Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More
Resource library
Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers
Popular Resources
Guide
OSINT resources for CTI
This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.
Read more
Success Story
Leading software developer uses Zero Trust Application Access to control app access for distributed workforce
A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices
Read more
All resources
Topics
Topic
Cyber threat intelligence
Incident response
OSINT
Managed attribution
Dark web
Intel and evidence
Web isolation
Products
Products
Silo for Research
Zero Trust Application Access
Risky Web Link Isolation
Risky Email Link Isolation
Secure Browsing
Resource Type
Product Information
Success Story
Infographic
Guide
Podcast
White Paper
Webinar
Reset
Guide
Rapidly enabling remote workers in time of crisis
Practical advice for CIOs and CISOs on how to quickly and securely enable remote workers in time of crisis
Read more
Video
Why cyber threat intelligence researchers need access to the dark web
SANS expert Jake Williams and Authentic8’s Nick Espinoza talk about where CTI researchers can find high-value data while staying secure and anonymous
Watch Now
Video
How to use OSINT for cyber threat intelligence investigations
SANS expert Jake Williams and Authentic8’s Nick Espinoza discuss the current landscape around cyber threat intelligence and open-source intelligence (OSINT)
Watch Now
Solution Brief
Law enforcement in the digital age
Collect social media and dark web evidence anonymously and in compliance
Read more
Video
Challenges in the browser & securing web sessions
Authentic8 CEO Scott Petry speaks to Business Security Weekly on how he's used the cloud to disrupt the infosec market for nearly 20 years
Watch Now
Video
The Silo Sessions #18: James Kettle, PortSwigger
James Kettle of PortSwigger Web Security discusses an "ancient" exploit, HTTP Request Smuggling, which keeps threatening web servers and the browser
Watch Now
Video
Silo for Research for law enforcement
Silo for Research can keep your online investigations compliant, anonymous and secure
Watch Now
Video
The Silo Sessions #16: GDPR outlook with Scott Petry & Steve Durbin
Authentic8’s CEO Scott Petry and Steve Durbin, Managing Director of ISF, discuss how the EU regulators are ramping up their data protection efforts
Watch Now
Video
The Silo Sessions #15: JavaScript template attacks - how do they work?
A local browser can be used by attackers for targeted exploits. Security researcher Michael Schwarz explains JavaScript Template Attacks and how they work
Watch Now
Get Started
Want to learn more about the Silo Web Isolation Platform? Have a general inquiry about Authentic8? We'd love to chat! Click one of the buttons below to get in touch with our representatives.