Available for both iOS and Android, this app gives users mobile access to alerts and investigation tools, keeping them connected to network security while on the move.
What is the Mobile App
TRUE or FALSE: CSM owns post-sales execution (e.g. adoption plan, onboarding (if not specialist), and customer outcomes
What is TRUE
When a customer says, "We don't have time to adopt this right now," what is the next best step?
What is align with their priorities and show time-saving use cases
This is the target KPI percentage for completed Executive Business Reviews (EBRs) per Customer Success Manager (CSM).
≥90%
This italian dish's name means "little worms" in English
What is spaghetti
Uses supervised and unsupervised machine learning to automatically investigate and triage alerts, saving significant analyst time
What is Cyber AI Analyst
How many stages are in the new customer journey framework?
What is 4 (Close, Adopt, Renew, Expand)
If a customer goes quiet, what's one effective re-engagement tactic?
What is sharing tailored insights like the Cyber Insights Report
What is Executive Business Review
This planet is closest to the sun
What is Mercury
This advanced network analysis technique now supported in OT environments enables greater protocol awareness by thoroughly examining traffic to identify specialized assets, detect hidden malicious activity, and generate reliable device risk profiles.
What is deep packet inspection (DPI)
If a small-company IT Head raises budget concerns, this is what you should do
Highlight cost of a breach vs their solution
The best way to handle an angry customer on a call is to do this first
What is listen without interruption and acknowledge their frustration
What is the next step after completing an EBR?
What is follow up: schedule the next call with the customer, prepare a success plan for the customer, create a meeting summary and attach your notes to your customers success solution
Water boils at this temperature in Celsius at sea level
What is 100 degrees Celsius
This feature introduced in 6.3 focuses on the early detection of critical threats. It analyzes millions of real-world attack patterns to predict which incidents are most likely to escalate.
What is DIGEST (Darktrace Incident Graph Evaluation for Security Threats)
If a CISO worries about resources, you should do this
When a customer asks about a competitor, what's your first move?
What is ask discovery questions to understand what matters most to them
The three focus areas for Customer Experience in FY26
What is Accelerate Time to Value, Proactive Customer Health Management, and Scale Customer Experience Delivery
This character from The Office famously declared, "I declare bankruptcy!"
Who is Michael Scott
This /NETWORK Autonomous Response module allows administrators to configure IP and MAC address behaviors separately, define VLAN interface settings, and validate interface compatibility.
What is Custom Routes
These are the top pain points and challenges for a Head of Cloud Security
What is Limited Visibility, Dynamic Environment, Sophisticated Threats, and Compliance Pressure
One phrase to avoid when delivering bad news to a customer
What is "that's just our policy"
This role will provide technical expertise and guidance (post activation)
What is Customer Success Engineer
This is the only mammal capable of true flight
What is a bat