Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from cyber-attacks. With a team of over 2200 people spread over 30 global offices, Darktrace is dedicated to containing the global impacts of cyber threats.
Do You Manage Peer Insights at Darktrace?
Access Vendor Portal to update and manage your profile.
It offers us comprehensive visibility into the vulnerabilities of our OT devices, generating various attack vectors within our network and giving us the opportunity to be proactive. We also find the combined visibility of all our IT/OT networks within a single console invaluable, providing us with excellent context when analyzing an incident or attack vector. Its vulnerability module for OT network assets allows us to assess our risk and make informed decisions.
Live status Restore function ('Heal' feature) Strong deployment support
Visibility - Our Darktrace/OT appliances discover OT assets and communicate with our master appliance to provide a unified view of all IT and OT assets. ICS Threat Detection Models - AI-based models are used to learn the pattern of life of OT assets and detect deviations from the normal behaviour. Great for detecting unknown threats. Risk Modeling - The OTRM module combines IT and OT vulnerability data to map critical attack paths across the IT and OT networks. This helps us to prioritise vulnerabilities and identify our weakest points.
Overall, it has met our expectations.
More expensive than some - a more difficult business case Broken up into modules with different functionality - both a strength and a weakness
Pricey - It's a great tool, but it's not cheap. Not ideal for small companies with tight cybersecurity budgets. False-Positives - There is a good deal of false positives which can lead to alert fatigue. You'll learn to filter out the noise as you go along though. Info clarity - There's no simple way to list assets by OT site. While using tags offers a way to link assets to their OT site after initial discovery, organizing asset groups and their vulnerabilities based on the originating OT sensor would be a great improvement in terms of information clarity.