SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
CASE STUDY
Overview
Industry
•	 Retail
Challenge
•	 Intelligent cyber adversaries
•	 Inadequate legacy tools
•	 Incomplete network visibility
•	 Insider threat
Results
•	 Real-time threat detection
•	 100% network visibility
•	 Ability to carry out in-depth
investigations and risk-mitigation
•	 Increased efficiency in handling
issues
Business Background
Chantecler is one of the leading jewelry brands in Italy, established on the island
of Capri in 1947. The family-run business now boasts six boutiques in Italy,
Japan, China and Kazakhstan, bringing its high-end jewelry collection around the
world. The company values tradition and the historic roots of its brand whilst
continually developing new designs and modern collections.
“The machine learning aspect of the technology is
fantastic. We have been alerted to information that
we would never have found out otherwise.”
Claudio Nasti, IT Manager, Chantecler
Challenge
Chantecler had been looking for a cyber security solution capable of defending
its network from the latest, most advanced cyber-attacks.The company designs,
produces and distributes its own jewelry onsite in Italy, and, as such, places the
utmost importance on defending its digital assets and intellectual property
against cyber adversaries.
As well as the threat posed by malicious outsiders trying to infiltrate its network,
the retailer was concerned about insider threat. With a global workforce,
connected by a large, dynamic network, the potential for an insider’s access to
be exploited, by the employees themselves or not, is high.
Chantecler needed a technology capable of providing complete network visibility,
something unachievable with legacy tools. This would provide the retailer with
a better understanding of employee behavior and the ability to spot suspicious
behavior and vulnerable devices, which may be indicators of future cyber-attack.
Chantecler – Leading Italian Jewelry Brand
Solution
Chantecler completed a 4-week Proof of Value (‘POV’) with Darktrace’s Enterprise Immune System. The self-learning technology is
inspired by the biological principals of the human immune system and powered by machine learning and mathematics developed by
specialists from the University of Cambridge.
The technology is installed as an appliance, in under an hour, and immediately begins to model the behaviors of all users, devices and
the network as a whole to establish a ‘pattern of life’. Its dynamic and adaptive understanding of what is normal activity allows the
Enterprise Immune System to detect anomalous behaviors which may be indicative of cyber-threat, in real time, and immediately report
the potential issues to Chantecler’s IT team.
Chantecler was impressed by the technology’s capabilities and decided to deploy the system across its network. “We analyzed several
solutions on the market but found Darktrace to be the most comprehensive and effective technology available,” said Claudio Nasti, IT
Manager, Chantecler.
“The machine learning aspect of the technology is fantastic. We have been alerted to
information that we would never have found out otherwise.”
Claudio Nasti, IT Manager, Chantecler
Benefits
Thanks to Darktrace’s immune system technology, Chantecler is now informed of any potential issues on its network, as soon as they
occur, via the Threat Visualizer interface, allowing its security team to carry out in-depth investigations and take the necessary action to
mitigate any risk posed.
The interface provides a 3D graphical representation of Chantecler’s network, as well as classification and playback tools, allowing
the retailer’s IT team to handle issues efficiently. Moreover, the team receives weekly Threat Intelligence Reports (‘TIRs’) written by
Darktrace’s expert analysts, which concisely summarize the latest anomalous events detected.
“The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out
otherwise,” added Claudio Nasti. “The Enterprise Immune System allows us to relax, knowing that it is constantly monitoring our network
and will detect any issues that we need to investigate further.”
Ultimately, Chantecler now has 100% network visibility and is better equipped to protect its critical assets and business reputation
against today’s intelligent cyber-attackers, increasing its confidence in its overall cyber defense strategy and allowing its further growth
as a leading Italian jewelry brand.
About Darktrace
Darktrace is a world-leading cyber-threat defense company. Its multi-award-winning Enterprise
Immune System technology automatically detects and responds to emerging threats, powered by
machine learning and mathematics developed by specialists from the University of Cambridge.
Without using rules or signatures, Darktrace models the ‘pattern of life’ of every device, user and
network within an organization, identifying and mitigating cyber-threats before damage is done.
Darktrace’s self-learning technology has been deployed globally and across all sectors, including
energy, retail, telecommunications, manufacturing, financial services and healthcare. The company
is headquartered in San Francisco and Cambridge, UK, with over 20 global offices including London,
New York, Milan, Mumbai, Paris, Singapore, Sydney, Tokyo and Toronto.
Contact Us
US: +1 (415) 243 3940
Europe: +44 (0) 1223 324 114
APAC: +65 6248 4516
Email: info@darktrace.com
www.darktrace.com

Más contenido relacionado

La actualidad más candente

Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World KeynoteJohn Kinsella
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Epoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal, Inc.
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business ResiliencePECB
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDragos, Inc.
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Sal Velasco
 

La actualidad más candente (20)

Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
Unlocked Episode 3: Unlocking Video Surveillance
Unlocked Episode 3: Unlocking Video SurveillanceUnlocked Episode 3: Unlocking Video Surveillance
Unlocked Episode 3: Unlocking Video Surveillance
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Artificially intelligent
Artificially intelligentArtificially intelligent
Artificially intelligent
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World Keynote
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Epoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal Solution: Security Offerings
Epoch Universal Solution: Security Offerings
 
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
 

Destacado (14)

6782
67826782
6782
 
2010 YouToo nonprofit workshop
 2010 YouToo nonprofit workshop 2010 YouToo nonprofit workshop
2010 YouToo nonprofit workshop
 
R.a. no.156 modif. pac inclusion y exclusion(1)
R.a. no.156 modif. pac inclusion y exclusion(1)R.a. no.156 modif. pac inclusion y exclusion(1)
R.a. no.156 modif. pac inclusion y exclusion(1)
 
대신리포트_마켓 브라우저_140401
대신리포트_마켓 브라우저_140401대신리포트_마켓 브라우저_140401
대신리포트_마켓 브라우저_140401
 
Colombia frente a sus potencias mundiales.
Colombia frente a sus potencias mundiales.Colombia frente a sus potencias mundiales.
Colombia frente a sus potencias mundiales.
 
la letra e de todas la vocales que existe
la letra e de todas la vocales que existela letra e de todas la vocales que existe
la letra e de todas la vocales que existe
 
ActivSpaces Cameroon Al Banda Incubating Start Ups
ActivSpaces Cameroon Al Banda Incubating Start UpsActivSpaces Cameroon Al Banda Incubating Start Ups
ActivSpaces Cameroon Al Banda Incubating Start Ups
 
K9 2
K9 2K9 2
K9 2
 
ใบงานที่ 17
ใบงานที่ 17ใบงานที่ 17
ใบงานที่ 17
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
6808
68086808
6808
 
Patronaje femenino
Patronaje femenino Patronaje femenino
Patronaje femenino
 
CCNP CERTIFICATE
CCNP CERTIFICATECCNP CERTIFICATE
CCNP CERTIFICATE
 
Malaria
MalariaMalaria
Malaria
 

Similar a Cs chantecler

SEI torino forum 2019
SEI torino forum 2019SEI torino forum 2019
SEI torino forum 2019Andrea Griva
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesTony Zirnoon, CISSP
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...Digital Transformation EXPO Event Series
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfTop 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfSonaliG6
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceTony Zirnoon, CISSP
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)Manuel Mejías
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208Manuel Mejías
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadRocco Magnotta
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 

Similar a Cs chantecler (20)

Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
SEI torino forum 2019
SEI torino forum 2019SEI torino forum 2019
SEI torino forum 2019
 
Industry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_DevicesIndustry_Brief_TrapX_Medical_Devices
Industry_Brief_TrapX_Medical_Devices
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Top 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdfTop 15 AI-enabled cybersecurity companies in 2022.pdf
Top 15 AI-enabled cybersecurity companies in 2022.pdf
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Cybersecurity Research.pptx
Cybersecurity Research.pptxCybersecurity Research.pptx
Cybersecurity Research.pptx
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 

Más de Claudio Nasti ✔

Invito dig f&f ch maggio
Invito dig f&f ch maggioInvito dig f&f ch maggio
Invito dig f&f ch maggioClaudio Nasti ✔
 
L'arroganza della Conoscenza
L'arroganza della ConoscenzaL'arroganza della Conoscenza
L'arroganza della ConoscenzaClaudio Nasti ✔
 
Big data qualche riflessione
Big data qualche riflessioneBig data qualche riflessione
Big data qualche riflessioneClaudio Nasti ✔
 
Pederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativaPederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativaClaudio Nasti ✔
 
Stampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuroStampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuroClaudio Nasti ✔
 
Speciale server storage office automation giugno 2013
Speciale server storage office automation  giugno 2013Speciale server storage office automation  giugno 2013
Speciale server storage office automation giugno 2013Claudio Nasti ✔
 
Brochure fashion luxury_sas_n
Brochure fashion luxury_sas_nBrochure fashion luxury_sas_n
Brochure fashion luxury_sas_nClaudio Nasti ✔
 

Más de Claudio Nasti ✔ (9)

Invito dig f&f ch maggio
Invito dig f&f ch maggioInvito dig f&f ch maggio
Invito dig f&f ch maggio
 
L'arroganza della Conoscenza
L'arroganza della ConoscenzaL'arroganza della Conoscenza
L'arroganza della Conoscenza
 
On retailmagazine
On retailmagazineOn retailmagazine
On retailmagazine
 
Big data qualche riflessione
Big data qualche riflessioneBig data qualche riflessione
Big data qualche riflessione
 
Pederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativaPederneschi creativita e_innovazione_organizzativa
Pederneschi creativita e_innovazione_organizzativa
 
Friend & Familiy 2016
Friend & Familiy 2016Friend & Familiy 2016
Friend & Familiy 2016
 
Stampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuroStampa 3 d il manifacturing del futuro
Stampa 3 d il manifacturing del futuro
 
Speciale server storage office automation giugno 2013
Speciale server storage office automation  giugno 2013Speciale server storage office automation  giugno 2013
Speciale server storage office automation giugno 2013
 
Brochure fashion luxury_sas_n
Brochure fashion luxury_sas_nBrochure fashion luxury_sas_n
Brochure fashion luxury_sas_n
 

Último

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Cs chantecler

  • 1. CASE STUDY Overview Industry • Retail Challenge • Intelligent cyber adversaries • Inadequate legacy tools • Incomplete network visibility • Insider threat Results • Real-time threat detection • 100% network visibility • Ability to carry out in-depth investigations and risk-mitigation • Increased efficiency in handling issues Business Background Chantecler is one of the leading jewelry brands in Italy, established on the island of Capri in 1947. The family-run business now boasts six boutiques in Italy, Japan, China and Kazakhstan, bringing its high-end jewelry collection around the world. The company values tradition and the historic roots of its brand whilst continually developing new designs and modern collections. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise.” Claudio Nasti, IT Manager, Chantecler Challenge Chantecler had been looking for a cyber security solution capable of defending its network from the latest, most advanced cyber-attacks.The company designs, produces and distributes its own jewelry onsite in Italy, and, as such, places the utmost importance on defending its digital assets and intellectual property against cyber adversaries. As well as the threat posed by malicious outsiders trying to infiltrate its network, the retailer was concerned about insider threat. With a global workforce, connected by a large, dynamic network, the potential for an insider’s access to be exploited, by the employees themselves or not, is high. Chantecler needed a technology capable of providing complete network visibility, something unachievable with legacy tools. This would provide the retailer with a better understanding of employee behavior and the ability to spot suspicious behavior and vulnerable devices, which may be indicators of future cyber-attack. Chantecler – Leading Italian Jewelry Brand
  • 2. Solution Chantecler completed a 4-week Proof of Value (‘POV’) with Darktrace’s Enterprise Immune System. The self-learning technology is inspired by the biological principals of the human immune system and powered by machine learning and mathematics developed by specialists from the University of Cambridge. The technology is installed as an appliance, in under an hour, and immediately begins to model the behaviors of all users, devices and the network as a whole to establish a ‘pattern of life’. Its dynamic and adaptive understanding of what is normal activity allows the Enterprise Immune System to detect anomalous behaviors which may be indicative of cyber-threat, in real time, and immediately report the potential issues to Chantecler’s IT team. Chantecler was impressed by the technology’s capabilities and decided to deploy the system across its network. “We analyzed several solutions on the market but found Darktrace to be the most comprehensive and effective technology available,” said Claudio Nasti, IT Manager, Chantecler. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise.” Claudio Nasti, IT Manager, Chantecler Benefits Thanks to Darktrace’s immune system technology, Chantecler is now informed of any potential issues on its network, as soon as they occur, via the Threat Visualizer interface, allowing its security team to carry out in-depth investigations and take the necessary action to mitigate any risk posed. The interface provides a 3D graphical representation of Chantecler’s network, as well as classification and playback tools, allowing the retailer’s IT team to handle issues efficiently. Moreover, the team receives weekly Threat Intelligence Reports (‘TIRs’) written by Darktrace’s expert analysts, which concisely summarize the latest anomalous events detected. “The machine learning aspect of the technology is fantastic. We have been alerted to information that we would never have found out otherwise,” added Claudio Nasti. “The Enterprise Immune System allows us to relax, knowing that it is constantly monitoring our network and will detect any issues that we need to investigate further.” Ultimately, Chantecler now has 100% network visibility and is better equipped to protect its critical assets and business reputation against today’s intelligent cyber-attackers, increasing its confidence in its overall cyber defense strategy and allowing its further growth as a leading Italian jewelry brand. About Darktrace Darktrace is a world-leading cyber-threat defense company. Its multi-award-winning Enterprise Immune System technology automatically detects and responds to emerging threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace models the ‘pattern of life’ of every device, user and network within an organization, identifying and mitigating cyber-threats before damage is done. Darktrace’s self-learning technology has been deployed globally and across all sectors, including energy, retail, telecommunications, manufacturing, financial services and healthcare. The company is headquartered in San Francisco and Cambridge, UK, with over 20 global offices including London, New York, Milan, Mumbai, Paris, Singapore, Sydney, Tokyo and Toronto. Contact Us US: +1 (415) 243 3940 Europe: +44 (0) 1223 324 114 APAC: +65 6248 4516 Email: info@darktrace.com www.darktrace.com