Darktrace Industrial

100% visibility and real-time threat detection for industrial networks

Darktrace Industrial is a cyber AI defense technology that is specifically developed to detect cyber-threats and latent vulnerabilities in both OT environments, such as SCADA systems, and IT networks. It provides real-time visibility across both your industrial and enterprise networks, allowing security professionals to gain oversight of all their systems and protect them from emerging cyber-threats and vulnerabilities.

Powered by artificial intelligence, Darktrace Industrial works by passively monitoring network traffic across OT and IT, modeling the ‘pattern of life’ for every user, device and controller in the system. In doing so, it learns ‘normal’ behaviors and can identify potential problems or cyber-threats at a very early stage, before they escalate into a crisis or cause material harm.

Crucially, Darktrace Industrial’s self-learning approach means that it is vendor and protocol agnostic and can adapt and evolve to any operational environment. Without manual tuning, bespoke development or special configuration, the technology adapts to the environments and systems that it is installed in, and rapidly produces meaningful results.

Because data ingestion is passive, Darktrace Industrial is easy to deploy, and does not disrupt normal functioning of critical ICS, including industrial plants and machinery.

Darktrace identified threats with the potential to disrupt our networks. It helps us stay ahead of emergent threats and better defend our key systems.
Martin Sloan, Group Head of Security, Drax
Download our Industrial Immune System Data Sheet
Request our Industrial Control Systems White Paper

‘Immune System’ Cyber Security for SCADA Systems

by Simon Fellows, Technical Director, Darktrace

This Engineering and Technology Reference report provides detailed technical insight into how Darktrace works across operational technology environments and in SCADA systems.

Request ‘Immune System’ Cyber Security for SCADA Systems

Darktrace Threat Visualizer

The Threat Visualizer is Darktrace’s graphical and interactive 3D interface, which visualizes network activity and enables users to investigate anomalies and threats in real time. It is designed for users of all maturity levels, from forensic security experts, to business executives and less experienced members of the IT team.

A wealth of rich information can be variously queried and exposed using the interactive features within the Threat Visualizer. Cyber security analysts use it as an essential system to investigate cyber incidents in both OT and IT environments, while visualization techniques provide a high-level overview of security matters for business executives, helping to bridge the gap between technical specialists and the boardroom.

The Threat Visualizer allows executives to see a pictorial representation of what’s been happening, making it an invaluable tool.
Wayne Smith, Head of Information Technology, Birmingham Airport

Darktrace Antigena

Autonomous response to in-progress cyber-threats

Powered by Darktrace’s multi-award-winning AI, Darktrace Antigena is an autonomous response solution that takes action against in-progress cyber-attacks, limiting damage and stopping their spread in real time.

The technology works like a digital antibody, intelligently generating measured and proportionate responses when a threatening incident arises. This ability to contain threats using proven AI is a game-changer for security teams, who benefit from the critical time needed to catch up and avoid major damage.

Bridging the gap between automated threat detection and a security team’s response, Darktrace Antigena represents a new era of cyber defense that autonomously fights back.

Request our Darktrace Antigena White Paper
Request our Darktrace Antigena Product Overview
Download the City of Las Vegas Case Study
Antigena represents an important step in behavior analytics evolving to an active defense that traditional systems cannot match.
Eric Ogren, Senior Security Analyst, 451 Research
Next: Approach