Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Video
Video

Investigating fraud without leaving a digital trace | Intel Drop

Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.

Watch Now
Video
Video

The season of predictions: Are they useful? | The Intel Drop

In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.

Watch Now

All resources

    Reset
    Success Story
    Success Story

    U.S. law enforcement agency conducts secure undercover operations

    Learn why the agency chose Silo and how it quickly became one of their most essential tools for undercover investigators.

    Read more
    Success Story
    Success Story

    Silo for Research helps large regional bank protect their customers by taking action against fraud

    A large bank’s fraud investigations team uses Silo to examine suspicious transactions, explore phishing sites, and conduct KYC regulations research

    Read more
    Success Story
    Success Story

    Enabling mission success regardless of location

    During a global pandemic, a U.S. Government agency rapidly enables analysts to conduct OSINT research remotely using Silo for Research (Toolbox)

    Read more
    Success Story
    Success Story

    Rapidly enabling remote workers in a federal workforce

    A U.S. government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis

    Read more
    Success Story
    Success Story

    Enabling remote work for discriminating professionals

    Authentic8 helps military Cyber Defense Operations Command turn social distancing and telework directives into an opportunity for improving security

    Read more
    Success Story
    Success Story

    Securing emails of nonprofit community health center

    Secure Browsing secures email, the number-one attack vector for hospitals

    Read more
    Success Story
    Success Story

    Bank conducts anonymous investigations to comply with KYC regulations

    Fortune 500 bank's AML team assesses client risk profiles in line with KYC requirements

    Read more
    Success Story
    Success Story

    Shields up: how a military unit simultaneously increased network access and decreased cyber risk

    Silo ensures that mission-focused research and analysis doesn’t unintentionally open military network to attacks

    Read more
    Success Story
    Success Story

    Top-ten financial institution identifies threats and fraud

    A large financial institution relies on Silo for Research for their cyber-threat intelligence, financial fraud, and anti-money laundering investigations

    Read more
    Close
    Close