{"id":1435,"date":"2022-04-05T08:44:39","date_gmt":"2022-04-05T08:44:39","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1435"},"modified":"2023-09-01T16:06:43","modified_gmt":"2023-09-01T16:06:43","slug":"darktrace-and-technewshub-present-why-darktrace","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/","title":{"rendered":"Darktrace and TechNewsHub present Why Darktrace?"},"content":{"rendered":"<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1434 size-full\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1.jpg\" alt=\"\" width=\"1087\" height=\"268\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1.jpg 1087w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-300x74.jpg 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-1024x252.jpg 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-768x189.jpg 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-18x4.jpg 18w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-500x123.jpg 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Capture777-1-800x197.jpg 800w\" sizes=\"auto, (max-width: 1087px) 100vw, 1087px\" \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1444 size-full\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/DarkTrace.png\" alt=\"\" width=\"600\" height=\"163\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/DarkTrace.png 600w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/DarkTrace-300x82.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/DarkTrace-18x5.png 18w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/DarkTrace-500x136.png 500w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\n<p>&nbsp;<\/p>\n<h3>Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.<\/h3>\n<p>Developed at our R&amp;D center in Cambridge, UK, Self-Learning AI is the only technology on the market that builds an understanding of your unique business, rather than attempting to learn breaches. This enables the AI to autonomously detect, investigate, and respond to novel and sophisticated threats across the digital ecosystem \u2013 without the need for human input or fine tuning.<\/p>\n<p>[dlm_gf_form download_id=1441 ajax=&#8221;true&#8221;]<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats. Developed at our&#8230;<\/p>","protected":false},"author":25,"featured_media":1127,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[42,16],"tags":[],"class_list":["post-1435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-darktrace","category-information-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Darktrace and TechNewsHub present Why Darktrace? - Techknowledge<\/title>\n<meta name=\"description\" content=\"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Darktrace and TechNewsHub present Why Darktrace? - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T08:44:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-01T16:06:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1649\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/\",\"url\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/\",\"name\":\"Darktrace and TechNewsHub present Why Darktrace? - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg\",\"datePublished\":\"2022-04-05T08:44:39+00:00\",\"dateModified\":\"2023-09-01T16:06:43+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"description\":\"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg\",\"width\":2560,\"height\":1649,\"caption\":\"Cybersecurity Concept with Virtual Padlock on Abstract Background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Darktrace\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/darktrace\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Darktrace and TechNewsHub present Why Darktrace?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Darktrace and TechNewsHub present Why Darktrace? - Techknowledge","description":"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/","og_locale":"fr_FR","og_type":"article","og_title":"Darktrace and TechNewsHub present Why Darktrace? - Techknowledge","og_description":"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.","og_url":"https:\/\/b2btechknowledge.net\/fr\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/","og_site_name":"Techknowledge","article_published_time":"2022-04-05T08:44:39+00:00","article_modified_time":"2023-09-01T16:06:43+00:00","og_image":[{"width":2560,"height":1649,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg","type":"image\/jpeg"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Steph Napier","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/","url":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/","name":"Darktrace and TechNewsHub present Why Darktrace? - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg","datePublished":"2022-04-05T08:44:39+00:00","dateModified":"2023-09-01T16:06:43+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"description":"Darktrace fundamentally transforms the ability of organizations to defend themselves in the face of diverse cyber-threats.","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Cybersecurity-Trend-Report-XDR-Detection-and-Response-Beyond-The-Endpoint-scaled.jpg","width":2560,"height":1649,"caption":"Cybersecurity Concept with Virtual Padlock on Abstract Background"},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/brands\/darktrace\/darktrace-and-technewshub-present-why-darktrace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Darktrace","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/darktrace\/"},{"@type":"ListItem","position":4,"name":"Darktrace and TechNewsHub present Why Darktrace?"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=1435"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1435\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/1127"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=1435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=1435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=1435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}