Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more
Success Story
Success Story

Leading software developer uses Zero Trust Application Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more

All resources

    Reset
    Success Story
    Success Story

    Enabling remote work for discriminating professionals

    Authentic8 helps military Cyber Defense Operations Command turn social distancing and telework directives into an opportunity for improving security

    Read more
    Success Story
    Success Story

    Securing emails of nonprofit community health center

    Secure Browsing secures email, the number-one attack vector for hospitals

    Read more
    Success Story
    Success Story

    Bank conducts anonymous investigations to comply with KYC regulations

    Fortune 500 bank's AML team assesses client risk profiles in line with KYC requirements

    Read more
    Success Story
    Success Story

    Shields up: how a military unit simultaneously increased network access and decreased cyber risk

    Silo ensures that mission-focused research and analysis doesn’t unintentionally open military network to attacks

    Read more
    Success Story
    Success Story

    Top-ten financial institution identifies threats and fraud

    A large financial institution relies on Silo for Research for their cyber-threat intelligence, financial fraud, and anti-money laundering investigations

    Read more
    Success Story
    Success Story

    Compliance team investigates suspected abuse, part of ICANN compliance

    A fast-growing internet domain registrar uses Silo for Research to securely investigate suspicious activities and abuse to accordance with ICANN

    Read more
    Success Story
    Success Story

    Large regional bank uses Silo for Research to investigate threats and strengthen security

    On-demand, anonymous environment creates secure investigation space for SOC

    Read more
    Data Sheet
    Data Sheet

    Gofer extension for Silo for Research

    Configure and seamlessly execute multi-search workflows. A set of preconfigured websites and workflows can be customized to fit any investigation.

    Read more
    Data Sheet
    Data Sheet

    Harvester collection automation API - SOC

    Authentic8’s Harvester Automation API augments a SOC’s web-based collection capabilities by integrating into TIP, SIEM and SOAR collection workflows via API

    Read more
    Close
    Close