SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
CASE STUDY
Overview
Industry
•	 Retail
Challenge
•	 Intelligent cyber adversaries
•	 Inadequate legacy tools
•	 Incomplete network visibility
•	 Insider threat
Results
•	 Real-time threat detection
•	 100% network visibility
•	 Ability to carry out in-depth
investigations and risk-mitigation
•	 Increased efficiency in handling
issues
Business Background
Chantecler is one of the leading jewelry brands in Italy, established on the island
of Capri in 1947. The family-run business now boasts six boutiques in Italy,
Japan, China and Kazakhstan, bringing its high-end jewelry collection around the
world. The company values tradition and the historic roots of its brand whilst
continually developing new designs and modern collections.
“The machine learning aspect of the technology is
fantastic. We have been alerted to information that
we would never have found out otherwise.”
Claudio Nasti, IT Manager, Chantecler
Challenge
Chantecler had been looking for a cyber security solution capable of defending
its network from the latest, most advanced cyber-attacks.The company designs,
produces and distributes its own jewelry onsite in Italy, and, as such, places the
utmost importance on defending its digital assets and intellectual property
against cyber adversaries.
As well as the threat posed by malicious outsiders trying to infiltrate its network,
the retailer was concerned about insider threat. With a global workforce,
connected by a large, dynamic network, the potential for an insider’s access to
be exploited, by the employees themselves or not, is high.
Chantecler needed a technology capable of providing complete network visibility,
something unachievable with legacy tools. This would provide the retailer with
a better understanding of employee behavior and the ability to spot suspicious
behavior and vulnerable devices, which may be indicators of future cyber-attack.
Chantecler – Leading Italian Jewelry Brand
Solution
Chantecler completed a 4-week Proof of Value (‘POV’) with Darktrace’s Enterprise Immune System. The self-learning technology is
inspired by the biological principals of the human immune system and powered by machine learning and mathematics developed by
specialists from the University of Cambridge.
The technology is installed as an appliance, in under an hour, and immediately begins to model the behaviors of all users, devices and
the network as a whole to establish a ‘pattern of life’. Its dynamic and adaptive understanding of what is normal activity allows the
Enterprise Immune System to detect anomalous behaviors which may be indicative of cyber-threat, in real time, and immediately report
the potential issues to Chantecler’s IT team.
Chantecler was impressed by the technology’s capabilities and decided to deploy the system across its network. “We analyzed several
solutions on the market but found Darktrace to be the most comprehensive and effective technology available,” said Claudio Nasti, IT
Manager, Chantecler.
“The machine learning aspect of the technology is fantastic. We have been alerted to
information that we would never have found out otherwise.”
Claudio Nasti, IT Manager, Chantecler
Benefits
Thanks to Darktrace’s immune system technology, Chantecler is now informed of any potential issues on its network, as soon as they
occur, via the Threat Visualizer interface, allowing its security team to carry out in-depth investigations and take the necessary action to
mitigate any risk posed.
The interface provides a 3D graphical representation of Chantecler’s network, as well as classification and playback tools, allowing
the retailer’s IT team to handle issues efficiently. Moreover, the team receives weekly Threat Intelligence Reports (‘TIRs’) written by
Darktrace’s expert analysts, which concisely summarize the latest anomalous events detected.
“The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out
otherwise,” added Claudio Nasti. “The Enterprise Immune System allows us to relax, knowing that it is constantly monitoring our network
and will detect any issues that we need to investigate further.”
Ultimately, Chantecler now has 100% network visibility and is better equipped to protect its critical assets and business reputation
against today’s intelligent cyber-attackers, increasing its confidence in its overall cyber defense strategy and allowing its further growth
as a leading Italian jewelry brand.
About Darktrace
Darktrace is a world-leading cyber-threat defense company. Its multi-award-winning Enterprise
Immune System technology automatically detects and responds to emerging threats, powered by
machine learning and mathematics developed by specialists from the University of Cambridge.
Without using rules or signatures, Darktrace models the ‘pattern of life’ of every device, user and
network within an organization, identifying and mitigating cyber-threats before damage is done.
Darktrace’s self-learning technology has been deployed globally and across all sectors, including
energy, retail, telecommunications, manufacturing, financial services and healthcare. The company
is headquartered in San Francisco and Cambridge, UK, with over 20 global offices including London,
New York, Milan, Mumbai, Paris, Singapore, Sydney, Tokyo and Toronto.
Contact Us
US: +1 (415) 243 3940
Europe: +44 (0) 1223 324 114
APAC: +65 6248 4516
Email: info@darktrace.com
www.darktrace.com

