[et_pb_section bb_built=”1″ fullwidth=”on” specialty=”off” next_background_color=”#ffffff” _builder_version=”3.7.1″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/crowdstrike_header4.png” custom_css_main_element=”height:400px;”][et_pb_fullwidth_header admin_label=”Crowdstrike Fullwidth Header” _builder_version=”3.7.1″ title=”Active Threat Hunting with Autonomous Deception” subhead=”A New Capability on Crowdstrike Falcon Platform” background_color=”rgba(126,190,197,0)” text_orientation=”center” title_font=”|700|||||||” title_text_align=”center” title_text_color=”#ffffff” title_line_height=”1.3em” subhead_font=”|600|||||||” subhead_text_color=”#ffffff” subhead_font_size=”22px” header_fullscreen=”on” title_font_size=”42px” title_font_size_tablet=”28px” title_font_size_phone=”24px” title_font_size_last_edited=”on|phone” title_letter_spacing=”1px” /][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.7.1″ prev_background_color=”#000000″ next_background_color=”#f5f5f5″][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”1_2″][et_pb_text admin_label=”Advanced Threat Defense:” _builder_version=”3.7.1″ text_line_height=”1.5em” header_line_height=”1.5em” header_line_height_tablet=”1.3em” header_line_height_phone=”2em” header_line_height_last_edited=”on|phone” header_4_line_height_tablet=”1.3em” header_4_line_height_phone=”1.2em” header_4_line_height_last_edited=”on|desktop” header_3_line_height=”1.4em” header_3_line_height_tablet=”1.3em” header_3_line_height_phone=”1.2em” header_3_line_height_last_edited=”on|phone” text_font_size=”18px” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” saved_tabs=”all” text_text_color=”#000000″]
Advanced Threat Defense:
Acalvio ShadowPlex is a comprehensive, Autonomous Deception platform that provides early detection of advanced threats with precision and speed. ShadowPlex is built on Acalviob s patented Deception 2.0 technology that delivers efficacy and authenticity at enterprise scale, using a DevOps approach and with little IT impact.
ShadowPlex provides industry leading ability both to enhance CrowdStrike platform with b activeb deception and to bring additional value to the data in the Threat Graph.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Features:” _builder_version=”3.7.1″ text_line_height=”1.5em” header_line_height=”1.5em” header_line_height_tablet=”1.3em” header_line_height_phone=”2em” header_line_height_last_edited=”on|phone” header_4_line_height_tablet=”1.3em” header_4_line_height_phone=”1.2em” header_4_line_height_last_edited=”on|desktop” header_3_line_height=”1.4em” header_3_line_height_tablet=”1.3em” header_3_line_height_phone=”1.2em” header_3_line_height_last_edited=”on|phone” text_font_size=”18px” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” saved_tabs=”all” text_text_color=”#000000″]
Features:
- Leading edge Deception Solution based on 25 Issued Patents
- Effectiveness – high-fidelity detection
- Enterprise-Scale – ability to scale to unlimited number of decoys
- Easy deployment and management b complete automation using integrated AI in every step
- Advanced TTP Analysis
- Full life cycle: Detect b7 Engage b7 Respond
- Flexible deployment On cloud and on-premise
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”1_2″][et_pb_text admin_label=”Golan Beni Quote” _builder_version=”3.7.1″ border_width_all=”1px” border_color_all=”#ffffff” background_color=”#a21d20″ text_text_color=”#ffffff” box_shadow_style=”preset3″]
b ShadowPlex represents a very significant architectural advancement in the deception marketplace. Variable interaction deceptions, combined with its cloud deployment options, makes for greater efficacy and cost effectiveness, and makes ShadowPlex a best-in-class distributed deception platform.b
– Golan Ben Oni, CIO, IDT Telecom
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image admin_label=”Detect Respond Engage Image” _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/detect-engage-respond.jpg” /][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”4_4″][et_pb_text admin_label=”Complete Deception Palette” _builder_version=”3.7.1″ text_orientation=”center” header_font_size_tablet=”29px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Complete Deception Palette
[/et_pb_text][et_pb_image admin_label=”Complete Deception Palette Image” _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/completedecption-palette2.png” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”on” specialty=”off” prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”3.7.1″ background_color=”#f5f5f5″][et_pb_fullwidth_header admin_label=”ACTIVE THREAT HUNTING BASED ON DECEPTION” _builder_version=”3.7.1″ title=”Active Threat Hunting Based on Deception” title_text_align=”center” title_font=”|700|||||||” title_text_color=”#000000″ background_color=”#f5f5f5″ content_text_align=”left” content_text_color=”#000000″ content_font_size=”18px” content_font_size_tablet=”16px” content_font_size_phone=”14px” content_font_size_last_edited=”on|desktop” content_line_height=”1.5em” background_layout=”light” title_font_size_tablet=”28px” title_font_size_phone=”24px” title_font_size_last_edited=”on|phone”]

CrowdStrike provides deep insight into enterprise hosts, using next-generation antivirus and EDR solutions. Acalvio ShadowPlex generates a new stream of low volume, high-fidelity signals based on dynamic deception. Together we bring a new capability – Deception-based Active Threat Hunting – for finding hidden threats.
Features:
- Adversary Traversal Analysis: Identify the hosts compromised along the attackerb s path to the decoy
- Attacker View: Build adversary Indicators of Attack (IOA) based on deception incidents and Threat Graph.
- Similarity Analysis: Proactive identification of machines susceptible to observed exploits
- Ransomware Protection: Deception-based precise detection and rapid engagement of Ransomware
- Alert Triage: Active threat hunting to expose latent threats 25 Issued Patents
[/et_pb_fullwidth_header][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” prev_background_color=”#f5f5f5″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]
Similarity Analysis
[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/SIMILARITY-ANALYSIS.jpg” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]
Adversary Trajectory Analysis
[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/ADVERSARY-TRAJECTORY-2.jpg” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” prev_background_color=”#000000″][et_pb_row][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]
Advantage Acalvio
[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/adv_acalvio-2.jpg” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]
Coveted Awards
[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/coveted-awards.jpg” /][/et_pb_column][/et_pb_row][/et_pb_section]