Darktrace Resources
Merci ! Votre soumission a été reçue !
Ressources
Gated Video
NIS2 Directive: Implications on Cyber Security and AI
Gated Video
NIS2 Directive: Implications on Cyber Security and AI
Ressources
April 16, 2024
services,managed,detect,respond
4
Fiche technique
Darktrace Services: Managed Detect + Respond (MDR)
4
services,managed,detect,respond
Fiche technique
Darktrace Services: Managed Detect + Respond (MDR)
Ressources
April 9, 2024
Fiche technique
State of AI Cyber Security 2024 Infographic
Fiche technique
State of AI Cyber Security 2024 Infographic
Ressources
December 12, 2023
Gated Video
BSI Lagebericht 2023 Webinar 🇩🇪
Gated Video
BSI Lagebericht 2023 Webinar 🇩🇪
Ressources
February 22, 2024
3
Gated Video
Exploring the Evolving Email Security Landscape
3
Gated Video
Exploring the Evolving Email Security Landscape
Ressources
April 9, 2024
Fiche technique
State of AI Cyber Security 2024 Executive Summary
Fiche technique
State of AI Cyber Security 2024 Executive Summary
Ressources
March 26, 2024
3
Gated Video
Darktrace/Cloud Product Spotlight
3
Gated Video
Darktrace/Cloud Product Spotlight
Ressources
April 9, 2024
2
Livre blanc
State of AI Cyber Security 2024
2
Livre blanc
State of AI Cyber Security 2024
Ressources
April 10, 2024
platform, email, OT, Virtual Innovation Launch
2
Video
Darktrace Virtual Innovation Launch
2
platform, email, OT, Virtual Innovation Launch
Video
Darktrace Virtual Innovation Launch
Ressources
April 9, 2024
platform
2
Fiche technique
Darktrace ActiveAI Security Platform Solution Brief
2
platform
Fiche technique
Darktrace ActiveAI Security Platform Solution Brief
Ressources
April 9, 2024
OT,Darktrace/OT Solution Brief,ICS
3
Fiche technique
Darktrace/OT Solution Brief
3
OT,Darktrace/OT Solution Brief,ICS
Fiche technique
Darktrace/OT Solution Brief
Ressources
April 9, 2024
email
3
Fiche technique
Darktrace/Email Solution Brief
3
email
Fiche technique
Darktrace/Email Solution Brief
Ressources
March 28, 2024
5
Video
Threat Analysis Stories: Detecting Exploitations of the Ivanti Vulnerability
5
Video
Threat Analysis Stories: Detecting Exploitations of the Ivanti Vulnerability
Ressources
center for internet security the 18 critical security controls
Fiche technique
Center for Internet Security: The 18 Critical Security Controls
center for internet security the 18 critical security controls
Fiche technique
Center for Internet Security: The 18 Critical Security Controls
Ressources
March 15, 2024
2023 sec cybersecurity reporting requirements
Fiche technique
2023 SEC Cybersecurity Reporting Requirements
2023 sec cybersecurity reporting requirements
Fiche technique
2023 SEC Cybersecurity Reporting Requirements
Ressources
March 7, 2024
5
Video
Threat Analysis Stories: Defending Against a Gootloader Malware Attack
5
Video
Threat Analysis Stories: Defending Against a Gootloader Malware Attack
Ressources
March 1, 2024
5
Video
Threat Analysis Stories: Catching an Attempted Dropbox Account Takeover
5
Video
Threat Analysis Stories: Catching an Attempted Dropbox Account Takeover
Ressources
March 5, 2024
Reversing the Tide: Preventing the Top 4 Supply Chain Risks in 2024,cloud,network,email,zero trust,zero-trust,prevent,detect,respond,asm,apm,supply,chain,supply chain,supply chain attacks,
4
Livre blanc
Reversing the Tide: Preventing the Top 4 Supply Chain Risks in 2024
4
Reversing the Tide: Preventing the Top 4 Supply Chain Risks in 2024,cloud,network,email,zero trust,zero-trust,prevent,detect,respond,asm,apm,supply,chain,supply chain,supply chain attacks,
Livre blanc
Reversing the Tide: Preventing the Top 4 Supply Chain Risks in 2024
Ressources
March 4, 2024
ot,Darktrace+XageJointSolution
Fiche technique
Darktrace + Xage Joint Solution
ot,Darktrace+XageJointSolution
Fiche technique
Darktrace + Xage Joint Solution
Ressources
February 29, 2024
ciso,stories,cloud,security
Livre blanc
CISO Stories: Cloud Security
ciso,stories,cloud,security
Livre blanc
CISO Stories: Cloud Security
Ressources
February 29, 2024
AI,arms,race,ciso,stories
Livre blanc
CISO Stories: The AI Arms Race
AI,arms,race,ciso,stories
Livre blanc
CISO Stories: The AI Arms Race
Ressources
February 22, 2024
trends,analysis,year,end,threat,report,pattern,intelligence,
5
Livre blanc
End of Year Threat Report
5
trends,analysis,year,end,threat,report,pattern,intelligence,
Livre blanc
End of Year Threat Report
Ressources
February 15, 2024
psychology,confirmation bias,trust,stress
4
Livre blanc
AI with Humans in Mind
4
psychology,confirmation bias,trust,stress
Livre blanc
AI with Humans in Mind
Ressources
February 15, 2024
security practices,implementing ai,LLM,gen ai,generative ai,ai adoption,reliable ai,
4
Livre blanc
Best Security Practices for Implementing AI in the Enterprise
4
security practices,implementing ai,LLM,gen ai,generative ai,ai adoption,reliable ai,
Livre blanc
Best Security Practices for Implementing AI in the Enterprise
Ressources
February 13, 2024
ot,asset,identification,ICS
Fiche technique
Darktrace/OT: Asset Identification for ICS
ot,asset,identification,ICS
Fiche technique
Darktrace/OT: Asset Identification for ICS
Ressources
February 8, 2024
FERC,order,887,support,darktrace,ot
Fiche technique
Darktrace in Support of FERC Order 887
FERC,order,887,support,darktrace,ot
Fiche technique
Darktrace in Support of FERC Order 887
Ressources
February 8, 2024
ot,integrations,digital,systems
Fiche technique
Darktrace/OT: Plugging into your Digital Systems
ot,integrations,digital,systems
Fiche technique
Darktrace/OT: Plugging into your Digital Systems
Ressources
February 5, 2024
compliance,
Livre blanc
7 Steps to Get Ahead with NIS2
compliance,
Livre blanc
7 Steps to Get Ahead with NIS2
customer story
Linc Cymru Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
endpoint,nonprofit
10
customer story
Pittsburgh Cultural Trust Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
data-protection,respond
10
customer story
Confiar Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
data-protection,work-from-home,network
10
customer story
Sefalana Group Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
retail-and-ecommerce,ransomware,respond
10
customer story
Lighthouse Global Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
technology,cloud-transformation,respond
customer story
Breitenfeld Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
network,security-awareness,respond
customer story
LSUA Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
education,network,security-awareness,respond
customer story
National Institute of Aerospace Technology (INTA) Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
detect,data-protection,cloud-transformation
customer story
Saniflo Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
insider-threat,network,manufacturing-and-supply
customer story
Milton Keynes University Hospital Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
healthcare-and-pharma,respond
customer story
McLaren
Il s'agit d'un texte à l'intérieur d'un bloc div.
email,respond,apps,data-protection,phishing,technology
customer story
Drax Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
utilities,network,it-ot-convergence
10
customer story
Terra Case Study
Il s'agit d'un texte à l'intérieur d'un bloc div.
apps,cloud-transformation,respond
10