Blog

該当する項目はありません。

従業員とEメール:ユーザー体験を考慮したEメールセキュリティの強化方法

Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
10
Apr 2023
10
Apr 2023
Eメールの実質的な利用者である従業員は、Eメールのセキュリティを設計する際に考慮する必要があります。従業員を意識したセキュリティ対策は、防御力を強化し、生産性を向上させ、データ損失を防ぐことができます。

Eメールのセキュリティを考えるとき、ITチームはこれまで、従業員を完全に排除するか、あるいは排除せず権限を与えすぎて、それを補おうと強制力のない信頼ベースのポリシーを導入するかという選択を迫られてきました。 

しかし、Eメールセキュリティは従業員に頼るべきでないからと言って、従業員を完全に排除する必要はありません。従業員は毎日メールに接しており、その経験や行動からセキュリティに関する貴重な洞察を得ることができ、生産性にも影響を与えることができます。 

AI技術は、このように押し付けがましくないニュアンスで従業員のエンゲージメントをサポートし、Eメールセキュリティの維持だけでなく、その強化も実現します。 

セキュリティ戦略における従業員の参画のバランスの模索

歴史的に、セキュリティソリューションは、従業員の関与に対して「オール・オア・ナッシング」のアプローチを提供してきました。従業員を巻き込んだとしても、彼らは信頼できる存在とは言い切れません。社員が全員、実際の仕事の責任に加えてセキュリティの専門家になることはできませんし、ペースの速い環境ではミスも付きものです。  

セキュリティ意識を高めるための試みは行われていますが、トレーニング用のEメールには文脈や現実味がないため、従業員の理解度が低く、実際には安全なEメールでも報告してしまうことがよくあります。ユーザーが常に受信トレイを整理し、安全なEメールを報告することは、時間の無駄であり、ユーザー自身の生産性だけでなく、セキュリティチームの生産性も低下させます。

その他のかつてから存在する従業員の関与の形も、セキュリティを危険にさらします。例えば、ユーザーはフィードバックを通じて包括的なルールを作成することができ、gmail.comドメインから送られてくるすべてのメールをセーフリスト化するような一般的な問題につながる可能性があります。また、文脈や制限なしにEメールを公開することを従業員が自ら選択し、組織に大きなリスクをもたらす場合もあります。このような行動は、従業員がセキュリティに参加することを意味しますが、これはセキュリティの犠牲の上に成り立っているのです。 

より低いステータスの従業員の関与でも、効果がないことが判明することがあります。例えば、社外の連絡先にEメールを送る際に過剰な警告を出すと、バナー疲れにつながります。従業員が毎回同じ警告メッセージやアラートをメッセージの先頭に表示すると、すぐに慣れてしまい、最終的には免疫ができてしまうのが人間の性です。

一方、従業員がセキュリティから完全に排除されている場合、実際のユーザーに応じてセキュリティを微調整し、Eメールセキュリティソリューションがどの程度機能しているかをフィードバックする機会が失われてしまいます。 

そのため、従来のEメールセキュリティでは、従業員を含むか含まないかのどちらの選択肢も、従業員を効果的に活用できないことが判明しています。最高のEメールセキュリティの実践は、この両極端の間でバランスを取り、日常業務を中断することなくセキュリティを維持する、より微妙なやりとりを可能にするものです。これは、セキュリティを損なうのではなく、セキュリティを高めるために、各従業員に特化したやり取りを調整するAIで実現できます。 

セキュリティ啓発教育を充実させながら誤報を減らす 

人間とAIによるEメールセキュリティは、連携することで同時にレベルアップすることができます。AIが社員に情報を提供し、社員がAIに情報を提供することで、社員とAIのフィードバックループが実現します。  

AIは、すべてのEメールユーザーの「正常な」行動を理解することで、Eメールの異常で危険な構成要素を特定し、リンクの書き換え、添付ファイルのフラット化、迷惑メールへの移行など、Eメールの性質に基づいた的確なアクションを行い、それらを無害化できます。AIはさらに一歩進んで、なぜ特定の行動をとったのかを専門的でない平易な言葉で説明することができ、ユーザーを教育することができます。ポイントインタイムでシミュレーションされたフィッシングメールキャンペーンとは対照的に、ユーザーがEメールに疑問を抱いた瞬間に、AIが組織を取り巻く文脈の中で、リアルタイムに分析を共有できることを意味します。 

従業員とAIのフィードバックループは、従業員が追加のエンリッチメントデータとして機能するように教育します。脅威の検知をユーザーに依存しない一方で、ユーザーに情報を提供し、教えるための適切なレベルを決定します。 

一方、AIはユーザーの受信トレイでの行動を学習し、それを徐々に意思決定に反映させていきます。一人の従業員があるEメールを安全だと判断しても、ビジネス全体がそれを承認することはありません。しかし、時間をかけてパターンを観察し、自律的な意思決定を強化することができます。  

Figure 1: The employee-AI feedback loop increases employee understanding without putting security at risk.

