Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more
Success Story
Success Story

Leading software developer uses Zero Trust Application Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more

All resources

    Reset
    Video
    Video

    Scale your SOC: protecting against browser-based threats

    Watch the Security Weekly webcast with former CIA cybersecurity officer Matt Ashburn as he discusses how to eliminate noise in the SOC and focus on truly critical risk

    Watch Now
    Webinar
    Webinar

    Maximize threat intelligence to maximize your SOC

    Learn best practices for mitigating risks while maximizing SOC investments

    Guide
    Guide

    Financial fraud investigation: tips & techniques

    Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web

    Read more
    Video
    Video

    Election security: defending our democracy against well-resourced adversaries

    Cybersecurity professionals discuss election security concerns and how to defend our democracy against well-resourced adversaries

    Watch Now
    Flash Report
    Flash Report

    Tracking online drug dealers

    Tools and tips for law enforcement investigators who use Silo for Research to safely and anonymously investigate and track drug trade-related social media

    Read more
    Infographic
    Infographic

    Cyber threat intelligence trends

    A survey of 338 Cyberthreat Intelligence (CTI) analysts and practitioners highlights an alarming lack of training, tools, and oversight

    Read more
    Flash Report
    Flash Report

    How to investigate website ownership

    Get in-depth details including site ownership, hosting, maintenance and funding by using proper research tools and tradecraft

    Read more
    White Paper
    White Paper

    Guide to secure fraud investigations

    Reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation

    Read more
    Solution Brief
    Solution Brief

    Enable remote work on any device with full IT governance

    From traveling executives to work-from-home employees, IT needs to assert positive control over their computer environment

    Read more
    Close
    Close