AI Case Study
Giunti, an Italian publishing house, detects cybersecurity threats in real-time using machine learning
Giunti, an Italian publishing house, enlists DarkTrace to detect cybersecurity threats. DarkTrace's solution maps network topology and instantly detects deviations and classifies them. If perceived as threat, alerts are generated. The system offers 100% network visibility and real-time threat detection.
Industry
Consumer Goods And Services
Media And Publishing
Project Overview
"The Enterprise Immune System was installed permanently into
Giunti’s network in under an hour. Darktrace’s Threat Visualizer,
a 3D graphical and topological interface, provides the company
with 100% network visibility and an improved understanding of
its employees’ behavior, as well as the network as a whole.
Moreover, Giunti is alerted to potential cyber-attacks via the
Threat Visualizer interface as soon as the first indications of
threat occur, allowing the company’s security team to carry out
further investigations and mitigate any risk posed.
This dynamic understanding of ‘self’ allows the technology to
automatically detect any anomalous behavior that deviates
from the norm and, therefore, may be indicative of a cyberthreat.
Giunti decided to permanently deploy Darktrace across
its network as its core defense technology"
Reported Results
The company claims:
* Real-time threat detection, including ‘unknown unknowns’
* Ability to respond efficiently to potential cyber-attacks and mitigate risk
* 100% network visibility
Technology
"Darktrace’s cyber AI platform uses unsupervised machine learning to analyze network data at scale, and makes billions of probability-based calculations based on the evidence that it sees. Instead of relying on knowledge of past threats, it independently classifies data and detects compelling patterns."
Function
Information Technology
Security
Background
"As a major publishing house in Italy, Giunti works with a number of authors, editors and graphic designers, and therefore manages valuable intellectual property and critical data, including its customers’ sensitive information."
Benefits
Data
Uses data such as server access, data volumes, timings of events, credential use, DNS requests