Products
Overview
Silo for Safe Access
Silo for Research (Toolbox)
OSINT Academy by Authentic8
Solutions
Overview
Web Threat Isolation
Administering Access
SaaS App Access
Remote Workers
Financial Fraud
Criminal Investigations
OSINT Collection
Threat Intelligence
Industries
Overview
Financial
Government
Legal
Healthcare
Technology
Insurance
Law Enforcement
Resources
Downloads
Events
Blog
About
Demo
Products
Overview
Silo for Safe Access
Silo for Research (Toolbox)
OSINT Academy by Authentic8
Solutions
Overview
Web Threat Isolation
Administering Access
SaaS App Access
Remote Workers
Financial Fraud
Criminal Investigations
OSINT Collection
Threat Intelligence
Industries
Overview
Financial
Government
Legal
Healthcare
Technology
Insurance
Law Enforcement
Resources
Downloads
Events
Blog
About
Demo
Resource Center
Everything you ever wanted to know about how Silo can give you control.
All Resources
Download Type
Industries
Federal
Financial Services
Government
Healthcare
Legal
Media
Technology
Law Enforcement
Webinar
Intro to the Dark Web, Part 1: What's Hiding in the Dark
An introductory webinar on the basics of the dark web, and why it could be a useful asset for investigators
Solution Brief
Trust & Safety
Trust & Safety teams are tasked with keeping users safe. Silo for Research helps T&S analysts conduct secure investigations across the open, deep and dark web
Guide
Online Investigations: 5 Mistakes Putting You at Risk
Online sources can also be perilous. This guide reveals top mistakes online investigators make, and offers suggestions on how to avoid them.
Webinar
Trust & Safety Teams Have a Lot to Hide
Trust and Safety teams investigate potentially harmful situations, monitor user activity, and set up policies to build an environment of trust.
Webinar
Naked and Exposed: Stop Investigating Online without Managed Attribution
Managed attribution is essential to keeping online investigations secure and anonymous.
Data Sheet
Gofer Add-On: Silo for Research
Gofer is an extension for Silo for Research that allows analysts to configure and seamlessly execute multi-search workflows.
Webinar
Tradecraft Training: How to Use Dark Web for Your Investigations
A beginner level dark web investigation webinar, targeted at those who have never accessed the dark web or are just starting to use the dark web for investigations.
Case Study
Silo for Research helps a U.S. Law Enforcement Agency Conduct Secure Undercover Operations
Learn why the agency chose Silo and how it quickly became one of their most essential tools for undercover investigators.
Data Sheet
Harvester Collection Automation API - Overview
Authentic8’s Harvester Automation API enhances automated web-based collection by integrating into existing content collection workflows via a simple API.
Data Sheet
Harvester Collection Automation API - SOC
Authentic8’s Harvester Automation API augments a SOC’s web-based collection capabilities by integrating into TIP, SIEM and SOAR collection workflows via API.
Guide
2021 Law Enforcement Handbook
A handbook to keeping your online investigations anonymous and secure. See the recommended tools and best practices.
Webinar
Secure, Anonymous Online Intelligence Gathering for Federal Law Enforcement
Learn about the dangers of using a traditional web browser for law enforcement investigations and how Silo for Research can help.
Webinar
Secure, Anonymous Online Intelligence Gathering for State and Local Law Enforcement
Learn about the dangers of using a traditional web browser for law enforcement investigations and how Silo for Research can help.
Guide
Anti-Money Laundering: New US Regulation to Start the Year Off
Congress passes defense bill with big ramifications for AML in 2021. This and other AML news and best practices from Compliance Week and Authentic8.
Data Sheet
Silo for Research
Any open source intelligence collection process starts with the browser. Researchers need a stealthy browser. Read how Silo for Research helps.
Webinar
Productivity Without Compromise For Financial Crime Investigations
Silo for Research provides analysts with security, anonymity and workflow capabilities to avoid investigations being compromised
Case Study
Silo for Research Helps Large Regional Bank Protect Their Customers by Taking Action Against Fraud
Threat intelligence team able to proactively combat fraud
Case Study
Silo for Research Helps Bank Conduct Anonymous Investigations to Comply with KYC Regulations
Fortune 500 bank AML assesses client risk profiles in line with KYC requirements
Data Sheet
Collector Data Sheet
Collector is an automated collection module of Silo for Research that can schedule content collection in a variety of formats and in line with tradecraft best practices
Case Study
Large Regional Bank Uses Silo for Research to Investigate Threats and Strengthen Security
On-demand, anonymous environment creates secure investigation space for SOC
Solution Brief
Dark Web Add-On: Silo for Research
The add-on provides simple and safe “point and click” access to dark web content while leveraging Silo for Research's isolation, anonymity and workflow features
Flash Report
Managing Attribution in Online Financial Crime Investigations
Learn how to maintain anonymity while investigating financial crime online to protect researchers, their organizations and the quality of investigations
Data Sheet
OSINT Academy for Fraud Investigators
OSINT Academy provides in-depth courses to help fraud investors stay updated on new tools and techniques to stay a step ahead of criminals
Data Sheet
OSINT Academy for Financial Investigators
OSINT Academy’s courses enable financial investigators to stay updated on new tools and techniques to conduct secure and successful investigations
Data Sheet
OSINT Academy for Cyber Threat Intelligence
OSINT Academy provides in-depth courses around the constantly evolving world of CTI with tools and techniques for conducting successful investigations
Guide
Solving Productivity Issues in Financial Crime Investigations
Silo for Research can improve productivity as well as quality of online investigations into financial crime and fraud across the surface and dark web
Flash Report
Crypto Money Laundering on the Rise
Money laundering with cryptocurrency is on the rise and creates new challenges for AML investigators. Blockchain technology can help track the transactions.
