Threat Intelligence Without Heavy Investment

Access and analyze suspicious or malicious content without exposing your resources or your identity. Silo Research Toolbox is a cloud-based, virtual browser platform for targeting, accessing and collecting data to support threat intelligence activity.

Request a Demo

Blend in - but don’t get caught!

Cybercriminals are paranoid, and if one aspect of the collection process seems suspicious, access to threat or fraud evidence will be quickly blocked. Cyber threat intelligence production demands an anonymous environment that enables researchers to blend into the environment without revealing intent or identity.

"230,000 new malware samples are produced every day — and this is predicted to only keep growing"

- Panda Security

Rubber gloves for grabbing toxic code

Silo Research Toolbox is a managed attribution platform built in the cloud designed for the demands of cyber threat intelligence teams. Research Toolbox provides a cloud-based virtual browsing platform that isolates the analyst from any web-borne threats, with attribution management tools to help researchers blend into the background.

Decrease the time to intelligence while improving analyst efficiency

No more dirty lines, VPNs, and client-side sandboxing. Stop transiting malicious code across the corporate network and storing it on local resources. Silo Research Toolbox is an integrated, launch and go platform that gives full access to web based resources, deep analysis, and content capture, at arm’s length. Never touch toxic content and never expose your identity.

Analyze and capture in a single platform

With an unaltered view of web content - analysts can view source, trace cookie linkages, capture packets, and even binary code without tainting local resources. Content, either flattened or in its native form, can be stored in an encrypted cloud storage bucket and shared across research teams. Any web content accumulated in the remote cloud-browser session is purged at session close. Researchers get a fresh environment on the next session.

  • 100% isolation of all web content off-device and off-network, isolating endpoints from malicious code, cookies, and trackers

  • Non-attribution of the analyst, or spoofed attribution through geographically distributed egress nodes

  • Disposable browser sessions, purging all cookies, trackers or other web content designed to surveil users

Obfuscate research activity with complete anonymity and localization

Tipping off the target of an investigation can ruin months for work. Silo allows customization of browser and platform parameters, including language, time zone, keyboard settings, and more. Analysts blend in to the local environment through a network of globally distributed egress locations.

  • Exit to the internet in the target region, even the dark web without revealing analyst IP information

  • Configure platform parameters specific to the environment

  • Translate foreign content after the fact, minimizing your footprint on the destination site

Collect evidence across multiple target properties and browsing sessions

Multiple, separate virtual instances support simultaneous collection actions across resources and networks. Share research materials with other investigators with cloud-based storage

  • Page content full fidelity and capture with annotation and integrated, encrypted cloud-based storage

  • Out-of-band language translation to convert to the local language without disclosing analyst intent

  • Analysis of web source content and IP packet transactions for deeper investigation into counter-party resources

Enforce analyst usage and compliance requirements while conducting research

Analysts need to access web resources that fall outside of standard corporate policies. Silo Research Toolbox logs all analyst activity in encrypted audit logs. Compliance teams can review analyst activity and remediate issues. Customer-managed encryption keys maintain a proper chain of control for non-repudiation of activity logs.

  • Centralized, comprehensive real-time logs of all user and admin web activity

  • Log data encrypted with customer-managed keys, with authenticated API-based extract

  • Download content timestamp and hash values logged to defend the authenticity of collections

Where security and anonymity matter

Threat Intel professionals across commercial and government organizations reach for Silo research toolbox. Proven to be more cost effective for Admins and higher performance for the analyst, Silo Research Toolbox improves Threat Intel team capability while reducing risk.
 

Request a Demo