[et_pb_section fb_built=”1″ admin_label=”Header: High Accuracy, Low-Noise Breach Detection” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/2020_Acalvio_Secondary_1920x486_14-Cloud.jpg” custom_margin=”0px|0px|0px|0px”][et_pb_row admin_label=”Header: High Accuracy, Low-Noise Breach Detection” _builder_version=”4.7.0″ background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”HEADER: High Accuracy, Low-Noise Breach Detection” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”32″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”42px” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”36px” text_orientation=”center” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”30px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone”]
High Accuracy, Low-Noise Breach Detection
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_enable_image=”off”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Breach Detection is the core Deception use case” _builder_version=”4.7.0″ text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
Breach Detection is the core Deception use case. Security teams must assume that adversaries will penetrate even the most sophisticated defenses, necessitating post-breach detection. Numerous standards specifically call for detection controls, including at least three from NIST alone: The Cybersecurity Framework, SP 800-171B, and SP 800-160.
[/et_pb_text][et_pb_text admin_label=”Breach Detection is challenging however, for several possible reasons” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
Breach Detection is challenging however, for several possible reasons:
- The wide range of attacker methodologies (TTPs)
- The lack of a solid baseline of b normalb in the environment
- Lack of sufficient well-qualified staff
- Silos between tools and teams
[/et_pb_text][et_pb_text admin_label=”Advanced Deception solutions for breach detection represent” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
Advanced Deception solutions for breach detection represent the culmination of years of development, beginning with honeypots decades ago and now leveraging AI/ML for ease of deployment and scale. At the highest level, the concept is a simple one:
- Deploy fake assets (decoys, breadcrumbs, and baits) in the internal network that attackers will find attractive
- If an attacker engages with such assets, create an alert to be investigated
[/et_pb_text][et_pb_text admin_label=”The advantages of this approach to breach detection” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
The advantages of this approach to breach detection are clear
- Low Risk – Completely independent of production assets; no agents or in-line appliances
- Low False Positives – If someone engages with a deception asset, it canb t be for legitimate business purposes and is therefore likely an intruder
[/et_pb_text][et_pb_text admin_label=”Acalvio ShadowPlex Advanced Deception builds on this concept” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
Acalvio ShadowPlex Advanced Deception builds on this concept and takes it to the level required to handle todayb s threats across the hybrid cloud:
- Pervasive Detection – Assets are deployed to attract, detect, and misdirect the adversary at each kill chain step during the attack
- Low False Positives – If someone engages with a deception asset, it canb t be for legitimate business purposes and is therefore likely an intruder
- A rich mix of assets types to blend into any environment and address the wide variety of attacker TTPs.
- Cloud hosted and managed for scale, cost control and ease of operations
- Automated deployment that adapts to the environment for higher credibility
- Simultaneous support for additional use cases: Visibility, Attack Forensics and Obfuscation
[/et_pb_text][et_pb_text admin_label=”ShadowPlex enables organizations large and small” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
ShadowPlex enables organizations large and small to implement high-fidelity, low-risk breach detection without a major commitment of budget or staff.
[/et_pb_text][et_pb_text admin_label=”This strategy recognizes that despite the best protection NIST 800-171B” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” custom_padding=”12px|12px|12px|12px|true|true” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”#dbdbdb”]
“This strategy recognizes that despite the best protection measures implemented by organizations, the APT may find ways to breach those primary boundary defenses and deploy malicious code within a defenderb s system. When this situation occurs, organizations must have access to additional safeguards and countermeasures to confuse, deceive, mislead, and impede the adversaryb that is, taking away the adversaryb s tactical advantage and protecting and preserving the organizationb s critical programs and high value assets.”
NIST 800-171B
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/resources-and-documents/white-papers/7-critical-considerations-for-effective-breach-detection/” button_text=”7 Critical Considerations for Effective Breach Detection” button_alignment=”center” admin_label=”https://www.acalvio.com/resources-and-documents/white-papers/7-critical-considerations-for-effective-breach-detection/” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_margin=”0px|0px|0px|0px|true|true” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”CTA with side x side Buttons” _builder_version=”3.22″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” border_color_all=”#a21d20″][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Next Steps
[/et_pb_text][et_pb_text admin_label=”Explore our patented technologies to enable Active Defense in your enterprise.” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px” background_layout=”dark”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/resources-and-documents/case-studies/” button_text=”CASE STUDIES” admin_label=”CASE STUDIES button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Demo Button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]