Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:00 PM
Dark Reading
Dark Reading
Products and Releases

Authentic8 Expands Silo Integration with Corporate Network Infrastructure

Secure virtual browser can now seamlessly authenticate with existing enterprise gateway proxies

MOUNTAIN VIEW, CA - January 28, 2016- Authentic8, maker of Silo, the cloud-based secure browser for business, has enhanced its integration with enterprise-class network infrastructure.  Many organizations, especially in highly regulated industries, put rigorous controls around who can access which areas of the Web.  The common approach is to require devices to authenticate and connect to the web through a gateway proxy, giving IT a single choke point to monitor and control web access.

Network traffic from traditional browsers and local applications is controlled via PAC (Proxy Auto-Config) rules that IT has implemented to route web traffic through specific proxies.

However, Silo users don’t run a browser locally or connect to the Internet directly.  Instead, the Silo client connects securely to a remote browser via an alternate port and interacts with the browser via an encrypted display protocol.  In the Silo model, the browser runs on infrastructure outside of the corporate network environment, shifting the attack surface away from the corporate environment area to the cloud.  While this solution creates a perfect insulation layer between the user’s device and the Internet, it bypasses the corporate control infrastructure.

With this release, the Silo Windows client is now PAC file capable, and it can also perform authentication against proxy gateways using Windows domain tokens.  Mac and Linux platform support will follow.

“Our enterprise customers have been asking to integrate these features, pointing to the inherent vulnerability of the traditional browser and the shift by information security teams away from threat identification to isolation,” said Ramesh Rajagopal, co-founder and Head of Product at Authentic8.  “Some of the most sophisticated organizations in the world with the most crucial information security requirements are adopting Silo, and we need to fit with their existing infrastructure.”

Seamless access to existing network infrastructure can also, depending on the proxy platform, allow URLs clicked in a local environment to render within Silo.  The Silo client registers itself with the local system as a handler for any URL encoded with an A8:// prefix. With proxy capability to re-write URLs on the fly, a common feature supported in leading platforms, users can have website content automatically render within Silo.  

While Silo is a secure and private browsing environment, organizations still need to ensure that their users maintain compliance with corporate policies.  Authentic8 can be configured to restrict access to particular websites, control data transfer and to store detailed log data on device access details, site activity and content posted to forms.  This log data is encrypted with a customer-supplied encryption key and can be extracted via authenticated API for decryption.

These features are available immediately, and at no additional cost, as part of Silo. Supported network proxy architectures include popular open source solutions, such as Squid, and mainstream commercial vendors, such as Websense, Bluecoat, and Zscaler and other platforms that support kerberos and NTLM.


About Authentic8
Founded in 2010 by principals from Postini, Authentic8 is redefining how the browser is used to access sensitive web data. Silo, our flagship product, is a cloud-based secure browser. Silo secures access to sensitive sites, creating an insulation layer between the computer and the web service. Silo helps manage login credentials, access controls and data use policies. Silo is built fresh at session start, and destroyed at session end, ensuring that users remain secure, compliant, and anonymous online. Try Silo risk free at www.authentic8.com.

All trademarks are the property of their respective owners.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.