Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The award-winning Phantom Next Generation solution enables organizations to safely gather open-source information and conduct research through foreign points of presence, all while safeguarding both organizations and individuals from potential foreign intelligence threats. Intelligent Waves has successfully integrated the GRAYPATH software-defined obfuscated network with the Phantom platform's managed attribution capabilities, creating a secure, unclassified solution. This advanced system leverages the full functionality of the GRAYPATH network, ensuring a low likelihood of detection and interception of application traffic, and effectively concealing the user's actual location. Meanwhile, the Phantom platform aligns the user's digital signature with the desired point of presence, ensuring anonymity. As a result, the user's actual IP address, geographic location, and data usage remain hidden, while the traffic they generate appears to originate from a remote point of presence (PoP) or interface server, enhancing overall security. This innovative approach represents a significant advancement in protecting sensitive research activities in an increasingly interconnected world.
Description
Introducing the innovative enterprise browser tailored for the evolving workplace. It offers robust protection against malware while safeguarding data across SaaS and web applications for users, regardless of their location or device. TalonWork stands out as a fortified Chromium-based browser that ensures web traffic is isolated directly on the user's device, delivering a seamless and native browsing experience. Additionally, it seamlessly integrates with well-known Identity Providers to facilitate easy user onboarding and enforce security policies effectively. With its advanced Data Loss Prevention (DLP) features, TalonWork significantly lowers the risk of cyber threats. This includes file encryption mechanisms that restrict the external sharing of sensitive documents and prevent their storage on local devices. Moreover, the browser enforces strict controls on clipboard usage, printing, and screenshots to further enhance security. TalonWork actively blocks access to harmful domains and phishing sites through URL filtering and improved safe browsing technologies. To top it off, it effectively prevents the transfer of malicious files by employing Talon’s file scanning capabilities or leveraging CrowdStrike Falcon X for additional security. Ultimately, TalonWork is designed to empower businesses to navigate the digital landscape securely and efficiently.
API Access
Has API
API Access
Has API
Integrations
CrowdStrike Falcon
CrowdStrike Falcon Adversary Intelligence
Facebook
Google
SAP Store
TikTok
X (Twitter)
YouTube
Integrations
CrowdStrike Falcon
CrowdStrike Falcon Adversary Intelligence
Facebook
Google
SAP Store
TikTok
X (Twitter)
YouTube
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Intelligent Waves
Founded
2006
Country
United States
Website
intelligentwaves.com/phantom/
Vendor Details
Company Name
Talon Cyber Security
Founded
2021
Country
United States
Website
talon-sec.com
Product Features
Product Features
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting