Partner Datasheet

Partner Datasheet: Authentic8

<h2 class="text-center">Protect and Enhance the Analyst Workflow</h2> <h4>A comprehensive solution for IR and Threat Hunters with Anomali and Authentic8</h4> <h3>Anomali and Authentic8 Joint Solution Features</h3> <p>Anomali’s intelligence-driven security products provide unmatched threat visibility and accelerated detection. When analysts need to take action based on that intelligence, Authentic8’s Silo for Research is the perfect complementary solution, giving the analyst a cloud- based, web isolation platform that benefits the user and the organization:</p> <ul> <li><strong>FULL ISOLATION:</strong> All web code is executed on Silo servers, not end-user devices. Potentially unsafe content never touches your assets</li> <li><strong>MANAGED ATTRIBUTION:</strong> Configure the browser fingerprint and egress location. Blend in with the crowd to avoid tipping off your intent.</li> <li><strong>ACCESS OPEN, DEEP or DARK WEB:</strong> One-click access to any destination without tainting your environment. Maintain policy, while providing a secure way for users to interact with any destination.</li> </ul> <h3>Immediate Time-to-Value</h3> <p>Silo provides a research platform for Anomali users that secures the user, device, and organization, while providing advanced OSINT tradecraft tools. Silo eliminates the need to have parallel infrastructure or security policy exceptions to enable analysts to conduct threat research.</p> <ul> <li><strong>CLOUD-BASED:</strong> Turn-key, cloud-hosted solution that creates a clean instance every time. Seamless, immediate deployment with on- demand access from anywhere.</li> <li><strong>ELIMINATE IT SUPPORT BURDEN:</strong> No more exception approvals or remediation needed.</li> <li><strong>COMPLETE AUDIT OVERSIGHT:</strong> Encrypted audit logs of all web activity. Simplify analyst compliance and audit, and improve case documentation.</li> <li><strong>WORKFLOW ENHANCEMENTS:</strong> Improve time to insight with integrated OSINT tools.</li> </ul> <h2>An Advanced Analyst Research Platform</h2> <p>Enhance and accelerate the abilities of your analyst team through Silo. Combating sophisticated adversaries requires analysts to be armed with advanced OSINT tradecraft capabilities and managed attribution. Protect your organization and instantly elevate the maturity of your security organization with Silo and Anomali.</p> <div class="row"> <div class="col-md-4"> <h4>Advanced OSINT Platform</h4> <p>Secure Global research with embedded OSINT tradecraft</p> </div> <div class="col-md-4"> <h4>Flexible Deployments</h4> <p>Fast, scalable cloud-based deployment</p> </div> <div class="col-md-4"> <h4>Immediate Results</h4> <p>One-click access into 100% isolation with auditing and policy enforcement</p> </div> </div> <h2>Empower Analysts to do More</h2> <table style="width:100%"> <tbody> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/challenge.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Challenge:</h3> <p>Online research needs can take many forms in a given organization. Increasingly, analysts face common roadblocks to gathering the information they need:</p> <p>Content can only be accessed from specific geographic location, region, or networks</p> <ul> <li>Increased CAPTCHA/MFA requests</li> <li>Proxy and bot detection algorithms blocking access</li> <li>Sensitive research (i.e., dark web) exposes the user and organization to significant risk</li> </ul> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/solution.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Solution:</h3> <p>The world’s most at-risk enterprises and government agencies rely on Silo for Research to conduct secure and anonymous online investigations for multiple use cases:</p> <ul> <li><strong>Criminal investigations:</strong> Comply with chain-of-custody policy and securely collect evidence on the open, deep, or dark web</li> <li><strong>Cyber threat intelligence:</strong> Access and analyze suspicious or malicious content with 100% isolation from corporate infrastructure</li> <li><strong>Financial investigations:</strong> Keep online fraud investigations anonymous and secure, even on the dark web</li> <li><strong>Open-sourceintelligence(OSINT):</strong> Disguise identity with a managed attribution platform and global egress network</li> </ul> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/benefit.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Customer Benefit:</h3> <p>Ensure your infrastructure security is up- to-date to decrease the chance of being breached, whilst reducing the workload for your SOC team.</p> </td> </tr> </tbody> </table> <h2>Fully Enable Remote Analysts on any Device</h2> <table style="width:100%"> <tbody> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/challenge.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Challenge:</h3> <p>Home-grown solutions are no longer sufficient for open-source intelligence collection. Using the local computer and network to collect open source content puts OSINT teams and investigators at risk, especially when analysts are remote. In order to minimize that risk, organizations use a variety of tools such as client-side virtualization, VPNs, segregated storage solutions and advanced malware scanning solutions. These are costly to deploy and the complicated IT management requirements create security and attribution gaps.</p> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/solution.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Solution:</h3> <p>Silo for Research provides one-click access into complete isolation from all web content through a network of cloud-based virtual browsers distributed across geographies. Silo for Research allows full customization of browser parameters including platform, providing key benefits to the organization:</p> <ul> <li>Auto-deployment of a simpler, stronger and less-expensive security architecture: Replace VPNs, dirty lines, break-inspect, and costly re-image / remediation processes</li> <li>Enforce full compliance and audit for each remote user</li> <li>Eliminate security risk exceptions</li> </ul> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/benefit.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Customer Benefit:</h3> <p>Analyst workflows no longer need to add risk to the organization. Silo helps IT, Security, and Compliance teams across all industries align to solve critical needs.</p> </td> </tr> </tbody> </table>