By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Darktrace touts “immune system” for IT networks
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Darktrace touts “immune system” for IT networks
Enterprise

Darktrace touts “immune system” for IT networks

Aaron Tan
Last updated: April 24, 2015 at 4:01 PM
Aaron Tan
Published: April 24, 2015
3 Min Read
SHARE

With cybercriminals continuing to outsmart enterprises in several high profile security breaches in recent years, it is no longer business as usual for folks in IT security.

Many threats have proven to be capable of breaching firewalls and other defences, so the traditional way of ring-fencing your IT infrastructure is no longer good enough.

What’s needed is a way to suss out both internal and external threats before they happen. Darktrace, a young IT security company founded by the UK government’s cyber community — from GCHQ and other intelligence agencies — was started to do just that.

Headquartered in Cambridge, UK, Darktrace uses sophisticated mathematical models and Bayesian probability to detect anomalies, such as unusual transfers of corporate data in the wee hours of the morning, through its Darktrace Cyber Intelligence Platform (DCIP).

But in some cases, such data transfers may well be legitimate for travelling employees working remotely in a different time zone. The DCIP is smart enough to rule out such false alarms, by taking into account an individual’s usage patterns in its mathematical model.

Since its inception in 2013, Darktrace has detected a slew of anomalies – such as remote access attacks linked to malware, ransomeware infections and malicious web drive-by – in the networks of 75 companies around the world.

In one particular incident, Darktrace observed that a company machine was making anomalous connections to one IP address using Adobe Flash.

There was no evidence of the IP address being resolved through DNS, and the connections contained command names in HTTP GET requests. This incident appeared to be a covert method of communication that went undetected by firewalls.

Sanjay Aurora, general manager at Darktrace Asia Pacific, said the company is adept at identifying such unfamiliar threats – rather than known ones in rule-based security policies – by collecting user, device and network data. “It’s almost like a human immune system, where the body is able to determine what’s good or bad”.

Darktrace customers will also get access to a 3-D visualisation tool that displays what is going on at any point in a corporate network, including data flows between devices, spikes in data transfers and a threat notification centre that shows a range of anomalies requiring investigation.

In March, the company announced that it has raised US$18 million from investors including Invoke Capital, Talis Capital, Hoxton Ventures and private individuals, valuing the company at US$80 million. It is in the midst of expanding its presence in Asia with new teams in Australia, Singapore and Japan.

DCIP is available as an appliance on a subscription basis. Aurora said the cost of the subscription would depend on the size of the network and the number of devices to be monitored.

Five key trends in the SMB cloud market
Now weaponised, ransomware is a grave threat
DIY: Setting up the Canon Imageclass MF645Cx multi-function centre for a home-office
The best of Taiwanese innovation in cloud, AI, rollable screens and more at Asia Tech x Singapore
Keysight study unveils critical challenges in healthcare software testing
TAGGED:cyber securitysecurity

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article IDA to kick off HetNet trials in third quarter
Next Article VMware’s AirWatch deal paying off
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?