Contenu connexe

Tendances

Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
SMAU
 

Tendances (20)

Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
Unlocked Episode 3: Unlocking Video Surveillance
Unlocked Episode 3: Unlocking Video SurveillanceUnlocked Episode 3: Unlocking Video Surveillance
Unlocked Episode 3: Unlocking Video Surveillance
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Artificially intelligent
Artificially intelligentArtificially intelligent
Artificially intelligent
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World Keynote
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Epoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal Solution: Security Offerings
Epoch Universal Solution: Security Offerings
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
 

En vedette (14)

6782
67826782
6782
 
2010 YouToo nonprofit workshop
 2010 YouToo nonprofit workshop 2010 YouToo nonprofit workshop
2010 YouToo nonprofit workshop
 
R.a. no.156 modif. pac inclusion y exclusion(1)
R.a. no.156 modif. pac inclusion y exclusion(1)R.a. no.156 modif. pac inclusion y exclusion(1)
R.a. no.156 modif. pac inclusion y exclusion(1)
 
대신리포트_마켓 브라우저_140401
대신리포트_마켓 브라우저_140401대신리포트_마켓 브라우저_140401
대신리포트_마켓 브라우저_140401
 
Colombia frente a sus potencias mundiales.
Colombia frente a sus potencias mundiales.Colombia frente a sus potencias mundiales.
Colombia frente a sus potencias mundiales.
 
la letra e de todas la vocales que existe
la letra e de todas la vocales que existela letra e de todas la vocales que existe
la letra e de todas la vocales que existe
 
ActivSpaces Cameroon Al Banda Incubating Start Ups
ActivSpaces Cameroon Al Banda Incubating Start UpsActivSpaces Cameroon Al Banda Incubating Start Ups
ActivSpaces Cameroon Al Banda Incubating Start Ups
 
K9 2
K9 2K9 2
K9 2
 
ใบงานที่ 17
ใบงานที่ 17ใบงานที่ 17
ใบงานที่ 17
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
6808
68086808
6808
 
Patronaje femenino
Patronaje femenino Patronaje femenino
Patronaje femenino
 
CCNP CERTIFICATE
CCNP CERTIFICATECCNP CERTIFICATE
CCNP CERTIFICATE
 
Malaria
MalariaMalaria
Malaria
 

Similaire à Cs chantecler

Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
Tony Zirnoon, CISSP
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
Austin Eppstein
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
Tony Zirnoon, CISSP
 

Similaire à Cs chantecler (20)

Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
SEI torino forum 2019
SEI torino forum 2019SEI torino forum 2019
SEI torino forum 2019
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfTop 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdf
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 

Plus de Claudio Nasti ✔ (9)

Invito dig f&f ch maggio
Invito dig f&f ch maggioInvito dig f&f ch maggio
Invito dig f&f ch maggio
 
L'arroganza della Conoscenza
L'arroganza della ConoscenzaL'arroganza della Conoscenza
L'arroganza della Conoscenza
 
On retailmagazine
On retailmagazineOn retailmagazine
On retailmagazine
 
Big data qualche riflessione
Big data qualche riflessioneBig data qualche riflessione
Big data qualche riflessione
 
Pederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativaPederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativa
 
Friend & Familiy 2016
Friend & Familiy 2016Friend & Familiy 2016
Friend & Familiy 2016
 
Stampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuroStampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuro
 
Speciale server storage office automation giugno 2013
Speciale server storage office automation  giugno 2013Speciale server storage office automation  giugno 2013
Speciale server storage office automation giugno 2013
 
Brochure fashion luxury_sas_n
Brochure fashion luxury_sas_nBrochure fashion luxury_sas_n
Brochure fashion luxury_sas_n
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cs chantecler