従業員とAIのフィードバックループは、従業員がEメールセキュリティに関与することで得られる潜在的なメリットを最大限に引き出します。他のEメールセキュリティソリューションでは、セキュリティチームのワークフローを強化するだけで、不審なメールを報告する従業員のことは考慮されていません。正しいことをしようとしても、やみくもにEメールを報告する社員は、学習も改善もせず、結局は自分の時間を無駄にすることになります。従業員を考慮し、セキュリティ意識のトレーニングを改善することで、従業員とAIのフィードバックループはユーザーをレベルアップさせることができます。従業員はAIの説明から悪意のあるコンポーネントの識別方法を学ぶことで、報告するEメールの数を減らし、より高い精度で報告するようになります。 

AIプログラムが古典的にブラックボックスのように動作しているのに対し、Darktraceは、組織の実際の従業員という最高のデータに基づいてAIを訓練し、セキュリティチームと従業員の双方がその結論の背後にある理由を見るように誘導します。時間の経過とともに、従業員は安全でないEメールを見分ける方法をよりよく学ぶようになり、自分自身をより信頼するようになるのです。 

AIを活用して生産性向上を実現する

ユニークなのは、AIを活用したEメールセキュリティは、セキュリティ関連以外の分野でも効果を発揮することです。非生産的なEメールを管理することで、時間を節約することができるのです。AIは受信トレイでの従業員の行動を常に学習するため、スパムやグレーメール(必ずしも悪意があるわけではないが、受信トレイを乱して生産性を低下させるメール)を検知するのに非常に効果的です。これは、各従業員がスパム、グレーメール、ニュースレターをどのように扱っているかに応じて、ユーザーごとに行われるものです。AIは、このような混乱を検知して学習し、最終的には受信箱からどれを取り出すべきかを学習し、従業員の時間を節約することができます。これは、セキュリティソリューションが、単に軽いタッチでEメール環境を保護するだけでなく、AIが受信トレイの仕分けなどのタスクを自動化することで生産性向上を促進するところまで踏み込めることを強調しています。

メールの誤送信を防ぐ:ヒューマンエラーに対処する方法

ユーザーの理解と意思決定を向上させても、自然なヒューマンエラーを止めることはできません。特にOutlookが間違った宛先を自動入力する場合、従業員は必ずミスを犯し、簡単に間違った相手にEメールを送信してしまいます。このようなミスは、コンプライアンス、顧客からの信頼、知的財産、データ損失などに大きな影響を及ぼし、恥ずかしいものから重大なものまで、さまざまな影響を及ぼす可能性があります。 

しかし、AIを使えば、誤って間違った相手にメールを送ってしまうケースを減らすことができます。ユーザーがOutlookでメールを送信しようとすると、AIが受信者を分析します。送信者と受信者の間の文脈上の関係、受信者同士の関係、各受信者の名前と履歴が他の既知の連絡先とどれだけ似ているか、添付ファイルの名前などを考慮します。  

AIは、そのEメールがユーザーの典型的な行動から外れていると判断した場合、ユーザーに警告することができます。セキュリティチームは、AIが次に何をするかをカスタマイズできます。Eメールをブロックする、Eメールをブロックするがユーザーがそれを上書きする、何もしないがユーザーに考え直すよう促す、などです。AIは各Eメールを分析するため、これらの警告は、無視されがちな外部受信者についての一貫した包括的な警告よりも効果的なものとなっています。このようにターゲットを絞ったアプローチで、AIはデータ漏えいを防ぎ、サイバーリスクを低減します。 

AIは常時稼働し、継続的に学習するため、社員の変化に自律的に適応することができます。従業員の役割が変化した場合、AIは一般的な行動、受信者、添付ファイル名など、新しい常識を学習します。これにより、AIは、手動でルールを変更したり、従業員のワークフローを中断したりすることなく、ヒューマンエラーの可能性がある事例を効果的に指摘し続けることができるようになります。 

