Active Threat Hunting with Autonomous Deception


[et_pb_section bb_built=”1″ fullwidth=”on” specialty=”off” next_background_color=”#ffffff” _builder_version=”3.7.1″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/crowdstrike_header4.png” custom_css_main_element=”height:400px;”][et_pb_fullwidth_header admin_label=”Crowdstrike Fullwidth Header” _builder_version=”3.7.1″ title=”Active Threat Hunting with Autonomous Deception” subhead=”A New Capability on Crowdstrike Falcon Platform” background_color=”rgba(126,190,197,0)” text_orientation=”center” title_font=”|700|||||||” title_text_align=”center” title_text_color=”#ffffff” title_line_height=”1.3em” subhead_font=”|600|||||||” subhead_text_color=”#ffffff” subhead_font_size=”22px” header_fullscreen=”on” title_font_size=”42px” title_font_size_tablet=”28px” title_font_size_phone=”24px” title_font_size_last_edited=”on|phone” title_letter_spacing=”1px” /][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.7.1″ prev_background_color=”#000000″ next_background_color=”#f5f5f5″][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”1_2″][et_pb_text admin_label=”Advanced Threat Defense:” _builder_version=”3.7.1″ text_line_height=”1.5em” header_line_height=”1.5em” header_line_height_tablet=”1.3em” header_line_height_phone=”2em” header_line_height_last_edited=”on|phone” header_4_line_height_tablet=”1.3em” header_4_line_height_phone=”1.2em” header_4_line_height_last_edited=”on|desktop” header_3_line_height=”1.4em” header_3_line_height_tablet=”1.3em” header_3_line_height_phone=”1.2em” header_3_line_height_last_edited=”on|phone” text_font_size=”18px” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” saved_tabs=”all” text_text_color=”#000000″]

Advanced Threat Defense:

Acalvio ShadowPlex is a comprehensive, Autonomous Deception platform that provides early detection of advanced threats with precision and speed. ShadowPlex is built on Acalviobs patented Deception 2.0 technology that delivers efficacy and authenticity at enterprise scale, using a DevOps approach and with little IT impact.

ShadowPlex provides industry leading ability both to enhance CrowdStrike platform with bactiveb deception and to bring additional value to the data in the Threat Graph.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Features:” _builder_version=”3.7.1″ text_line_height=”1.5em” header_line_height=”1.5em” header_line_height_tablet=”1.3em” header_line_height_phone=”2em” header_line_height_last_edited=”on|phone” header_4_line_height_tablet=”1.3em” header_4_line_height_phone=”1.2em” header_4_line_height_last_edited=”on|desktop” header_3_line_height=”1.4em” header_3_line_height_tablet=”1.3em” header_3_line_height_phone=”1.2em” header_3_line_height_last_edited=”on|phone” text_font_size=”18px” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” saved_tabs=”all” text_text_color=”#000000″]

Features:

  • Leading edge Deception Solution based on 25 Issued Patents
  • Effectiveness – high-fidelity detection
  • Enterprise-Scale – ability to scale to unlimited number of decoys
  • Easy deployment and management b complete automation using integrated AI in every step
  • Advanced TTP Analysis
  • Full life cycle: Detect b7 Engage b7 Respond
  • Flexible deployment On cloud and on-premise

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”1_2″][et_pb_text admin_label=”Golan Beni Quote” _builder_version=”3.7.1″ border_width_all=”1px” border_color_all=”#ffffff” background_color=”#a21d20″ text_text_color=”#ffffff” box_shadow_style=”preset3″]

bShadowPlex represents a very significant architectural advancement in the deception marketplace. Variable interaction deceptions, combined with its cloud deployment options, makes for greater efficacy and cost effectiveness, and makes ShadowPlex a best-in-class distributed deception platform.b

– Golan Ben Oni, CIO, IDT Telecom

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image admin_label=”Detect Respond Engage Image” _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/detect-engage-respond.jpg” /][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”4_4″][et_pb_text admin_label=”Complete Deception Palette” _builder_version=”3.7.1″ text_orientation=”center” header_font_size_tablet=”29px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

Complete Deception Palette

[/et_pb_text][et_pb_image admin_label=”Complete Deception Palette Image” _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/completedecption-palette2.png” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”on” specialty=”off” prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”3.7.1″ background_color=”#f5f5f5″][et_pb_fullwidth_header admin_label=”ACTIVE THREAT HUNTING BASED ON DECEPTION” _builder_version=”3.7.1″ title=”Active Threat Hunting Based on Deception” title_text_align=”center” title_font=”|700|||||||” title_text_color=”#000000″ background_color=”#f5f5f5″ content_text_align=”left” content_text_color=”#000000″ content_font_size=”18px” content_font_size_tablet=”16px” content_font_size_phone=”14px” content_font_size_last_edited=”on|desktop” content_line_height=”1.5em” background_layout=”light” title_font_size_tablet=”28px” title_font_size_phone=”24px” title_font_size_last_edited=”on|phone”]

CrowdStrike provides deep insight into enterprise hosts, using next-generation antivirus and EDR solutions. Acalvio ShadowPlex generates a new stream of low volume, high-fidelity signals based on dynamic deception. Together we bring a new capability – Deception-based Active Threat Hunting – for finding hidden threats.

Features:

  • Adversary Traversal Analysis: Identify the hosts compromised along the attackerbs path to the decoy
  • Attacker View: Build adversary Indicators of Attack (IOA) based on deception incidents and Threat Graph.
  • Similarity Analysis: Proactive identification of machines susceptible to observed exploits
  • Ransomware Protection: Deception-based precise detection and rapid engagement of Ransomware
  • Alert Triage: Active threat hunting to expose latent threats 25 Issued Patents

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” prev_background_color=”#f5f5f5″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]

Similarity Analysis

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/SIMILARITY-ANALYSIS.jpg” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]

Adversary Trajectory Analysis

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/ADVERSARY-TRAJECTORY-2.jpg” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” prev_background_color=”#000000″][et_pb_row][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]

Advantage Acalvio

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/adv_acalvio-2.jpg” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.7.1″]

Coveted Awards

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2019/11/coveted-awards.jpg” /][/et_pb_column][/et_pb_row][/et_pb_section]