
Learn how Darktrace helps bridge the DFIR skills gap with user-friendly, cloud-native forensic tools that streamline investigations across complex, multi-cloud environments.
Blog
Forensics or Fauxrensics: Five Core Capabilities for Cloud Forensics and Incident Response
This blog covers the five core capabilities that security teams should consider when evaluating a cloud forensics and incident response solution.
Blog
Combatting the Top Three Sources of Risk in the Cloud
The biggest sources of risk in the cloud are misconfigurations, IAM failures, and infrastructure that is unprepared to handle cross-domain threats. Learn how AI-powered cloud security tools can help security teams identify and mitigate these risks.
Blog
Cloud Security Evolution: Why Security Teams are Taking the Lead
While many internal teams contribute to general cloud hygiene, the security team has increasingly taken the lead on cloud security. Learn how AI-powered cloud detection and response tools can help these teams with new responsibilities.
Blog
Fusing Vulnerability and Threat Data: Enhancing the Depth of Attack Analysis
This blog highlights how vulnerability data, collected using Cado's new vulnerability discovery feature, can be fused with threat data to help deepen the understanding of an attack, as well as guide remediation efforts.
Blog
CNAPP Alone Isn’t Enough: Focusing on CDR for Real-Time Cross Domain Protection
This blog dives into the strengths and limitations of CNAPP, explaining how a CDR solution can enhance cloud security to identify and mitigate cross-domain threats.
Blog
Agent vs. Agentless Cloud Security: Why Deployment Methods Matter
Cloud security solutions can be deployed with agentless or agent-based approaches or use a combination of methods. Organizations must weigh which method applies best to the assets and data the tool will protect.
Blog
Protecting Your Hybrid Cloud: The Future of Cloud Security in 2025 and Beyond
In the coming years, cloud security will not only need to adapt to increasingly complex environments as ecosystems become more distributed, but also to rapidly evolving threats like supply chain attacks, advanced misconfiguration exploits, and credential theft. AI-powered cloud security tools can help security teams keep up.
Blog
Cloud Security: Addressing Common CISO Challenges with Advanced Solutions
This blog highlights how Darktrace / CLOUD leverages self-learning AI to tackle critical cloud security challenges—such as misconfigurations, hybrid environment complexity, securing productivity suites, and agent fatigue—by providing unified visibility, intelligent monitoring, and real-time threat response to empower organizations with proactive protection.
Blog
Introducing Real-Time Multi-Cloud Detection & Response Powered by AI
This blog announces the general availability of Microsoft Azure support for Darktrace / CLOUD, enabling real-time cloud detection and response across dynamic multi-cloud environments. Read more to discover how Darktrace is pioneering AI-led real-time cloud detection and response.
Blog
CDR is just NDR for the Cloud... Right?
As cloud adoption surges, the need for scalable, cloud-native security is paramount. This blog explores whether Cloud Detection and Response (CDR) is merely Network Detection and Response (NDR) tailored for the cloud, highlighting the unique challenges and essential solutions SOC teams require to secure dynamic cloud environments effectively.
Blog
Exploring the Benefits and Risks of Third-Party Data Solutions
Many companies use third-party data management for efficiency, global access, collaboration, and reliability. Find out what those organizations need to know about addressing the security risks and best practices associated with third-party data management.
Blog
The Rise of Alternative Access in Cloud Attacks
Understand the evolution of cloud-based attacks and the increasing use of alternative methods for initial access in cyber threats.
Blog
Enhancing Cloud Security with Business Context
Discover cloud migration insights, security challenges, best practices, and Darktrace's unique approach to enhancing cloud visibility and risk management.
Blog
Cloud Migration Strategies, Services and Risks
Explore strategies, services, and risks associated with mastering cloud migration. Learn more here about hybrid cloud model, benefits, and migration phases.
Blog
Understanding Cloud Security with Darktrace
Darktrace's autonomous response successfully thwarted a Trickbot intrusion. See how AI played a crucial role in this defense.
Blog
Darktrace Enhances Security with Amazon Lake Integration
Darktrace integrates AI with Amazon Security Lake for enhanced security investigations & threat detection. Learn how this collaboration benefits security teams.
Blog
Modern Extortion: Detecting Data Theft From the Cloud
Darktrace highlights a handful of data theft incidents on shared cloud platforms, showing that cloud computing can be a vulnerable place for modern extortion.
能力
建築意識
クラウドネイティブの検出と対応
Cloud 保護とコンプライアンス
ブログ
顧客事例
インテグレーション
デモを申し込む