Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Searchlight Cyber Announces Secure Virtual Browser for Cyber Investigators to Safely Access the Dark Web

Stealth Browser enhances award-winning Cerberus investigation platform by allowing investigators to isolate their infrastructure from malware on the dark web

Searchlight Cyber, the dark web intelligence company, has launched Stealth Browser, a secure and user-friendly virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, without risk to themselves or their organization. Stealth Browser is an enhancement to Searchlight’s Cerberus investigation platform, which is used by law enforcement agencies, enterprises and MSSPs to uncover criminal activity on the dark web, and has been used in some of the biggest criminal cases involving dark web activity.

AiThority Interview Insights: AiThority Interview with Oji Udezue, Chief Product Officer at Typeform

The dark web is a critical source of intelligence for cybersecurity professionals, but accessing it carries risks for the investigator and their organization’s infrastructure. On their own systems, they run the risk of accidentally installing malware, exposing their digital fingerprint/proprietary IP address, or inadvertently leaking sensitive information. Stealth Browser eliminates these risks by automatically masking the investigator’s digital fingerprint, allowing both novice and experienced investigators to quickly and securely access Tor and I2P onions on the dark web without risk to themselves or their organization’s infrastructure.

With one-click, Stealth Browser allows the investigator to generate a virtual machine directly from any internet browser without the need to install any software. This is in stark contrast to the complex setup usually required to safely access the dark web, and allows analysts to get the relevant information they need more easily, without the need for lengthy administrative and approval processes.

Read More about AiThority InterviewAiThority Interview with Kyle Wong, Chief Strategy Officer at Emplifi

Ben Jones, CEO and co-founder of Searchlight Cyber commented: “As with all of our solutions, Stealth Browser was developed in collaboration with our customers to address the challenges they face when conducting critical dark web investigations. Many organizations struggle with providing scalable and secure access to investigate threats on the dark web. Stealth Browser was created to allow any threat analyst, regardless of expertise, to get the information they need while always staying safe and secure.

“Threat hunters and investigators put themselves at risk when collecting intelligence on cybercriminals and malicious actors who are lurking in the shadows of the dark web. We created the Cerberus platform to allow organizations to securely investigate previously unobtainable dark web activity. The release of Stealth Browser is the continuation of this mission, further reducing risks in the fight to bring cyber criminals to justice.”

 Latest AiThority Interview Insights : AiThority Interview with Jon Zimmerman, Chief Executive Officer at Holon Solutions

 [To share your insights with us, please write to sghosh@martechseries.com] 

Comments are closed.