従業員体験に基づくEメールセキュリティ

Eメールの実質的な利用者である従業員は、Eメールのセキュリティを設計する際に考慮する必要があります。従業員を意識したセキュリティ対策は、防御力を強化し、生産性を向上させ、データ損失を防ぐことができます。  

このように、Eメールセキュリティは、従業員とセキュリティチームの双方にメリットをもたらします。従業員は、安全なEメールに関する誤った報告を減らすために、セキュリティ意識向上のためのトレーニングを受けることで、もう一つの防衛層となることができます。また、従業員のEメール行動に対する洞察は、グレーメールの学習と選別によって、従業員の生産性を高めることができます。最後に、従業員とセキュリティの関係を見ることで、セキュリティチームは、誤送信されたEメールにフラグを立て、データ損失を減らすツールを導入することができます。これらの機能により、Darktrace/Email™は、セキュリティチームが従業員のEメールセキュリティへの関与のバランスを最適化することを可能にします。

INSIDE THE SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
AUTHOR
ABOUT ThE AUTHOR
Dan Fein
VP, Product

Based in New York, Dan joined Darktrace’s technical team in 2015, helping customers quickly achieve a complete and granular understanding of Darktrace’s product suite. Dan has a particular focus on Darktrace/Email, ensuring that it is effectively deployed in complex digital environments, and works closely with the development, marketing, sales, and technical teams. Dan holds a Bachelor’s degree in Computer Science from New York University.

Carlos Gray
Product Manager

Carlos Gonzalez Gray is a Product Marketing Manager at Darktrace. Based in the Madrid Office, Carlos engages with the global product team to ensure each product supports the company’s overall strategy and goals throughout their entire lifecycle. Previous to his position in the product team, Carlos worked as a Cyber Technology Specialist where he specialized in the OT sector protecting critical infrastructure.  His background as a consultant in Spain to IBEX 35 companies led him to become well versed in matters of compliance, auditing and data privacy as well. Carlos holds an Honors BA in Political Science and a Masters in Cybersecurity from IE University.

Book a 1-1 meeting with one of our experts
この記事を共有
USE CASES
該当する項目はありません。
COre coverage

Blog

Eメール

Looking Beyond Secure Email Gateways with the Latest Innovations to Darktrace/Email

Default blog imageDefault blog image
09
Apr 2024

Organizations Should Demand More from their Email Security

In response to a more intricate threat landscape, organizations should view email security as a critical component of their defense-in-depth strategy, rather than defending the inbox alone with a traditional Secure Email Gateway (SEG). Organizations need more than a traditional gateway – that doubles, instead of replaces, the capabilities provided by native security vendor – and require an equally granular degree of analysis across all messaging, including inbound, outbound, and lateral mail, plus Teams messages.  

Darktrace/Email is the industry’s most advanced cloud email security, powered by Self-Learning AI. It combines AI techniques to exceed the accuracy and efficiency of leading security solutions, and is the only security built to elevate, not duplicate, native email security.  

With its largest update ever, Darktrace/Email introduces the following innovations, finally allowing security teams to look beyond secure email gateways with autonomous AI:

  • AI-augmented data loss prevention to stop the entire spectrum of outbound mail threats
  • an easy way to deploy DMARC quickly with AI
  • major enhancements to streamline SOC workflows and increase the detection of sophisticated phishing links
  • expansion of Darktrace’s leading AI prevention to lateral mail, account compromise and Microsoft Teams

What’s New with Darktrace/Email  

Data Loss Prevention  

Block the entire spectrum of outbound mail threats with advanced data loss prevention that builds on tags in native email to stop unknown, accidental, and malicious data loss

Darktrace understands normal at individual user, group and organization level with a proven AI that detects abnormal user behavior and dynamic content changes. Using this understanding, Darktrace/Email actions outbound emails to stop unknown, accidental and malicious data loss.  

Traditional DLP solutions only take into account classified data, which relies on the manual input of labelling each data piece, or creating rules to catch pattern matches that try to stop data of certain types leaving the organization. But in today’s world of constantly changing data, regular expression and fingerprinting detection are no longer enough.

