Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Resource library

Dive deep into product info, watch a webinar on demand, match solutions to your needs and expand your knowledge with reports and white papers

Popular Resources

Guide
Guide

OSINT resources for CTI

This guide focuses on types of OSINT resources and provides context on what the resource is, its relevance to CTI and notes to improve usability.

Read more
Success Story
Success Story

Leading software developer uses Zero Trust Application Access to control app access for distributed workforce

A leading software solutions provider chooses Silo to mitigate risk of contractors from around the world accessing sensitive applications from unmanaged devices 

Read more

All resources

    Reset
    Video
    Video

    Challenges in the browser & securing web sessions

    Authentic8 CEO Scott Petry speaks to Business Security Weekly on how he's used the cloud to disrupt the infosec market for nearly 20 years

    Watch Now
    Video
    Video

    The Silo Sessions #18: James Kettle, PortSwigger

    James Kettle of PortSwigger Web Security discusses an "ancient" exploit, HTTP Request Smuggling, which keeps threatening web servers and the browser

    Watch Now
    Video
    Video

    Silo for Research for law enforcement

    Silo for Research can keep your online investigations compliant, anonymous and secure

    Watch Now
    Video
    Video

    The Silo Sessions #16: GDPR outlook with Scott Petry & Steve Durbin

    Authentic8’s CEO Scott Petry and Steve Durbin, Managing Director of ISF, discuss how the EU regulators are ramping up their data protection efforts

    Watch Now
    Video
    Video

    The Silo Sessions #15: JavaScript template attacks - how do they work?

    A local browser can be used by attackers for targeted exploits. Security researcher Michael Schwarz explains JavaScript Template Attacks and how they work

    Watch Now
    White Paper
    White Paper

    The billion-dollar security blanket: how security spending overlooks the biggest risk of all

    Former director on the National Security Council examines why organizations are still attacked despite massive security investment

    Read more
    Solution Brief
    Solution Brief

    Law firms in the digital age

    Law firms face a delicate balance — securing their assets and complying with client audit requirements while ensuring employees stay connected and engaged

    Read more
    Video
    Video

    Digital trends live: Apple WWDC wrap-up, congress may investigate big tech

    Scott Petry, CEO and co-founder of Authentic8, talks about development of a cloud-based web-browsing that protects users from harmful malware

    Watch Now
    Close
    Close