Darktrace/Network Use Cases
No two attacks are the same
Ransomware
Erstes Eindringen
Darktrace DETECT/Network has revealed well-known exploits such as Log4J, Hafnium, Kaseya, as well as thousands of lesser-known exploits on a regular basis.
Fußfassen und Beaconing einrichten
Wenn ein Angreifer versucht, mit einem Gerät Kontakt aufzunehmen und es fernzusteuern, setzt Darktrace subtile Anomalien zusammen.

Darktrace RESPOND/Network neutralizes this activity by blocking specific connections, enforcing the ‘pattern of life’ or quarantining the device.
Lateral Movement
As an attacker begins to increase their knowledge of the network, perform scans, and escalate their privileges - for instance by obtaining admin credentials, Darktrace DETECT/Network correlates thousands of data points.

RESPOND/Network neutralizes this activity blocking specific connections or enforcing the ‘pattern of life’
Exfiltration von Daten
Whether smash and grab or a low and slow, Darktrace DETECT/Network identifies subtle deviations in activity.

Darktrace RESPOND/Network neutralizes this activity by blocking specific connections, enforcing the ‘pattern of life’ or quarantining the device.
Datenverschlüsselung
Selbst wenn bekannte Tools und Methoden zur Verschlüsselung verwendet werden - egal ob symmetrisch oder asymmetrisch - erkennt Darktrace die Aktivität, ohne statische Regeln oder Signaturen zu verwenden.

Darktrace RESPOND/Network neutralizes this activity by blocking specific connections, enforcing the ‘pattern of life’ or quarantining the device.
Angriff auf die Lieferkette (Schwachstelle in der Software von Drittanbietern)
Darktrace stoppt Bedrohungen, die von der Lieferkette ausgehen, indem sie bei den ersten Anzeichen ungewöhnlicher und bedrohlicher Aktivitäten sofort Maßnahmen ergreift.
Krypto-Mining
Crypto-mining is notoriously difficult to detect, and it can form just one phase of an attacker’s plan to infiltrate a network.
Darktrace shines a light on open ports and internet-facing devices you didn’t know about, and detects the first stages of an attack before crypto-mining can even begin. It also alerts to crypto-mining activity itself, and can be configured to stop the activity autonomously.
Credential Stuffing
Credential stuffing is a type of brute-force attack that relies on automated tools to test large volumes of stolen usernames and passwords across multiple sites until one works.
On the network side, Darktrace can detect instances of credential stuffing through a number of unusual behaviors.
Mergers & Acquisitions
By learning every asset for your organization and its subsidiaries, Darktrace reduces cyber risk during M&A, both in the due dilligence phase and post acquisition.
Unbegrenzte Anzahl von Angriffen
An Unlimited Number of Responses