[et_pb_section fb_built=”1″ admin_label=”https://acalvio.p2staging.us/wp-content/uploads/2020/02/02_Acalvio_Federal_1920x486-fade-to-black.jpg” _builder_version=”4.0.10″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/2020_Acalvio_Secondary_1920x486_10-Cloud.jpg”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Cyber Security in Government Osterman Research White Paper” _builder_version=”4.0.10″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#000000″ header_font_size=”40px” header_font_size_tablet=”30px” header_font_size_phone=”” header_font_size_last_edited=”on|desktop”]
From Honeypots to Modern Cyber Deception:
The Path to Greater ROI and Effectiveness
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”3.27.4″ text_font_size=”18px”]
The need to optimize security ROI
Enterprise security budgets are always under pressure. Given the myriad types of threats, and the dynamic nature of IT (e.g. cloud, application architectures, BYOD, privacy and compliance), the requirements placed on security budgets and staff always exceed capacity. This whitepaper will discuss how cyber security deception technologies have evolved from interesting but inefficient solutions to financially attractive options for cyber defense. By improving the ROI of security spend, modern deception helps relieve the pressure on budgets and staff.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2020/06/hptomodcyberdeception4.png” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/osterman_research_wp.jpg” _builder_version=”4.0.10″][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_code admin_label=”Pardot Form Code” _builder_version=”4.0.10″ hover_enabled=”0″ custom_css_main_element=”background-color:#f7f7f7;”]
[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section]