Flash Report
Using the Dark Web in Financial Crime Investigations
Learn how to safely conduct financial crime investigations on the dark web without disclosing identity or intent to targets
Data Sheet
OSINT Academy: Tradecraft Training
Available exclusively to Silo for Research customers, OSINT Academy Tradecraft Training provides online courses for open-source intelligence professionals.
Infographic
What's Hurting Caseload Productivity in Financial Crime Investigations?
Get the highlights from our 2020 survey on top challenges and needed solutions to improve financial crime investigations
Case Study
Securing Emails of Nonprofit Community Health Center
Read how Silo for Safe Access secures email — the number-one attack vector for hospitals — for a U.S.-based community health center
Video
We Asked, Financial Fraud Analysts Answered: Unveiling 2020 Online Research Trends
Watch the on-demand webinar covering the findings of the 2020 Global Financial Crimes Investigations Survey
Video
OSINT Insiders On-Demand
Watch all eight OSINT Insiders episodes on demand. OSINT Insiders is a rapid-fire discussion of topics related to open-source intelligence like findings, tools and interviews.
Video
Silo for Research Product Tour
Watch the Silo for Research Product Tour to learn how to decrease investigation time-to-insight, simplify compliance and reduce IT overhead and costs
Guide
From the Experts: Social Media Monitoring and Dark Web Investigations
Cybersecurity experts discuss the importance of threat intelligence, give advice on how to better enable intelligence-gathering investigations
Report
2020 Global Financial Crime Survey Investigations Report
See findings of the Authentic8-ACFCS financial crime investigations survey, highlighting the issues around the investigative function and productivity
Webinar
Maximize Threat Intelligence to Maximize Your SOC
Featuring Forrester Sr Analyst Brian Kime, learn best practices for mitigating risks while maximizing SOC investments.
Guide
Financial Fraud Investigators: Tips & Techniques Booklet
Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web.
Webinar
Election Security: Defending our Democracy against Well-Resourced Adversaries
Election security concerns paint the headlines. Our most formidable adversaries are well-resourced with concerning intent and capabilities: malign influence and false messaging, potential attacks on voter registration and election systems, and even targeting campaigns.
Flash Report
How to Track Online Drug Dealers
Tools and tips for law enforcement investigators who use Silo for Research to safely and anonymously investigate and track drug trade-related social media activities.
Flash Report
What is Exif Data?
How to extract and analyze Exchangeable Image File Format (Exif) data? This tutorial explains how to examine Exif data for threat intelligence research.
Flash Report
What is Shodan?
This Flash Report provides an overview of Shoan, a search engine for internet-connected devices, and explains how IoT search with Shodan works.
Report
Cyber Threat Intelligence Report 2020, Cybersecurity Insiders
Download the startling findings from the 2020 Cyber Threat Intelligence Report, based on a survey among 338 CTI analysts and practitioners and published by market research firm Cybersecurity Insiders.
Flash Report
How to Use Pastebin for Threat Research
Quick Guide: How can threat researchers leverage Pastebin to find hackers who are offering leaked data for sale?
Data Sheet
Rapidly Enabling Remote Workers in a Federal Workforce
A U.S.Government agency provides remote workers with secure access to web browsing and O365 to continue day-to-day operations during a global health crisis.
Webinar
Cloud-Base Research Platform for Threat Hunters
Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organization.
White Paper
Local Browsers: High-risk Holdover from IT's Past
From data aggregation and market analysis software packages, to buy side / sell side trading programs, and to risk management, compliance and IT security solutions, essential functions have migrated to browser-centric web services and cloud apps.
Video
Evolution of Virtual Web Browsing
Digital Trends interview with Authentic8 CEO Scott Petry (1:10:33 into video).
Solution Brief
Law Enforcement in the Digital Age
Collect social media and dark web evidence anonymously and in compliance.
Video
Challenges in the Browser & Securing Web Session
Authentic8 CEO Scott Petry speaks to Business Security Weekly.
Report
Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms
Why compliance, IT and legal must restore trust and get into sync
Video
How to Use OSINT for Cyber Threat Intelligence Investigations
Learn about the current landscape around cyber threat intelligence and open-source intelligence (OSINT).
