AI Case Study

Giunti, an Italian publishing house, detects cybersecurity threats in real-time using machine learning

Giunti, an Italian publishing house, enlists DarkTrace to detect cybersecurity threats. DarkTrace's solution maps network topology and instantly detects deviations and classifies them. If perceived as threat, alerts are generated. The system offers 100% network visibility and real-time threat detection.

Industry

Consumer Goods And Services

Media And Publishing

Project Overview

"The Enterprise Immune System was installed permanently into
Giunti’s network in under an hour. Darktrace’s Threat Visualizer,
a 3D graphical and topological interface, provides the company
with 100% network visibility and an improved understanding of
its employees’ behavior, as well as the network as a whole.
Moreover, Giunti is alerted to potential cyber-attacks via the
Threat Visualizer interface as soon as the first indications of
threat occur, allowing the company’s security team to carry out
further investigations and mitigate any risk posed.
This dynamic understanding of ‘self’ allows the technology to
automatically detect any anomalous behavior that deviates
from the norm and, therefore, may be indicative of a cyberthreat.
Giunti decided to permanently deploy Darktrace across
its network as its core defense technology"

Reported Results

The company claims:

* Real-time threat detection, including ‘unknown unknowns’
* Ability to respond efficiently to potential cyber-attacks and mitigate risk
* 100% network visibility

Technology

"Darktrace’s cyber AI platform uses unsupervised machine learning to analyze network data at scale, and makes billions of probability-based calculations based on the evidence that it sees. Instead of relying on knowledge of past threats, it independently classifies data and detects compelling patterns."

Function

Information Technology

Security

Background

"As a major publishing house in Italy, Giunti works with a number of authors, editors and graphic designers, and therefore manages valuable intellectual property and critical data, including its customers’ sensitive information."

Benefits

Data

Uses data such as server access, data volumes, timings of events, credential use, DNS requests