Virtual Desktop Strategies, Server Virtualization

Searchlight Cyber Announces Secure Virtual Browser for Cyber Investigators to Safely Access the Dark Web

searchlight-cyber-announces

Searchlight Cyber, the dark web intelligence company, has launched Stealth Browser, a secure and user-friendly virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, without risk to themselves or their organization. Stealth Browser is an enhancement to Searchlight’s Cerberus investigation platform, which is used by law enforcement agencies, enterprises and MSSPs to uncover criminal activity on the dark web, and has been used in some of the biggest criminal cases involving dark web activity.

The dark web is a critical source of intelligence for cybersecurity professionals, but accessing it carries risks for the investigator and their organization’s infrastructure. On their own systems, they run the risk of accidentally installing malware, exposing their digital fingerprint/proprietary IP address, or inadvertently leaking sensitive information. Stealth Browser eliminates these risks by automatically masking the investigator’s digital fingerprint, allowing both novice and experienced investigators to quickly and securely access Tor and I2P onions on the dark web without risk to themselves or their organization’s infrastructure.

With one-click, Stealth Browser allows the investigator to generate a virtual machine directly from any internet browser without the need to install any software. This is in stark contrast to the complex setup usually required to safely access the dark web, and allows analysts to get the relevant information they need more easily, without the need for lengthy administrative and approval processes.

Ben Jones, CEO and co-founder of Searchlight Cyber commented: “As with all of our solutions, Stealth Browser was developed in collaboration with our customers to address the challenges they face when conducting critical dark web investigations. Many organizations struggle with providing scalable and secure access to investigate threats on the dark web. Stealth Browser was created to allow any threat analyst, regardless of expertise, to get the information they need while always staying safe and secure.

“Threat hunters and investigators put themselves at risk when collecting intelligence on cybercriminals and malicious actors who are lurking in the shadows of the dark web. We created the Cerberus platform to allow organizations to securely investigate previously unobtainable dark web activity. The release of Stealth Browser is the continuation of this mission, further reducing risks in the fight to bring cyber criminals to justice.”

About Searchlight Cyber

Searchlight Cyber provides organizations with relevant and actionable dark web intelligence, to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.

Spotlight

Spotlight

Related News

Virtual Desktop Tools, Virtual Desktop Strategies

Leostream Enhances Security and Management of vSphere Hybrid Cloud Deployments

Business Wire | January 29, 2024

Leostream Corporation, the world's leading Remote Desktop Access Platform provider, today announced features to enhance security, management, and end-user productivity in vSphere-based hybrid cloud environments. The Leostream platform strengthens end-user computing (EUC) capabilities for vSphere users, including secure access to both on-premises and cloud environments, heterogeneous support, and reduced cloud costs. With the Leostream platform as the single pane of glass managing EUC environments, any hosted desktop environment, including individual virtual desktops, multi-user sessions, hosted physical workstations or desktops, and hosted applications, becomes simpler to manage, more secure, more flexible, and more cost-effective. Significant ways the Leostream platform expands vSphere’s capabilities include: Security The Leostream platform ensures data remains locked in the corporate network, and works across on-premises and cloud environments, providing even disparate infrastructures with the same levels of security and command over authorization, control, and access tracking. The Leostream platform supports multi-factor authentication and allows organizations to enforce strict access control rules, creating an EUC environment modeled on a zero-trust architecture. Multivendor/protocol support The Leostream platform was developed from the ground up for heterogeneous infrastructures and as the connection management layer of the EUC environment, the Leostream platform allows organizations to leverage vSphere today and other hypervisors or hyperconvergence platforms in the future as their needs evolve. The Leostream platform supports the industry’s broadest array of remote display protocols, including specialized protocols for mission-critical tasks. Consistent EUC experience The Leostream platform enables IT to make changes to the underlying environment while ensuring the end user experience is constant, and to incorporate AWS, Azure, Google Cloud, or OpenStack private clouds into their environment without disruptions in end-user productivity. By integrating with corporate Identity Providers (IdPs) that employees are already familiar with, and providing employees with a single portal they use to sign in, the Leostream platform offers simplicity to users too. Connectivity The Leostream Gateway securely connects to on-prem and cloud resources without virtual private networks (VPNs), and eliminates the need to manage and maintain security groups. End users get the same seamless login and high-performance connection across hybrid environments including corporate resources located off the internet. Controlling cloud costs The Leostream Connection Broker implements automated rules that control capacity and power state in the cloud, allowing organizations to optimize their cloud usage and minimize costs, such as ensuring cloud instances aren’t left running when they are no longer needed. The Connection Broker also intelligently pools and shares resources across groups of users, so organizations can invest in fewer systems, reducing overall cost of ownership. “These features deliver a streamlined experience with vSphere and hybrid or multi-cloud resources so end users remain productive, and corporate data and applications remain secure,” said Leostream CEO Karen Gondoly. “At a time when there is uncertainty about the future of support for VMware’s end-user computing, it’s important to bring these options to the market to show that organizations can extend vSphere’s capabilities and simultaneously plan for the future without disruption to the workforce.” About Leostream Corporation Leostream Corporation, the global leader in Remote Desktop Access Platforms, offers comprehensive solutions that enable seamless work-from-anywhere environments for individuals across diverse industries, regardless of organization size or location. The core of the Leostream platform is its commitment to simplicity and insight. It is driven by a unified administrative console that streamlines the management of users, cloud desktops, and IT assets while providing real-time dashboards for informed decision-making. The company continually monitors the evolving remote desktop landscape, anticipating future trends and challenges. This purposeful, proactive approach keeps clients well-prepared for the dynamic changes in remote desktop technology.

Read More