  • Human error – Because it understands normal for every user, Darktrace/Email can recognize cases of misdirected emails. Even if the data is correctly labelled or insensitive, Darktrace recognizes when the context in which it is being sent could be a case of data loss and warns the user.  
  • Unclassified data – Whereas traditional DLP solutions can only take action on classified data, Darktrace analyzes the range of data that is either pending labels or can’t be labeled with typical capabilities due to its understanding of the content and context of every email.  
  • Insider threat – If a malicious actor has compromised an account, data exfiltration may still be attempted on encrypted, intellectual property, or other forms of unlabelled data to avoid detection. Darktrace analyses user behaviour to catch cases of unusual data exfiltration from individual accounts.

And classification efforts already in place aren’t wasted – Darktrace/Email extends Microsoft Purview policies and sensitivity labels to avoid duplicate workflows for the security team, combining the best of both approaches to ensure organizations maintain control and visibility over their data.

End User and Security Workflows

Achieve more than 60% improvement in the quality of end-user phishing reports and detection of sophisticated malicious weblinks1

Darktrace/Email improves end-user reporting from the ground up to save security team resource. Employees will always be on the front line of email security – while other solutions assume that end-user reporting is automatically of poor quality, Darktrace prioritizes improving users’ security awareness to increase the quality of end-user reporting from day one.  

Users are empowered to assess and report suspicious activity with contextual banners and Cyber AI Analyst generated narratives for potentially suspicious emails, resulting in 60% fewer benign emails reported.  

Out of the higher-quality emails that end up being reported, the next step is to reduce the amount of emails that reach the SOC. Darktrace/Email’s Mailbox Security Assistant automates their triage with secondary analysis combining additional behavioral signals – using x20 more metrics than previously – with advanced link analysis to detect 70% more sophisticated malicious phishing links.2 This directly alleviates the burden of manual triage for security analysts.

For the emails that are received by the SOC, Darktrace/Email uses automation to reduce time spent investigating per incident. With live inbox view, security teams gain access to a centralized platform that combines intuitive search capabilities, Cyber AI Analyst reports, and mobile application access. Analysts can take remediation actions from within Darktrace/Email, eliminating console hopping and accelerating incident response.

Darktrace takes a user-focused and business-centric approach to email security, in contrast to the attack-centric rules and signatures approach of secure email gateways

Microsoft Teams

Detect threats within your Teams environment such as account compromise, phishing, malware and data loss

Around 83% of Fortune 500 companies rely on Microsoft Office products and services, particularly Teams and SharePoint.3

Darktrace now leverages the same behavioral AI techniques for Microsoft customers across 365 and Teams, allowing organizations to detect threats and signals of account compromise within their Teams environment including social engineering, malware and data loss.  

The primary use case for Microsoft Teams protection is as a potential entry vector. While messaging has traditionally been internal only, as organizations open up it is becoming an entry vector which needs to be treated with the same level of caution as email. That’s why we’re bringing our proven AI approach to Microsoft Teams, that understands the user behind the message.  

Anomalous messaging behavior is also a highly relevant indicator of whether a user has been compromised. Unlike other solutions that analyze Microsoft Teams content which focus on payloads, Darktrace goes beyond basic link and sandbox analysis and looks at actual user behavior from both a content and context perspective. This linguistic understanding isn’t bound by the requirement to match a signature to a malicious payload, rather it looks at the context in which the message has been delivered. From this analysis, Darktrace can spot the early symptoms of account compromise such as early-stage social engineering before a payload is delivered.

Lateral Mail Analysis

Detect and respond to internal mailflow with multi-layered AI to prevent account takeover, lateral phishing and data leaks

The industry’s most robust account takeover protection now prevents lateral mail account compromise. Darktrace has always looked at internal mail to inform inbound and outbound decisions, but will now elevate suspicious lateral mail behaviour using the same AI techniques for inbound, outbound and Teams analysis.

Darktrace integrates signals from across the entire mailflow and communication patterns to determine symptoms of account compromise, now including lateral mailflow

Unlike other solutions which only analyze payloads, Darktrace analyzes a whole range of signals to catch lateral movement before a payload is delivered. Contributing yet another layer to the AI behavioral profile for each user, security teams can now use signals from lateral mail to spot the early symptoms of account takeover and take autonomous actions to prevent further compromise.

DMARC

Gain in-depth visibility and control of 3rd parties using your domain with an industry-first AI-assisted DMARC

Darktrace has created the easiest path to brand protection and compliance with the new Darktrace/DMARC. This new capability continuously stops spoofing and phishing from the enterprise domain, while automatically enhancing email security and reducing the attack surface.

