Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More
Resource library
Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers
Popular Resources
Guide
OSINT resources for CTI
This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.
Read more
Success Story
Leading software developer uses Zero Trust Application Access to control app access for distributed workforce
A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices
Read more
All resources
Topics
Topic
Cyber threat intelligence
Incident response
OSINT
Managed attribution
Dark web
Intel and evidence
Web isolation
Products
Products
Silo for Research
Zero Trust Application Access
Risky Web Link Isolation
Risky Email Link Isolation
Secure Browsing
Resource Type
Product Information
Success Story
Infographic
Guide
Podcast
White Paper
Webinar
Reset
Video
Challenges in the browser & securing web sessions
Authentic8 CEO Scott Petry speaks to Business Security Weekly on how he's used the cloud to disrupt the infosec market for nearly 20 years
Watch Now
Video
The Silo Sessions #18: James Kettle, PortSwigger
James Kettle of PortSwigger Web Security discusses an "ancient" exploit, HTTP Request Smuggling, which keeps threatening web servers and the browser
Watch Now
Video
Silo for Research for law enforcement
Silo for Research can keep your online investigations compliant, anonymous and secure
Watch Now
Video
The Silo Sessions #16: GDPR outlook with Scott Petry & Steve Durbin
Authentic8’s CEO Scott Petry and Steve Durbin, Managing Director of ISF, discuss how the EU regulators are ramping up their data protection efforts
Watch Now
Video
The Silo Sessions #15: JavaScript template attacks - how do they work?
A local browser can be used by attackers for targeted exploits. Security researcher Michael Schwarz explains JavaScript Template Attacks and how they work
Watch Now
White Paper
The billion-dollar security blanket: how security spending overlooks the biggest risk of all
Former director on the National Security Council examines why organizations are still attacked despite massive security investment
Read more
Solution Brief
Law firms in the digital age
Law firms face a delicate balance — securing their assets and complying with client audit requirements while ensuring employees stay connected and engaged
Read more
Video
Digital trends live: Apple WWDC wrap-up, congress may investigate big tech
Scott Petry, CEO and co-founder of Authentic8, talks about development of a cloud-based web-browsing that protects users from harmful malware
Watch Now
Get Started
Want to learn more about the Silo Web Isolation Platform? Have a general inquiry about Authentic8? We'd love to chat! Click one of the buttons below to get in touch with our representatives.