Darktrace The Enterprise Immune System
Darktrace The Enterprise Immune System
<Insert Name>
Cyber Security Account Executive
Company Background
100% visibility
Visualizes entire network, including traditional and non-traditional
IT, allows both real-time and retrospective investigations
Scalable
From 12 users to over 1 million devices
Self-configuring appliance
Passive tap into your network
Automatically learns ‘normal’ for every
device, user, and network
Interface accessed via web browser
Results from Day 1
No custom models required
Total Business Coverage
Darktrace Finds Threats That Go Undetected
“Darktrace gives you a holistic view of the network in a “It’s catching things none of our other layers are
beautiful GUI. You can see anything that sits on any part of catching. Our SIEM mostly looks at North/South traffic
your network, any endpoint, any subnet.” where as Darktrace really digs into East/West traffic.”
CIO, Non-profit IT & Operations, Public company
“The team was fabulous. Having put it on our network and “It’s constantly learning. My SIEM only finds what you’re
configured took less than a day.” smart enough to tell them to alert on”
CIO, Non-profit CISO, Payments
”My SOC manager thinks Antigena is amazing. ”Cisco IDS had a lot of noise, they weren’t looking at the
Detection remediation being automated is exciting. reports because they were useless. With Darktrace we
Right now Darktrace is just tipping you off.” can prioritize and I get 10 real alerts instead of 1000.”
CISO, Payments CISO, Financial Services
“Another reason we chose Darktrace over LightCyber was ”The value is that it gives us a different perspective. For
because the installation took hours instead of days or the nominal amount of money I’m paying– it’s paying for
weeks” itself.”
CTO, IT solutions CISO, Payments
Thank you
Appendix
Enterprise Immune System Technology Platform
The Machine Fights Back: Autonomous Response
Industry: Financial
Services
Employee logged into
personal email
Inadvertently
downloaded stealthy,
malicious ransomware
via a phishing
campaign
Rare domain and
download identified as
anomalous
Threat neutralized in
just 33 seconds
Case Study: Compromise of Biometric Scanner
Industry: Manufacturing
Attacker successfully
exploited known
software vulnerabilities
in fingerprint scanner
Able to control
information sent to and
from the fingerprint
scanner
Went unnoticed by
traditional anti-malware
solutions
If undetected,
malicious actors would
have gained access to
physical machinery
Case Study: Video Conferencing Camera Hack
Industry: Retail
Video conferencing
camera was transmitting
data outside the network
Camera had been
compromised by a
remote attacker
Attacker was aiming to
either:
Steal corporate
information
Take remote control of
the device to launch a
DDoS attack on
another network