Darktrace/DMARC helps to upskill businesses by providing step by step guidance and automated record suggestions provide a clear, efficient road to enforcement. It allows organizations to quickly achieve compliance with requirements from Google, Yahoo, and others, to ensure that their emails are reaching mailboxes.  

Meanwhile, Darktrace/DMARC helps to reduce the overall attack surface by providing visibility over shadow-IT and third-party vendors sending on behalf of an organization’s brand, while informing recipients when emails from their domains are sent from un-authenticated DMARC source.

Darktrace/DMARC integrates with the wider Darktrace product platform, sharing insights to help further secure your business across Email Attack Path and Attack Surface management.

結論

To learn more about the new innovations to Darktrace/Email download the solution brief here.

All of the new updates to Darktrace/Email sit within the new Darktrace ActiveAI Security Platform, creating a feedback loop between email security and the rest of the digital estate for better protection. Click to read more about the Darktrace ActiveAI Security Platform or to hear about the latest innovations to Darktrace/OT, the most comprehensive prevention, detection, and response solution purpose built for critical infrastructures.  

Learn about the intersection of cyber and AI by downloading the State of AI Cyber Security 2024 report to discover global findings that may surprise you, insights from security leaders, and recommendations for addressing today’s top challenges that you may face, too.

参考文献

[1] Internal Darktrace Research

[2] Internal Darktrace Research

[3] Essential Microsoft Office Statistics in 2024

続きを読む
著者について
Carlos Gray
Product Manager

Blog

該当する項目はありません。

Managing Risk Beyond CVE Scores With the Latest Innovations to Darktrace/OT

Default blog imageDefault blog image
09
Apr 2024

Identifying Cyber Risk in Industrial Organizations

Compromised OT devices in ICS and SCADA environments pose significant physical risks, even endangering lives. However, identifying CVEs in the multitude of complex OT devices is labor-intensive and time-consuming, draining valuable resources.

Even after identifying a vulnerability, implementing a patch presents its own challenges limited maintenance windows and the need for uninterrupted operations strain IT and OT teams often leading organizations to prioritize availability over security leading vulnerabilities remaining unresolved for over 5 years on average. (1)

Darktrace’s New Innovation

Darktrace is an industry leader in cybersecurity with 10+ years of experience securing OT environments where we take a fundamentally different approach using Self-Learning AI to enhance threat detection and response.

Continuing to combat the expanding threat landscape, Darktrace is excited to announce new capabilities that enable a contextualized and proactive approach to managing cyber risk at industrial organizations.

Today we launch an innovation to our OT Cybersecurity solution, Darktrace/OT, that will add a layer of proactivity, enabling a comprehensive approach to risk management. This industry leading innovation for Darktrace/OT moves beyond CVE scores to redefine vulnerability management for critical infrastructure, tackling the full breadth of risks not limited by traditional controls.  

Darktrace/OT is the only OT security solution with comprehensive Risk Management which includes:

  • Contextualized risk analysis unique to your organization
  • The most realistic evaluation and prioritization of OT risk
  • Effectively mitigate risk across your OT infrastructure, with and without patching.
  • The only OT security solution that evaluates your defenses against Advanced Persistent Threat (APT) Groups.

The most comprehensive prevention, detection, and response solution purpose built for Critical Infrastructures

Darktrace’s Self-Learning AI technology is a cutting-edge innovation that implements real time prevention, detection, response, and recovery for operational technologies and enables a fundamental shift from the traditional approach to cyber defense by learning a ‘pattern of life’ for every network, device, and user.  

Rather than relying on knowledge of past attacks, AI technology learns what is ‘normal’ for its environment, discovering previously unknown threats by detecting subtle shifts in behavior. Through identifying these unexpected anomalies, security teams can investigate novel attacks, discover blind spots, have live time visibility across all their physical and digital assets, and reduce time to detect, respond to, and triage security events.  

  • Achieve greater visibility of OT and IT devices across all levels of the Purdue Model.
  • The industry's only OT security to scale threat detection and response, with a 92% time saving from triage to recovery.  
  • The only OT focused security solution to provide bespoke Risk Management.

To learn more about how Darktrace/OT approaches unique use cases for industrial organizations visit the Darktrace/OT Webpage or join us LIVE at a city near you.

