Policies need to keep pace with the rate of change. Any update to user configurations made in the Silo Admin Console propagate in real time. Enabling access to a web app or revoking access to a current user happens immediately, even in a live session. This gives you total control over who can access your data, regardless of user device or location.
This live change process is useful when adding users or changing parameters, but it's critical if account access needs to be revoked. An administrator can terminate a user's live session and suspend the account to prevent further access, acting as a kill switch for accounts that might be in violation of policy. But all data regarding the user and their activity remains in the system to support forensic or post-facto analysis. That data can be extracted from Silo or deleted via the Admin Console.
Assigning appropriate permissions to admins is critical to preventing misuse. Silo allows admins to be assigned at the root or sub-org level, and their role can be restricted to any combination of permissions: from simple help desk support actions to full policy updates.
Silo minimizes the risk of elevated permissions with finely configured administrator privileges. Different admins can receive specific privileges according to their role, enabling or restricting the addition of users, access control rules, policy changes, log access or promoting other users to admins. And these admin entitlements can be restricted to certain regions of the organizational structure. With this model, admins have only the appropriate permissions for their specific role. Learn more about granular admin controls.
Whether maintaining compliance or remediating events, ensuring that admins stay within their proper authorization is critically important. Silo logs capture comprehensive details covering web use, including all actions conducted in the Silo isolation environment, the Admin Console and Authentic8 Secure Storage, including updates and changes to established policies.
Keeping on top of admin activity helps compliance and risk teams understand everything about how Silo is used across their organization. Silo logs admin change activities including who made the change, when it was made and the before-after values of the change. Admin logs fall under the standard org-level logging configuration — including log encryption — and can be pulled separately via APIs. Learn more in our Silo Log Reference Guide.
From directory services to identity management platforms, secure web gateways and SIEM solutions, Silo plays nicely with your current IT technology stack. Conversely, Silo can also act as a completely standalone environment, giving you the power to choose how Silo will work best for your organization.
Silo can provide a standalone user experience and execute completely outside of your organization's infrastructure. Or it can be woven into current IT solutions and the local browser for seamless remote access to corporate resources. Silo matches your organizational structure as defined in your on-premises directory service. If you're using an identity management platform, third-party SAML or other cross-authentication solutions, they can be used to authenticate users when they access Silo, and they can be used for single-click access to provisioned web applications.
Information Technology Operations Manager
Digital Marketing Director
User in Military
User in Banking
User in Marketing
Director of Technology Solutions
Director, Cybersecurity And Compliance
Director, Cybersecurity And Compliance
IT Operations Manager
Director - Security Operations
Managed attribution is essential to keeping online investigations secure and anonymous
From traveling executives to work-from-home employees, IT needs to assert positive control over their computer environment
The legal, compliance and IT departments at financial firms often have different priorities when addressing security and compliance issues