Searchlight Cyber has released new features as part of its DarkIQ platform, allowing live dark web traffic monitoring.
This unique capability provides its users with the ability to not only gather dark web data to help with threat investigation, but also anticipate cyber attacks and stop them before sustaining damage.
By anticipating and stopping cyber threats before they launch an attack, there is a significant reduction in both impact and cost.
Tor network monitoring with a twist
DarkIQ provides businesses with the ability to monitor traffic between their own infrastructure and Tor going in both directions.
Traffic traveling from the dark web to the company can provide insights into hackers attempting to gain access to data or trying to install malware. Traffic traveling externally from the company to the dark web can suggest that employees are using the dark web, that hackers have already breached a company network, or if data is being extracted from company systems and uploaded to the dark web.
The latest enhancements to the Dark Web Monitoring system include; enhanced granularity allowing your cyber security team to see detailed information on connections to and from the dark web including how much data is being transferred; new visualizations allowing security teams identify threats through data analysis; and traffic splitting which divides incoming and outgoing traffic to allow more efficient threat identification.
“Dark web traffic between Tor and the corporate network is a very reliable datapoint for identifying malicious activity, and we have seen first hand how organizations have used it to identify cyberattacks and take preventative action before any damage was done,” said CTO of Searchlight Cyber, Dr Gareth Owenson.
“However, this relies on them firstly having visibility into the traffic, and secondly having the data points they need to identify where to start their investigation. The enhancements we have made to our Dark Web Traffic Monitoring feature provide our customers with even more context, to help them assess exactly what malicious activity is taking place, and the best mitigative actions they can take.”
More from TechRadar Pro
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Benedict Collins is a Staff Writer at TechRadar Pro covering privacy and security. Before settling into journalism Ben worked as a Livestream Production Manager, covering games in the National Ice Hockey League for 5 years and contributing heavily to the advancement of livestreaming within the league.
He has a MA in Security, Intelligence and Diplomacy, alongside a BA in Politics with Journalism, both from the University of Buckingham. Outside of work Ben follows many sports; most notably ice hockey and rugby. When not running or climbing, Ben can most often be found deep in the shrubbery of a pub garden.