tornado™€¦ · cyber threat intelligence platform, provides a significant advantage by exposing...

2
peraton.com/tornado Highlights Exploits open source intelligence Uncovers data breaches and gaps in security controls Detects insider threats Augments existing teams with experienced cyber threat analysts IN-DEPTH THREAT ANALYSIS TORNADO™ Detecting cyber crime within the internet’s deepest layer With more than three billion people accessing the internet each day, cyber crime is becoming an increasingly pervasive and complex threat government and business encounter. Organizations must secure their enterprise using the most advanced cybersecurity and analytic tools available. TORNADO™, an open source cyber threat intelligence platform, provides a significant advantage by exposing hackers that use the DarkNet, the internet’s deepest layer, to store their information, trade illegal goods, and engage directly with other criminals around the world. TORNADO crawls and indexes thousands of deep web and DarkNet sites and forums daily in 33 languages. For most of us, the internet is a place to learn, communicate, and transact business. We routinely enter personal data including medical histories, credit card information, and photos of loved ones. For malicious hackers, the internet is the ideal environment for cyber crime activity. Allegedly private portals are routinely compromised and our information made public to user networks deep within the web. Using a secure algorithm, TORNADO automatically and anonymously scours one of the largest collections of DarkNet data available, collecting keywords and phrases. Proprietary cyber threat analysts convert the data to actionable intelligence enabling organizations to identify threats and prevent damaging data breaches to their enterprises. Law enforcement and intelligence agencies utilize TORNADO to help gather information that is difficult and sometimes dangerous to obtain. With this data, analysts can hone in on communications between known and emerging threat actors who may be planning, discussing, developing, or selling within specific areas of concern. This powerful capability improves cyber crime analysts’ and forensic specialists’ ability to prevent cyber and other crimes, and take targeted action against suspected criminals.

Upload: others

Post on 19-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TORNADO™€¦ · cyber threat intelligence platform, provides a significant advantage by exposing hackers that use the DarkNet, the internet’s deepest layer, to store their information,

peraton.com/tornado

Highlights• Exploits open source

intelligence

• Uncovers data breaches and gaps in security controls

• Detects insider threats

• Augments existing teams with experienced cyber threat analysts

IN-DEPTH THREAT

ANALYSIS

TORNADO™ Detecting cyber crime within the internet’s deepest layer

With more than three billion people accessing the internet each day, cyber crime is becoming an increasingly pervasive and complex threat government and business encounter. Organizations must secure their enterprise using the most advanced cybersecurity and analytic tools available. TORNADO™, an open source cyber threat intelligence platform, provides a significant advantage by exposing hackers that use the DarkNet, the internet’s deepest layer, to store their information, trade illegal goods, and engage directly with other criminals around the world.

TORNADO crawls and indexes thousands of deep web and DarkNet sites and forums daily in 33 languages.

For most of us, the internet is a place to learn, communicate, and transact business. We routinely enter personal data including medical histories, credit card information, and photos of loved ones. For malicious hackers, the internet is the ideal environment for cyber crime activity. Allegedly private portals are routinely compromised and our information made public to user networks deep within the web. Using a secure algorithm, TORNADO automatically and anonymously scours one of the largest collections of DarkNet data available, collecting keywords and phrases. Proprietary cyber threat analysts convert the data to actionable intelligence enabling organizations to identify threats and prevent damaging data breaches to their enterprises.

Law enforcement and intelligence agencies utilize TORNADO to help gather information that is difficult and sometimes dangerous to obtain. With this data, analysts can hone in on communications between known and emerging threat actors who may be planning, discussing, developing, or selling within specific areas of concern. This powerful capability improves cyber crime analysts’ and forensic specialists’ ability to prevent cyber and other crimes, and take targeted action against suspected criminals.

Page 2: TORNADO™€¦ · cyber threat intelligence platform, provides a significant advantage by exposing hackers that use the DarkNet, the internet’s deepest layer, to store their information,

IN-DEPTH THREAT ANALYSISTORNADO, a game-changer in the world of intelligence, is focused on exposing real threats and providing customers with the critical insights they need to aggressively combat malicious activity.

Unmatched CoverageCommon search engines only crawl the internet’s surface while TORNADO dives deep into the web. Its powerful search engine penetrates user networks consisting of thousands of computers, breaking through layers of encryption and exposing networks that use anonymity software to conceal their identities and online activity. TORNADO offers the most comprehensive look at the DarkNet with years of historical data made available across multiple areas and networks spanning:

Cyber Threat PreventionThe TORNADO analysis team, specializing in vulnerability assessment and penetration testing, alerts organizations to security gaps to save valuable time during testing procedures. Penetration tests exploit critical vulnerabilities and identify malicious activity including potential insider threats. If a breach is detected, TORNADO analysts can determine the extent of the breach safely without compromising the enterprise, risking detection, or becoming infected with viruses or malware.

Customized SolutionsWith our deep understanding of the cyber threat environment, we partner with customers to identify the right solution for the mission. Using an Application Programming Interface (API), customers have the option of importing TORNADO’s data directly into their own applications. Peraton offers the TORNADO solution as a stand-alone or with the option of augmenting existing teams with our experienced cyber threat analysts.

ABOUT PERATONPeraton provides innovative, reliable solutions to the nation’s most sensitive and mission-critical programs and systems. As a trusted provider of highly differentiated space, intelligence, cyber/SIGINT, defense, electronic warfare, homeland security, and secure communications capabilities, Peraton is a critical partner to the Intelligence Community, Department of Defense, and select federal agencies and commercial entities. Headquartered in Herndon, Virginia, the company employs approximately 3,500 people across the U.S. and Canada.

12975 Worldgate Drive, Herndon, VA 20170

peraton.com

For more information or to schedule a TORNADO demonstration, please contact us at [email protected] or visit peraton.com/TORNADO

• The Onion Router (TOR)• Invisible Internet Project (I2P)• Peer-to-Peer (P2P)• File Transfer Protocol (FTP)

• Internet Relay Channels (IRC) • DarkNet Forums• High-interest websites

Non-Export Controlled InformationPeraton is a registered trademark of Peraton. Trademarks and trade names are the property of their respective companies.© 2018 Peraton