Suppliers
United Kingdom
DarkTrace
Overview
This profile is not managed yet, if you would like to manage
this profile, please contact us at team@iotone.com
this profile, please contact us at team@iotone.com
![]() |
DarkTrace |
United Kingdom | |
Cambridge | |
2013 | |
Private | |
DARK | |
$10-100m | |
201 - 1,000 | |
Open website |
IoT Snapshot
Technology Stack
Case Studies
Number of Case Studies6
Achieved Self-learning Protection of Email Accounts and Users
Guardsman Group and its subsidiaries are leaders in security, with clients across all industries around the Caribbean. It provides security equipment, personnel, and systems for some of the most prominent businesses in the region.One of the Guardsman's offices experienced an incident that saw all communications at that location affected. The team found that legacy security tools did not provide enough protection, with it taking hours to identify the source of the issue. At this point, Guardsman knew it needed a dynamic solution that could proactively identify threats like these. |
|
How Traditional Defenses Let Major Threats Slip through
As a global company with over 1,200 employees and 24 subsidiaries, KTR systems has a diverse and complex digital infrastructure to protect. With increasingly subtle and sophisticated cyber-attacks targeting every corner of the digital ecosystems, the IT team sought a new approach that could detect and autonomously respond to these threats. |
|
Targeted by Sophisticated Email Impersonation
As a global company with over 1,200 employees and 24 subsidiaries, KTR Systems has a diverse and complex digital infrastructure to protect. With increasingly subtle and sophisticated cyber-attacks targeting every corner of the digital ecosystem, the IT team sought a new approach that could detect and autonomously respond to these threats.The team identified the threat before it could escalate and suffered no damage. However, by now it had become clear the team needed a robust solution to enable them to respond to email attacks 24/7. |
Similar Suppliers
Number of Similar Suppliers4
![]() |
WIBU-SYSTEMS
WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms. |
![]() |
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. |
![]() |
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology. |
![]() |
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts. |