  {"id":5309,"date":"2017-04-05T23:00:25","date_gmt":"2017-04-06T03:00:25","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/"},"modified":"2017-04-05T23:00:25","modified_gmt":"2017-04-06T03:00:25","slug":"darktrace-using-machine-learning-for-cyber-security","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/","title":{"rendered":"Darktrace &#8211; Using Machine Learning for Cyber Security."},"content":{"rendered":"<p>We have all heard of the multiple recent news regarding cyber security, ranging from <a href=\"https:\/\/www.nytimes.com\/2016\/12\/14\/technology\/yahoo-hack.html?_r=0\">Yahoo\u2019s hacking <\/a>\u00a0of 1 billion accounts (which almost led to the failure of the Yahoo-Verizon deal) to the alleged Russian hacking of the <a href=\"https:\/\/www.nytimes.com\/2017\/01\/10\/opinion\/russias-dnc-hack-was-only-the-start.html\">DNC<\/a> during the presidential election. In a world where cyber threats are getting more and more sophisticated and can cost companies a lot of money, <a href=\"https:\/\/www.darktrace.com\/\">DarkTrace<\/a> is a start-up that is trying to improve cyber-security through the use of machine learning and artificial intelligence.<\/p>\n<p>Backed by KKR, Summit Partners, Softbank and Mike Lynch, Darktrace is a UK-based start-up created in 2013 by mathematicians from the University of Cambridge and uses Artifical Intelligence algorithms to protect enterprise networks from attacks.<\/p>\n<p style=\"text-align: center\"><iframe loading=\"lazy\" title=\"Darktrace Overview\" src=\"https:\/\/player.vimeo.com\/video\/116153811?dnt=1&amp;app_id=122963\" width=\"640\" height=\"360\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe><\/p>\n<p>A traditional cyber-security system searches for intruding pre-defined threats within the enterprise network\u2019s firewalls, using a database of \u2018signatures\u2019 of all known threats. That is why we have to \u2018update\u2019 our antivirus software frequently so that our database of signatures is up to date with recent threats. This approach has however its limits: If a threat or attack has never been seen before, the cyber-defense system does not work (these types of attacks are called zero-day attacks). The approach also does not work when the attack is coming for insiders, for example when an employee of the enterprise is leaking information (either intentionally or not).<\/p>\n<p>Darktrace\u2019s solution, called \u2018Enterprise Immune System\u2019, functions differently. Darktrace uses machine learning algorithms to \u2018learn\u2019 what is the \u2018normal behavior\u2019 of the network by analyzing data on the activity on the network at the device and employee level. The machine learning algorithms are \u2018trained\u2019 using data on the network\u2019s behavior, and learn how the network behaves over time, reaching 80% of its intelligence after a month and peaking after 1 year. This results in a specifically tailored Enterprise Immune System for that particular enterprises\u2019 network, where it has learned to identify any communication on the network that is not \u2018normal\u2019. The Enterprise Immune System identifies threats that would have been overlooked with the previous approaches, such as insider and human threats as well as enterprise data integrity breaches. The solution includes a visualization tool that shows the network topology and help visualize current status of the networks and identified threats.<\/p>\n<p>One of the key challenges faced by Darktrace lays in marketing strategy. The company has to deal with complex purchasing processes at large enterprises, which creates long and costly sale cycles. The sensitivity of the cyber security topic creates an additional challenge for a small start-up to stand out against large established competitors. \u00a0Finally, the complexity of the product and technology creates an additional challenge to clearly , communicate the solution\u2019s differentiating features, especially as \u201cartificial intelligence\u201d is a buzz-word that is used by multiple\u00a0companies, creating confusion on customers minds.<\/p>\n<p><strong>Sources: <\/strong><\/p>\n<p><a href=\"https:\/\/www.darktrace.com\/\">https:\/\/www.darktrace.com\/<\/a><\/p>\n<p><a href=\"https:\/\/www.darktrace.com\/resources\/#white-papers\">Darktrace white paper: \u201cThe Enterprise Immune System\u201d<\/a><\/p>\n<p><a href=\"https:\/\/www.crunchbase.com\/organization\/darktrace\">https:\/\/www.crunchbase.com\/organization\/darktrace<\/a><\/p>\n<p><a href=\"http:\/\/www.wired.co.uk\/article\/darktrace-machine-learning-security\">http:\/\/www.wired.co.uk\/article\/darktrace-machine-learning-security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DarkTrace is a UK-based start-up that is improving cyber-security through the use of machine learning and artificial intelligence to develop an &#8216;Enterprise Immune System&#8217;<\/p>\n","protected":false},"author":503,"featured_media":5310,"comment_status":"open","ping_status":"closed","template":"","categories":[1273,29,235,366],"class_list":["post-5309","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-artificial-intelligence","category-big-data","category-cyber-security","category-machine-learning"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-digit\/assignment\/data-and-analytics-as-digital-assets\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation\" \/>\n<meta property=\"og:description\" content=\"DarkTrace is a UK-based start-up that is improving cyber-security through the use of machine learning and artificial intelligence to develop an &#039;Enterprise Immune System&#039;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Innovation and Transformation\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2017\/04\/Darktrace.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/\",\"name\":\"Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2017\\\/04\\\/Darktrace.png\",\"datePublished\":\"2017-04-06T03:00:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2017\\\/04\\\/Darktrace.png\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2017\\\/04\\\/Darktrace.png\",\"width\":1500,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-using-machine-learning-for-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Darktrace &#8211; Using Machine Learning for Cyber Security.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\",\"name\":\"Digital Innovation and Transformation\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation","og_description":"DarkTrace is a UK-based start-up that is improving cyber-security through the use of machine learning and artificial intelligence to develop an 'Enterprise Immune System'","og_url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/","og_site_name":"Digital Innovation and Transformation","og_image":[{"width":1500,"height":500,"url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2017\/04\/Darktrace.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/","url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/","name":"Darktrace - Using Machine Learning for Cyber Security. - Digital Innovation and Transformation","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2017\/04\/Darktrace.png","datePublished":"2017-04-06T03:00:25+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2017\/04\/Darktrace.png","contentUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2017\/04\/Darktrace.png","width":1500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-using-machine-learning-for-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-digit\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/"},{"@type":"ListItem","position":3,"name":"Darktrace &#8211; Using Machine Learning for Cyber Security."}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website","url":"https:\/\/d3.harvard.edu\/platform-digit\/","name":"Digital Innovation and Transformation","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-digit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/5309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/users\/503"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/comments?post=5309"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/5309\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media\/5310"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media?parent=5309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/categories?post=5309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}