Popular Resources

White Paper
White Paper

Why Online Investigators Need Managed Attribution

Without the ability to control details of your digital fingerprint, investigative targets could uncover your identity and intent — and spoil your investigation or put you at personal risk.

Read more
Success Story
Success Story

Online Payment Platform Investigates Threats to Their Brand and Reputation

An online payment platform’s brand reputation agents needed secure, anonymous access to websites, social media and local sources to effectively follow up on suspicious activity and threat reports.

Read more
FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Resource Type
  • Option1
  • Option2
  • Option3
Success Story
Success Story

Enabling Remote Work for Discriminating Professionals

Authentic8 helps Navy Cyber Defense Operations Command turn social distancing and telework directives into an opportunity for improving security

Success Story
Success Story

Rapidly Enabling Remote Workers in a Federal Workforce

A U.S. government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis

Success Story
Success Story

Large Regional Bank Protects Their Customers Against Fraud

A large bank’s fraud investigations team uses Silo to examine suspicious transactions, explore phishing sites, and conduct KYC regulations research

Guide
Guide

Online Investigations: 5 Mistakes Putting You at Risk

Online sources can also be perilous. This guide reveals top mistakes online investigators make and offers suggestions on how to avoid them

On-Demand Webinar
On-Demand Webinar

Naked & Exposed, Part 1: Stop Investigating Online Without Managed Attribution

Managed attribution is essential to keeping online investigations secure and anonymous

On-Demand Webinar
On-Demand Webinar

Trust and Safety, Part 1: Teams Have a Lot to Hide

Trust and safety teams investigate potentially harmful situations, monitor user activity and set up policies to build an environment of trust

On-Demand Webinar
On-Demand Webinar

Intro to the Dark Web: What's Hiding in the Dark

An introductory webinar on the basics of the dark web, and why it could be a useful asset for investigators

Datasheet
Datasheet

Silo for Research: Shared Storage

Shared Storage delivers collaboration from within the integrated research tool suite you already know

Datasheet
Datasheet

Gofer extension for Silo for Research

Configure and seamlessly execute multi-search workflows. A set of preconfigured websites and workflows can be customized to fit any investigation.

Close
Close