0% found this document useful (0 votes)
177 views23 pages

Darktrace The Enterprise Immune System

This document summarizes an autonomous cyber defense solution powered by artificial intelligence. It discusses how legacy security is outpaced by evolving threats like insider threats, supply chain attacks, and AI attacks. The solution presented is called the Enterprise Immune System, which uses unsupervised machine learning to learn the normal behavior of every user, device, and network to detect all threat types. It provides 100% network visibility and scalability from 12 users to over 1 million devices. Case studies demonstrate how it autonomously detects and responds to threats across different industries that evaded traditional security tools.

Uploaded by

Wesley Wang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views23 pages

Darktrace The Enterprise Immune System

This document summarizes an autonomous cyber defense solution powered by artificial intelligence. It discusses how legacy security is outpaced by evolving threats like insider threats, supply chain attacks, and AI attacks. The solution presented is called the Enterprise Immune System, which uses unsupervised machine learning to learn the normal behavior of every user, device, and network to detect all threat types. It provides 100% network visibility and scalability from 12 users to over 1 million devices. Case studies demonstrate how it autonomously detects and responds to threats across different industries that evaded traditional security tools.

Uploaded by

Wesley Wang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

The Enterprise Immune System

Autonomous Cyber Defense Powered by AI

<Insert Name>
Cyber Security Account Executive
Company Background

World-leading artificial intelligence


for cyber defense
Founded by mathematicians
in Cambridge
Headquartered in San Francisco
and Cambridge, UK

$1.65 billion valuation


40 global offices
800+ employees
Thousands of Customers Worldwide
Evolving Threats in a New Business Landscape

Outsourced IT, SaaS, cloud, virtual, supply


chain, IoT
Not just data breaches and defaced websites
Insider threat –malicious and non-malicious
‘Trust attacks’ are silent and stealthy
AI attacks are emerging, leading to highly
customized campaigns
Machine on machine attacks

Legacy security is constantly outpaced


The Enterprise Immune System: Proven to Work

Learns ‘self’ in real time


For every user, device, and network, using unsupervised machine
learning

Detects and responds to all threat types


Insider threats, criminal attacks, data exfiltration and manipulation,
IoT hacks and supply chain threats

100% visibility
Visualizes entire network, including traditional and non-traditional
IT, allows both real-time and retrospective investigations

Scalable
From 12 users to over 1 million devices

Deploys on premise & cloud


Defends physical and virtual networks, cloud, ICS, SaaS
Machine Learning is Hard to Get Right

No two networks are alike


On-premise, virtualized, hybrid, cloud, SaaS,

Needs to work without customer configuration or


tuning of models
Needs to support teams with varying security and
math skills
Must deliver value immediately but keep learning
and adapting as it goes
Must have linear scalability
Cannot rely on training sets of data
Technology Architecture
One-hour Installation

Self-configuring appliance
Passive tap into your network
Automatically learns ‘normal’ for every
device, user, and network
Interface accessed via web browser
Results from Day 1
No custom models required
Total Business Coverage
Darktrace Finds Threats That Go Undetected

Thousands of in-progress threats detected, including:

Indiscriminate worms, Trojans, ransomware


Exfiltration of sensitive data by insiders
Hacked IoT devices, including HVAC, video
conferencing, internet-connected fish tanks
Irregular VPN access from remote users & sites
Compromises of industrial control systems
Attacks on physical security, such as biometric
scanners & badge readers
Long-term criminal campaigns and infrastructure
hijacking
Darktrace Proof of Value

4-week trial, no obligation


Appliance deployed in your
environment
Installed in 1 hour
Analysis of what we find and how we
find it
Weekly, custom-made Threat
Intelligence Reports
Joint commitment
Conclusion

Legacy security approaches are no longer


sufficient
Machine learning and AI algorithms are
critical to detect never-seen-before threats
Self-learning – continually adapts
Proven to identify all threat types
100% business coverage including cloud
and ICS
Autonomous response fights back in real
time
Customer Testimonials
“They have a fantastic interface – probably the best ”One of the greatest strengths is easy implementation
interface I’ve seen in my life, I’m not exaggerating.” as opposed to incubating-type technologies.”
CTO, IT solutions CISO, Education

“Darktrace gives you a holistic view of the network in a “It’s catching things none of our other layers are
beautiful GUI. You can see anything that sits on any part of catching. Our SIEM mostly looks at North/South traffic
your network, any endpoint, any subnet.” where as Darktrace really digs into East/West traffic.”
CIO, Non-profit IT & Operations, Public company

“The team was fabulous. Having put it on our network and “It’s constantly learning. My SIEM only finds what you’re
configured took less than a day.” smart enough to tell them to alert on”
CIO, Non-profit CISO, Payments

”My SOC manager thinks Antigena is amazing. ”Cisco IDS had a lot of noise, they weren’t looking at the
Detection remediation being automated is exciting. reports because they were useless. With Darktrace we
Right now Darktrace is just tipping you off.” can prioritize and I get 10 real alerts instead of 1000.”
CISO, Payments CISO, Financial Services

“Another reason we chose Darktrace over LightCyber was ”The value is that it gives us a different perspective. For
because the installation took hours instead of days or the nominal amount of money I’m paying– it’s paying for
weeks” itself.”
CTO, IT solutions CISO, Payments
Thank you
Appendix
Enterprise Immune System Technology Platform
The Machine Fights Back: Autonomous Response

Today’s threats are fast and automated


Security teams struggling to keep up
‘Digital antibody’ generates autonomous
response, powered by AI
Targeted, measured actions
Buys time for humans to catch up
Without disrupting day-to-day business

“Antigena fights the most important battles for us”


Michael Sherwood, CIO, City of Las Vegas
Case Study: Compromised Connected Fish Tank

Industry: Gaming and


Entertainment
Fish tank in casino
configured to use
individual VPN
Anomalous transfer of
10GB to device in
Finland
Attack evaded casino’s
traditional security tools
Major case of data
exfiltration avoided
Case Study: Ransomware

Industry: Financial
Services
Employee logged into
personal email
Inadvertently
downloaded stealthy,
malicious ransomware
via a phishing
campaign
Rare domain and
download identified as
anomalous
Threat neutralized in
just 33 seconds
Case Study: Compromise of Biometric Scanner

Industry: Manufacturing
Attacker successfully
exploited known
software vulnerabilities
in fingerprint scanner
Able to control
information sent to and
from the fingerprint
scanner
Went unnoticed by
traditional anti-malware
solutions
If undetected,
malicious actors would
have gained access to
physical machinery
Case Study: Video Conferencing Camera Hack

Industry: Retail
Video conferencing
camera was transmitting
data outside the network
Camera had been
compromised by a
remote attacker
Attacker was aiming to
either:
Steal corporate
information
Take remote control of
the device to launch a
DDoS attack on
another network

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy