Casos de uso de Darktrace/OT

Uncovers the full range of ICS threats

Como aprende seu negócio e procura comportamentos incomuns, ao invés de procurar ameaças conhecidas, Darktrace/OT revela toda a gama de atividades ameaçadoras em seu ambiente ICS.

Ameaças Persistent Threats (APTs)

APTs are sophisticated and stealthy threat actors who may blend various IT techniques - including zero day exploits and malware applications - in order to evade detection and reach industrial systems with OT payloads. By exfiltrating OT project files and programs, and reinstalling them with modifications made by their own OT engineers, these high-resource techniques can sabotage physical processes and create highly unsafe process conditions.

Darktrace reveals and responds to subtle APT techniques, taking action to maintain safety and production processes.

Análise de amostras de Darktrace/OT
Cada ataque cibernético é diferente, mas aqui está alguma atividade incomum que Darktrace/OT pode encontrar ao descobrir um ataque APT:
Atividade de balizamento para o Exterior Raro
Anomalous IT to ICS Connection
Atividade inusitada do Dispositivo OT
Dispositivo Raro Externo de OT
Conexões inusitadas do RDP

Ransomware industrial

Ransomware is typically fast-moving and indiscriminate, impacting OT systems both directly and indirectly. Production can be jeopardized by the reliance of OT systems on vulnerable IT services, which control crucial processes such as customer ordering, and if ransomware deliberately targets an OT network and encrypts project files and backups, the clean-up process can be costly and time-consuming.

Darktrace RESPOND takes targeted action to contain ransomware as soon as it emerges in the IT layer, when it is still far from production systems. 

Análise de amostras de Darktrace/OT
Cada ataque cibernético é diferente, mas eis como pode parecer um ataque de resgate industrial em Darktrace/OT:
Atividade inusitada do Dispositivo OT
Transferência inusitada de dados por OT
Unusual Data Download / Upload
Suspicious SMB Activity
Arquivo de alto risco e SMB inusitado

Nuvem OT

The adoption of OT Cloud/ICSaaS expands an attack surface by increasing connectivity and complexity.  

Darktrace provides unified visibility across IT, OT, and the cloud, helping organisations accelerate digital transformation while mitigating the risks that it entails.

Even better with: Darktrace/Cloud and Darktrace/Apps

Análise de amostras de Darktrace/OT
Aqui está algum comportamento incomum que uma nuvem de ataque cibernético e OT pode desencadear em Darktrace:
Unusual External Source for SaaS Credential Use
IaaS Security Rule Delete
Lateral Movement and C2 Activity
Anomaly then New ICS Commands
Multiple New Reprograms

Inventário de ativos

Darktrace/OT provides complete visibility and a comprehensive list of assets with many networking and device details passively collected from network traffic (or optionally using smart active identification).

An Unlimited Number of Attacks

An unlimited number of responses

Our ai. Your data.

Elevate your cyber defenses with Darktrace AI

Comece seu teste gratuito
Darktrace AI protecting a business from cyber threats.