  • 1. CASE STUDY Overview Industry • Retail Challenge • Intelligent cyber adversaries • Inadequate legacy tools • Incomplete network visibility • Insider threat Results • Real-time threat detection • 100% network visibility • Ability to carry out in-depth investigations and risk-mitigation • Increased efficiency in handling issues Business Background Chantecler is one of the leading jewelry brands in Italy, established on the island of Capri in 1947. The family-run business now boasts six boutiques in Italy, Japan, China and Kazakhstan, bringing its high-end jewelry collection around the world. The company values tradition and the historic roots of its brand whilst continually developing new designs and modern collections. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise.” Claudio Nasti, IT Manager, Chantecler Challenge Chantecler had been looking for a cyber security solution capable of defending its network from the latest, most advanced cyber-attacks.The company designs, produces and distributes its own jewelry onsite in Italy, and, as such, places the utmost importance on defending its digital assets and intellectual property against cyber adversaries. As well as the threat posed by malicious outsiders trying to infiltrate its network, the retailer was concerned about insider threat. With a global workforce, connected by a large, dynamic network, the potential for an insider’s access to be exploited, by the employees themselves or not, is high. Chantecler needed a technology capable of providing complete network visibility, something unachievable with legacy tools. This would provide the retailer with a better understanding of employee behavior and the ability to spot suspicious behavior and vulnerable devices, which may be indicators of future cyber-attack. Chantecler – Leading Italian Jewelry Brand
  • 2. Solution Chantecler completed a 4-week Proof of Value (‘POV’) with Darktrace’s Enterprise Immune System. The self-learning technology is inspired by the biological principals of the human immune system and powered by machine learning and mathematics developed by specialists from the University of Cambridge. The technology is installed as an appliance, in under an hour, and immediately begins to model the behaviors of all users, devices and the network as a whole to establish a ‘pattern of life’. Its dynamic and adaptive understanding of what is normal activity allows the Enterprise Immune System to detect anomalous behaviors which may be indicative of cyber-threat, in real time, and immediately report the potential issues to Chantecler’s IT team. Chantecler was impressed by the technology’s capabilities and decided to deploy the system across its network. “We analyzed several solutions on the market but found Darktrace to be the most comprehensive and effective technology available,” said Claudio Nasti, IT Manager, Chantecler. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise.” Claudio Nasti, IT Manager, Chantecler Benefits Thanks to Darktrace’s immune system technology, Chantecler is now informed of any potential issues on its network, as soon as they occur, via the Threat Visualizer interface, allowing its security team to carry out in-depth investigations and take the necessary action to mitigate any risk posed. The interface provides a 3D graphical representation of Chantecler’s network, as well as classification and playback tools, allowing the retailer’s IT team to handle issues efficiently. Moreover, the team receives weekly Threat Intelligence Reports (‘TIRs’) written by Darktrace’s expert analysts, which concisely summarize the latest anomalous events detected. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise,” added Claudio Nasti. “The Enterprise Immune System allows us to relax, knowing that it is constantly monitoring our network and will detect any issues that we need to investigate further.” Ultimately, Chantecler now has 100% network visibility and is better equipped to protect its critical assets and business reputation against today’s intelligent cyber-attackers, increasing its confidence in its overall cyber defense strategy and allowing its further growth as a leading Italian jewelry brand. About Darktrace Darktrace is a world-leading cyber-threat defense company. Its multi-award-winning Enterprise Immune System technology automatically detects and responds to emerging threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace models the ‘pattern of life’ of every device, user and network within an organization, identifying and mitigating cyber-threats before damage is done. Darktrace’s self-learning technology has been deployed globally and across all sectors, including energy, retail, telecommunications, manufacturing, financial services and healthcare. The company is headquartered in San Francisco and Cambridge, UK, with over 20 global offices including London, New York, Milan, Mumbai, Paris, Singapore, Sydney, Tokyo and Toronto. Contact Us US: +1 (415) 243 3940 Europe: +44 (0) 1223 324 114 APAC: +65 6248 4516 Email: info@darktrace.com www.darktrace.com