Video
Why Cyber Threat Intelligence Researchers Need Access to the Dark Web
Learn about various data sets at the open, deep, and dark web that help cyber threat intelligence and open-source intelligence (OSINT) researchers.
Video
The Next Evolution of Cyber Threat Intelligence
Learn more about the future of investigation platforms, data collectors, machine learning and regulations of how to handle data.
Case Study
Enabling Mission Success Regardless of Location
During a worldwide pandemic, a U.S. Government agency rapidly enables analysts to conduct OSINT research remotely using Silo for Research (Toolbox).
Infographic
Infographic: Cyber Threat Intelligence Trends
Infographic: Cyber Threat Intelligence Trends - a 2020 survey highlights a shocking lack of training, tools, and oversight for researchers and analysts.
Webinar
Zero Trust & Unmanaged Devices
In the webinar, Extending the Zero Trust Framework to Unmanaged Devices, Forrester VP and Principal Analyst Chase Cunningham and Ramesh Rajagopal, Authentic8's Co-Founder and President, offer practical advice for implementing a Zero Trust framework to cover unmanaged devices.
Guide
21 OSINT Research Tools for Threat Intelligence
A list of the 21 most useful tools for OSINT investigations of the open, deep and dark web. The quick guide explains each tool and highlights the use case.
Guide
Open and Dark Web Research: Tips and Techniques Booklet
How to conduct OSINT investigations online? Authentic8’s booklet ‘Open and Dark Web Research: Tips and Techniques’ highlights top tools and methods.
Video
OSINT Academy: Fast-track Your Analyst Career
Ready to learn from the best? This quick video introduction shows how the OSINT Academy provides tangible results for your missions and your analyst career, including professional certification.
Video
Silo for Research - Live Demo
Watch a live fraud investigation using Silo for Research.
Solution Brief
Remote Workers: Security and Control in a Zero Trust World
From traveling executives to work-from-home employees, IT needs to assert positive control over their compute environment.
Flash Report
How to Investigate Website Ownership
How to research website ownership and history - who’s behind it, hosting, maintenance, funding… Get in-depth details using proper research tools and tradecraft
White Paper
Guide to Secure Fraud Investigations
How to reduce cybersecurity risk and costs associated with fraud Investigations online through web Isolation? Read this Authentic8 whitepaper.
White Paper
CIO Guide: Rapidly Enabling Remote Workers in Time of Crisis
The five steps to quickly enabling remote workers in times of crisis: A guide for CIOs and CISOs.
Case Study
Anonymous Customer Case Study
How a military unit simultaneously increased network access and decreased cyber risk
Case Study
Case Study: Global Top Ten Financial Services Firm
See how Authentic8 helps identify threats and fraudsters online.
Case Study
Enabling Remote Work for Discriminating Professionals
Silo is proving to be the special solution of choice for discriminating leaders, operators, and security professionals in the U.S. military.
Case Study
Authentic8 Helps Registrar with ICANN Compliance
This internet domain registrar is using Silo for Research (Toolbox) to securely investigate suspicious activities and abuse to accordance with ICANN.
Data Sheet
Immediate Government Work Remote Solution
Silo for Safe Access helps agencies comply with the U.S. Government telework mandates due to the COVID-19 Coronavirus.
Flash Report
Using Genymotion's Android Virtual Machine and Email Addresses for Social Media Account Discovery
Discover social media accounts with Genymotion.
Data Sheet
Silo by Authentic8 Web Isolation Platform
Web Isolation with Silo enables anyone, anywhere, on any device, to use the web without risk. The world’s most security-sensitive organizations rely on Silo.
Data Sheet
Silo for Safe Access
Dangerous organizations and people operate in the shadows. If you are going to find them online, you have to go on the Dark Web.
White Paper
The Billion-Dollar Security Blanket: How Security Spending Overlooks the Biggest Risk of All
Matt Ashburn, a former director on the National Security Council, examines why organizations are still getting attacked – often using rather low-tech methods, like phishing, to penetrate their networks.
Infographic
Top Challenges for Financial Crime Investigators
A survey of 500+ financial crime investigators reveals a lack of proper tools that affects their ability to conduct investigations online, putting their organizations at risk.
Guide
Cyber Threat Intelligence: Tools, Tips, and Tricks Handbook for Threat Hunters
Learn the latest tools, tips and tricks to access and analyze suspicious content anonymously.
Report
SANS Threat Hunting Survey Report
An in-depth look at how teams improve threat hunting skills, where they hunt, how they hunt, and how to measure success.
video
The Silo Sessions #7
Anti-Money Laundering in a nutshell with Kevin Sullivan.
video
SEC Compliance and the Internet
This interview with Jane Jarcho, former SEC OCIE deputy director, explores key issues for investment management firms.
Still have questions about why a cloud browser is important?
Cloud Browser 101