Improve the efficiency of your research teams
Authentic8's Silo for Research is a fully isolated, anonymous and secure platform for conducting all forms of online investigations. Use Silo for Research to access web-based resources across the surface, deep or dark web.
Shorten your time-to-insight
Silo for Research improves analyst tradecraft across all phases of the information collection life cycle. Get your teams online and productive without deploying complicated solutions or disrupting your current infrastructure.
Access alternate networks
Span alternate regions, languages and network protocols. Silo for Research spins up one-time-use browser instances that give you access to content across geographies and web protocols. Regardless of the destination resource, your identity or affiliation is never exposed.
Silo for Research lets you match your persona to the specific investigation needs. Appear local to the subject material by accessing the internet through any of Authentic8's access points around the world. Silo for Research combined with good tradecraft ensures your research activities aren't attributed to your analysts or organization.
Automate collections
Silo for Research supports collections of all types of web content as the analyst needs it, or over a period of time. Automation tools allow you to set up regular collection routines to capture a range of web content types, transform the content to a format of your choice and securely store it in the cloud.
Preserve data in the cloud
Investigators may be required to capture and collect content as part of their process. And to maintain efficacy of potential evidence, a proper chain of control and evidentiary requirements must be met. Silo for Research integrates with Authentic8 Secure Storage, an encrypted, audited cloud-based storage repository for users and groups.
"With Silo, there is no need to have a 'dirty' machine because you are fully protected" - Authentic8 Silo for Research customer
Authentic8's Silo for Research is a fully isolated, anonymous and secure platform for conducting all forms of online investigations. Use Silo for Research to access web-based resources across the surface, deep or dark web.
Shorten your time-to-insight
Silo for Research improves analyst tradecraft across all phases of the information collection life cycle. Get your teams online and productive without deploying complicated solutions or disrupting your current infrastructure.
Access alternate networks
Span alternate regions, languages and network protocols. Silo for Research spins up one-time-use browser instances that give you access to content across geographies and web protocols. Regardless of the destination resource, your identity or affiliation is never exposed.
Silo for Research lets you match your persona to the specific investigation needs. Appear local to the subject material by accessing the internet through any of Authentic8's access points around the world. Silo for Research combined with good tradecraft ensures your research activities aren't attributed to your analysts or organization.
Automate collections
Silo for Research supports collections of all types of web content as the analyst needs it, or over a period of time. Automation tools allow you to set up regular collection routines to capture a range of web content types, transform the content to a format of your choice and securely store it in the cloud.
Preserve data in the cloud
Investigators may be required to capture and collect content as part of their process. And to maintain efficacy of potential evidence, a proper chain of control and evidentiary requirements must be met. Silo for Research integrates with Authentic8 Secure Storage, an encrypted, audited cloud-based storage repository for users and groups.
"With Silo, there is no need to have a 'dirty' machine because you are fully protected" - Authentic8 Silo for Research customer
Location: United States, California, Redwood City
Employees: 51-200
Phone: (877) 659-6535
Founded date: 2010
Investors 5
| Date | Name | Website |
| - | Foundry Gr... | foundrygro... |
| 05.06.2023 | Eastward C... | eastwardcp... |
| - | Shield Cap... | shieldcap.... |
| - | Foundry | foundry.vc |
| 04.07.2025 | Razors Edg... | razorsvc.c... |
Mentions in press and media 13
| Date | Title | Description |
| 14.11.2025 | Vistara Growth: $321 Million Fund V Closed For Growth Stage Tech Companies | Vistara Growth has completed the final close of its fifth structured capital fund at $321 million, marking a significant milestone in its tenth year of providing flexible financing solutions to technology companies in North America. The new... |
| 14.08.2024 | OSINT Podcast: подборка подкастов | Подготовил для вас самые стоящие OSINT-подкасты, они нацелены на разные сферы применения. Надеюсь, что они также помогут прокачать вам свои профессиональные навыки, узнать последние новости из мира разведки по открытым источникам, а заодно ... |
| 04.07.2023 | 200+ подкастов про информационную безопасность и хакерские атаки | Привет! Мы решили сделать для вас подборку ИБ-подкастов. Это аудиоконтент с различными шоу и экспертными интервью, которые помогут прокачать профессиональные навыки, узнать последние новости, сориентироваться в индустрии и заодно прокачать ... |
| 23.05.2022 | Recovering from ransomware attacks starts with better endpoint security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today! Ransomware attacks often succeed because endpoint... |
| 29.01.2021 | Let's End The Endless Detect-Protect-Detect-Protect Cybersecurity Cycle | Scott Petry, co-founder and CEO of Authentic8, maker of Silo, a platform for secure and controlled access to the web. |
| 08.12.2016 | Companies miss basic precautions that could prevent data breaches | Public awareness of data security issues has never been higher. Not only have data breaches made the news but the FBI's battle with Apple has put encryption in the headlines too. Yet despite the high profile of threats a new survey of IT se... |
| 27.10.2016 | Something wicked this way comes… the cyber security issues that scare people most | "There is a time to take counsel of your fears," General George S. Patton once famously said. Halloween marks the end of National Cyber Security Awareness Month (NCSAM). Let’s make this the time to take counsel of the cyber securi... |
| 17.08.2016 | The trouble with open source research on the web | Every open source research project -- no matter how simple or complex -- starts with browsing the internet. But researchers should know that their identity can be obtained through a number of basic techniques, which could have consequences ... |
| 24.12.2014 | My recently erratic world of the Gmail spam filter | Let’s start with a brief history of my investment-led fight against the perils of spam and my never-ending love of SMTP. We were investors in Postini and my partner Ryan sat on the board. It transformed my life – with one minor change of an... |
| 07.10.2012 | 5 cloud-native security companies to watch | This guest post is written by entrepreneur and AngelList Scout Mathew Johnson. Important advances in security are happening right now due to the trends of virtualization everywhere and the aggressive move to deploy applications in the cloud... |
Show more