Telos, a leading provider of security solutions for the world’s most security-conscious organizations, announced the availability of a new version of Telos Ghost, a secure, cloud-based, patented system for private, secure and anonymous operations on the internet. The release includes new operational capabilities as well as enhanced performance and security for Telos Ghost users.
New capabilities available with this latest release include Virtual Desktop Infrastructure (VDI) access and IP rotation. VDI access provides additional separation of the user client device from the network, enhancing user security and managed attribution.
IP rotation of the internet-facing endpoints provides avoidance of detection by targeted sites, providing enhanced protection against cyber adversaries attempting to analyze internet-based mission or organizational operations.
Enhancements have also been made to the dynamic IP routing capability for data in transit. The network performance of Telos Ghost has been increased with significantly expanded throughput capacity for internet activity, primarily to support downloading and uploading large amounts of data.
“Telos Ghost safeguards the privacy of the organization and users to ensure that internet-based network attack surfaces are eliminated,” said Tom Badders, senior product manager at Telos. “We continually look to make sure our offerings are leading the market and meeting the ever-evolving needs of our customers.”
“Standard VPNs and encryption schemes don’t offer sufficient protection to assure security-conscious organizations that their communications will remain safe in all remote and mobile applications,” said John B. Wood, CEO and chairman of Telos.
“Our patented methodologies enable Telos Ghost to protect data with multiple layers of encryption and send it through a labyrinth of anonymous network nodes, making it ideal for highly sensitive and confidential communications. It works under the premise, that if you can’t be seen, you can’t be hacked.”
Telos Ghost is a robust, scalable, cloud-based secure network that provides private, shared, or hybrid access, allowing customers to access and/or own a private network without the cost of designing, implementing and managing the network.
Its flexible capabilities are offered as a service and as tailored applications to provide a completely anonymous way to do business, share intelligence, and assess cyber threats online, keeping business and mission-critical communications hidden from adversaries and safe from intrusion.
Telos Ghost protects enterprises through three available configurations:
- Private web access — disguises the identity and location of personnel when using the public web for threat intelligence and competitive research with world-wide points of presence.
- Private network access — privatizes the public internet to an organization’s private enclave, allowing authorized users to work with mission-critical enterprise information without being seen or discovered.
- Cloaked services — hides information and communications in a private internet and provide remote users with the ability to securely talk, text, email, store information, and use video and applications over any mobile device.
With Telos Ghost, organizations can investigate threats anonymously online and manage operations without giving away location or identity. Furthermore, users can exchange sensitive information and do so with confidence, knowing their information and identity are confidential.