This guide covers many concepts that will help with a successful deployment of Silo for Safe Access in your enterprise environment



Deployment Preparation
The following preparation checklist should be completed before installing Silo for Safe Access:


Authentication Options
Silo for Safe Access offers two authentication options:


User Management

Silo for Safe Access accounts can be provisioned through one of the following methods


Define Silo Administrators

Decide who in your organization will have Silo Administrator privileges, along with the necessary permission levels

Reference: Granular Admin Controls


Workstation Lock to Authorized Accounts Only
Machine Lock Control helps prevent Silo access from other Silo account owners (e.g., non-employees, personal accounts) while connected to your enterprise Network


Org Policies
While there are many policies to consider for each Silo for Safe Access org-level, below are some of the more notable options to consider:


Firewall and Proxy Integration
    
 Silo Direct Launch — utilizes the a8:// and a8s:// web protocols for a direct URL launch in Silo
     Gateway Integration leverages enterprise Firewall solutions to redirect web requests to Silo


Reporting and Logging Information

Built-in Reporting via the Reports section in the Silo Admin Console

Log Extract API — programmatic method of extracting log data

 Enhanced Reporting with Log Encryption — secures log data from unauthorized viewing and enables additional sensitive log data information


Additional Resources

The attached A8 Project Plan Template can help assist with your Silo for Safe Access deployment, along with configuring organization policies



Please contact Support for any additional questions