Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

See what’s new in Silo

Recorded on August 25, 2022, the Authentic8 product team walks through the latest functionality in Silo for Research and Silo for Safe Access.

Silo for Safe Access:

Learn all about the new platform for Silo for Safe Access. It’s a faster and more reliable experience built around the latest Chromium stack. Real-time demos will highlight the latest features, including:

  • Credential management for all admins and user web apps
  • File management capabilities, such as view file
  • Easily bookmark pages for new sessions with the enhanced persistent bookmark bar

Silo for Research:

We will also highlight and demo a number of Silo for Research enhancements improving its functionality, usability and utility for users and admins, including:

  • New user interface and improvements to streamline common workflows
  • Collector customers can now access the Collector UI within Silo for Research
  • Improvements to the screenshot tool

For your convenience, the webinar has chapters so you can focus on the sections that are most interesting to you. Complete the form to watch this webinar on-demand now.

Speakers

Miguel Ramos headshot
Miguel Ramos
Head of Product Management Authentic8

Miguel leads ​​product management and product marketing at Authentic8. Previously he was the corporate strategy director at Forcepoint, where he worked with the senior leadership team to establish Forcepoint’s long-term strategy and identify and evaluate new market opportunities. Miguel began his career in software engineering, and over the years held several product management roles at companies such as Raytheon, Neustar and Network Solutions.

Daniel Ben-Chitrit headshot
Daniel Ben-Chitrit
Director of Product Management Authentic8

Dan is the director of product management for the Silo Platform at Authentic8. He has a decade of experience building different cybersecurity products and services, and spent several years performing threat hunting to support threat intelligence collection and analysis across both the public and private sectors.

Close
Close