Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Darktrace has announced that Bassadone Automotive Group has deployed Darktrace Enterprise Immune System

November 2016 by Marc Jacob

Darktrace has announced that Bassadone Automotive Group, a leading European vehicle supplier, has deployed Darktrace to defend its network from malicious attacks and insider threat.

Based in Gibraltar, Bassadone Automotive Group supplies vehicles and spare parts domestically and internationally on behalf of car manufacturers including Toyota, Honda and Kia. Bassadone decided to employ Darktrace’s Enterprise Immune System technology across its networks, due to its ability to adaptively understand all user and device activity, and detect potential problems that may represent a threat.

Powered by machine learning and mathematics developed by specialists from the University of Cambridge, the Enterprise Immune System learns the ‘pattern of life’ of every user, device and the network as a whole. By understanding this, Darktrace can automatically detect any emerging anomalies in real time, and alert the company before a crisis occurs.

“Darktrace ticks all the boxes. It assures us nothing malicious is on our network, whilst giving us confidence that if anything does creep in, we will find out about it, at the earliest possible stage,” said Albert Marsden, IT Director, Bassadone Automotive Group. “I’ve been working in software development for over 25 years and I’ve been blown away by Darktrace, I’ve never come across anything like it.”

“Like many modern businesses, Bassadone Automotive Group has a large and dynamic network that requires cyber defense technologies which are able to catch potential insider threats early, whether they are malicious or not. This is beyond the capabilities of a legacy approach,” said Nick Trim, Managing Director, Darktrace EMEA. “Companies all over the world are now using Darktrace to automatically detect the subtlest indications of cyber-attack, whatever form they take, in order to protect their critical assets.”

See previous articles


See next articles