Read more below to discover how new innovations to Darktrace/OT are bringing a new, contextualized approach to Risk Management for Industrial organizations.

For more information on the entire Darktrace/OT Solution read our solution brief here.

Darktrace/OT and New Risk Management

Risk Identification

Leveraging the visibility of Darktrace/OT which identifies individual systems throughout the Purdue Model and the relationship between them, Darktrace/OT identifies high-risk CVEs and presents potential attack routes that go beyond techniques requiring a known exploit, such as misuse of legitimate services. Each attack path will have a mathematical evaluation of difficulty and impact from initial access to the high value objectives.  

Together this gives comprehensive coverage over your real and potential risks from both an attacker and known vulnerability perspectives. OT attack paths as seen here even leverage insights between the industrial and corporate communications to reveal ways threat actors may take advantage of IT-OT convergence. This revelation of imperceptible risks fills gaps in traditional risk analysis like remote access and insider threats.

Figure 1: Darktrace/OT visualizing the most critical attack paths at an organization
Figure 1: Darktrace/OT visualizing the most critical attack paths at an organization
Figure 2: A specific Attack Path identified by Darktrace/OT

Risk Prioritization

Darktrace/OT prioritizes remediations and mitigations based on difficulty and damage to your unique organization, using the established Attack Paths.

We ascertain the priorities that apply to your organization beyond pure theoretical damage answering questions like:

  • How difficult is a particular vulnerability to exploit considering the steps an attacker would require to reach it?
  • And, how significant would the impact be if it was exploited within this particular network?

This expanded approach to risk prioritization has a much more comprehensive evaluation of your organization's unique risk than has ever been possible before. Traditional approaches of ranking only known vulnerabilities with isolated scores using CVSS and exploitability metrics, often leaves gaps in IT-OT risks and is blind to legitimate service exploitation.

Figure 3: Darktrace/OT leverages its contextual understand of the organization’s network to prioritize remediation that will have the positive impact on the risk score

Darktrace provides mitigation strategies associated with each identified risk and the relevant impact it has on your overall risk posture, across all MITRE ATT&CK techniques.

What sets Darktrace apart is our ability to contextualize these mitigations within the broader business. When patching vulnerabilities directly isn’t possible, Darktrace identifies alternative actions that harden attack paths leading to critical assets. Hardening the surrounding attack path increases the difficulty and therefore reduces the likelihood and impact of a breach.

That means unpatched vulnerabilities and vulnerable devices aren’t left unprotected. This also has an added bonus, those hardening techniques work for all devices in that network segment, so apply one change, secure many.

Figure 4: Darktrace prioritizes mitigation reducing accessibility of vulnerability and the overall risk score when patches aren’t available

Communicate Board Level Risk with APT Threat Mapping

Darktrace/OT bridges theory and practice as the only security solution that maps MITRE techniques, frequently used by APT Groups, onto AI-assessed critical Attack Paths. This unique solution provides unparalleled insights including sector and location intelligence, possible operating platforms, common techniques, exploited CVEs, and the number of potential devices affected in your environment, supporting holistic risk assessment and proactive defense measures.

Ultimately, this becomes a power dashboard to communicate board level risk, using both metric based evidence and industry standard threat mapping.

結論

Darktrace/OT is part of the Darktrace ActiveAI Security Platform a native, holistic, AI-driven platform built on over ten years of AI research. It helps security teams shift to more a productive mode, finding the known and the unknown attacks and transforming the SOC with the various Darktrace products to drive efficiency gains. It does this across the whole incident lifecycle to lower risk, reduce time spent on active incidents, and drive return on investment.

Discover more about Darktrace's ever-strengthening platform with the upcoming changes coming to our Darktrace/Email product and other launch day blogs.

Join Darktrace LIVE half-day event to understand the reality versus the hype surrounding AI and how to achieve cyber resilience.

Learn about the intersection of cyber and AI by downloading the State of AI Cyber Security 2024 report to discover global findings that may surprise you, insights from security leaders, and recommendations for addressing today’s top challenges that you may face, too.  

参考文献

1. https://research-information.bris.ac.uk/ws/portalfiles/portal/313646831/Catch_Me_if_You_Can.pdf

続きを読む
著者について
Mitchell Bezzina
VP, Product and Solutions Marketing
Our ai. Your data.

Elevate your cyber defenses with Darktrace AI

無償トライアルを開始
Darktrace AI protecting a business from cyber threats.