Close Menu
WashingtonExec
    Podcast Episodes
    LinkedIn Facebook X (Twitter) Instagram YouTube
    LinkedIn Facebook X (Twitter) Instagram YouTube
    WashingtonExec
    Subscribe To The Daily
    • News & Headlines
    • Executive Councils
    • Videos
    • Podcast
    • Events
      • 🏆 Chief Officer Awards
      • 🏆 Pinnacle Awards
    • About
    • Contact Us
    LinkedIn YouTube X (Twitter)
    WashingtonExec
    You are at:Home»News»Emerging Markets»Authentic8’s Browser, Silo, Now Supports Common Access Cards
    Emerging Markets

    Authentic8’s Browser, Silo, Now Supports Common Access Cards

    By Lauren BudikDecember 6, 2016
    Share
    LinkedIn Facebook Twitter Email
    Scott Petry, Authentic8
    Scott Petry, Authentic8

    Authentic8 announced Nov. 17 its virtual browser, Silo, now supports certificates stored on government-issued Common Access Cards.

    “This release is the next logical step in making Silo the secure browser of choice within the federal market,” Authentic8 co-founder and CEO Scott Petry said. “In the last year, our public sector business has more than doubled. Support for CAC authentication ranked high on our customers’ list of requested enhancements. This release allows them to use Silo as a secure browser for accessing sensitive government websites.”

    With this release, Silo will be configured with Defense Department’s public certificates. When a user attempts to access a secure site that requires CAC authentication, the cloud-based browser will query the chip on the CAC that stores user-specific digital certificates to validate the user. All communication between the virtual browser and the local device is conducted over Authentic8’s proprietary, encrypted protocol.

    CACs can also be used to gain access to computer terminals. Based on Silo’s integration with the SAML authentication standard, the CAC authentication process can also be used to validate users before accessing their Silo profile.

    As with other Silo capabilities, administrators can enable or restrict the use of CAC-based certificates in the browser session. Any activity in the Silo browser, such as file upload/download, form data entry, and copy-paste, are logged and encrypted with a customer-supplied encryption key. This enables full oversight and audit of user activity while maintaining chain of custody of user data, whether the user is accessing a public website or a CAC-enabled site.

    Leadership Conversations

    Previous ArticleKevin Robbins Shares Wolf Den Associates’ 2017 Federal Market Outlook
    Next Article George Mason GovCon Initiative Reception Brings Attention to New Program

    Related Posts

    Knox CEO Irina Denisenko is ‘Wired to Move Toward Complexity, Not Away From It’

    Auria Adds Chris Hassett as EVP & GM of Commercial & Public Sector Business Unit

    Leidos Names Elena Fenton Federal Health IT Growth Lead

    Comments are closed.

    LinkedIn Follow Button
    LinkedIn Logo Follow Us on LinkedIn
    Latest Industry Leaders

    Top CFOs to Watch in 2025

    Top HR Execs to Watch in 2025

    Load More
    Latest Posts

    Knox CEO Irina Denisenko is ‘Wired to Move Toward Complexity, Not Away From It’

    December 4, 2025

    Auria Adds Chris Hassett as EVP & GM of Commercial & Public Sector Business Unit

    December 4, 2025

    Leidos Names Elena Fenton Federal Health IT Growth Lead

    December 4, 2025

    Top CIOs to Watch in 2026: Arcfield’s Glasford Hall

    December 4, 2025

    Top CIOs to Watch in 2026: Amentum’s Luis German

    December 4, 2025
    Quick Links
    • Executive Councils & Committees
    • Chief Officer Awards
    • Pinnacle Awards
    • Advertise With Us
    • About WashingtonExec
    • Contact
    Connect
    • LinkedIn
    • YouTube
    • Facebook
    • Twitter

    Subscribe to The Daily

    Connect. Inform. Celebrate.

    Copyright © WashingtonExec, Inc. | All Rights Reserved. Powered by JMG

    Type above and press Enter to search. Press Esc to cancel.