Darktrace Provides Enterprise Immunity Against Cyber Threats

Cyber attacks are becoming more prominent, more sophisticated and more costly than ever.
Darktrace has released it’s Enterprise Immune System, which is designed to mitigate cyber threats before they have a chance to impact your network.
Darktrace is different in the fact that it doesn’t use signatures or rules to detect threats. Darktrace provides your systems with OS sensors that can be deployed onto any type of server.
These sensors monitor the activity of your network, while the Darktrace appliance helps provide real time analysis on the validity of this data. If the Darktrace Enterprise Immunity System finds a threat, the system automatically squashes it.
The logic provided to the Darktrace appliance actually originates in the cloud. Darktrace says that the engine that powers Darktrace’s intelligence is the same technology that was developed by the University of Cambridge. Darktrace says that machine learning is a pivotal part of the Enterprise Immune System.
Here’s a rundown of the top features of the Darktrace Enterprise Immune System:

  • Dynamically configure your Enterprise Immunity System with local networks and/or public cloud services
  • Gain complete control over the data coming in and going out of your networks
  • Analysis for both cloud and on-premise data centers with a wide range of support for various ecosystems
  • Lightweight – The non-intrusive software will run in the background and not impact any other services.

Darktrace says their OS Sensors are compatible with workloads running on AWS, Azure, Google Cloud Platform and others.
“The Enterprise Immune System is a new technological approach to cyber defense, based on the principle that organizations face a constant level of threat from within,” says the Darktrace website.
“Inspired by the self-learning intelligence of the human immune system, this new approach is delivered by cutting-edge technology that is capable of learning ‘self’ within an organization in real time – enabling it to detect emerging threats that bypass other security controls.”