Sign in to see all reviews and comparisons. It's Free!
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
Category
Unified Security Management Software
Features
• Real-time threat detection and autonomous response • Threat Visualizer provides a graphical overview of the day-to-day activity of networks • Pan-spectrum viewing – higher-order network topology; specific clusters, subnets, and host events • Searchable logs and events • Flexible dashboard • Global threat monitoring in real time using sophisticated self-learning mathematics
License
Proprietary
Pricing
Subscription
Free Trial
Available
Users Size
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Company
Darktrace
What is best?
• Pan-spectrum viewing – higher-order network topology; specific clusters, subnets, and host events • Searchable logs and events • Flexible dashboard • Global threat monitoring in real time using sophisticated self-learning mathematics
What are the benefits?
• Concise summary of overall behavior for device and external IPs • Protocol agnostic due to self-learning approach • Fully configurable: The scope of its actions can be controlled and adjusted • Signature-free mathematical approaches allow detection of new emerging attacks that have not been seen before
PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
9.5
6.9
Features & Functionality
9.4
9.0
Advanced Features
9.6
8.7
Integration
9.5
7.9
Performance
9.4
8.5
Customer Support
9.6
8.8
Implementation
9.8
Renew & Recommend
8.7
Bottom Line
Darktrace is a market leader that provides a strong example of leveraging artificial intelligence.
9.5
Editor Rating
8.5
Aggregated User Rating
22 ratings
You have rated this
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
Darktrace’s cyber AI platform uses unsupervised machine learning to analyze network data at scale, and makes billions of probability-based calculations based on the evidence that it sees. Instead of relying on knowledge of past threats, it independently classifies data and detects compelling patterns. Darktrace is capable of detecting a range of in-progress threats, breaches and vulnerabilities — from IoT hacks and criminal campaigns, through to insider threats or latent vulnerabilities.
Darktrace easily integrates with existing infrastructure, including SIEM dashboards, SOC environments or any other downstream ticketing and alerting tool. This allows security teams to adopt Darktrace without changing existing business processes and working practices. Darktrace is compatible with all major SIEMs that support the industry- standard Common Event Format (CEF) and Log Event Extended Format (LEEF). These include providers such as ArcSight, LogRhythm, QRadar and Splunk.
Darktrace can also be configured to trigger alerts when the most serious threats are detected. Darktrace can also support a range of deployment strategies for different Security Operations Center (SOC) environments, from continuous monitoring and alerting, to dedicated threat hunting. Darktrace models define the conditions under which Darktrace will notify an operator of an event.
These events are surfaced within the Darktrace Threat Visualizer but may also be issued to external systems or be actively queried via the Darktrace API. Darktrace’s enterprise-grade API also offers straightforward HTTPS access to all data available within the Darktrace platform. This allows for rapid customized exporting, integration and orchestration of the Darktrace data.
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.