[et_pb_section fb_built=”1″ admin_label=”Header: OT Risk Management b Deceiving Your Way to OT/ICS Security” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/2020_Acalvio_Secondary_1920x486_14-Cloud.jpg” custom_margin=”0px|0px|0px|0px”][et_pb_row admin_label=”Header: OT Risk Management b Deceiving Your Way to OT/ICS Security” _builder_version=”4.7.0″ background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”HEADER: OT Risk Management b Deceiving Your Way to OT/ICS Security” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”32″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”42px” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”36px” text_orientation=”center” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”30px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone”]
OT Risk Management b Deceiving Your Way to OT/ICS Security
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_enable_image=”off”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Operational Technology (OT) networks are both high value and difficult ” _builder_version=”4.7.0″ text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]
Operational Technology (OT) networks are both high value and difficult to secure.
[/et_pb_text][et_pb_text admin_label=”The challenges to securing OT in refineries, utilities and manufacturing include:” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]The challenges to securing OT in refineries, utilities and manufacturing include:
- Concern that security controls will cause production failures;
- The wide variety of esoteric, proprietary devices and protocols;
- Onerous and inflexible change control procedures;
- Poor documentation of the OT technical environment;
[/et_pb_text][et_pb_text admin_label=”Acalvio ShadowPlex addresses the challenges of OT/ICS security, without incurring risk to facility operations:” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]Acalvio ShadowPlex addresses the challenges of OT/ICS security, without incurring risk to facility operations:
| ShadowPlex Attribute | OT Security Benefit |
| Highly Effective Detection | Detects adversary tradecraft in OT environments quickly |
| No Risk | No agents; no active scanning and no impact on production systems |
| Coverage | Supports IT and OT environments; bridges IT / OT cross-domain gap |
| Visibility | Provides detailed network intelligence, and investigative forensics |
| Ease of Deployment | Automated Autonomous Deception; no in-line devices |
[/et_pb_text][et_pb_text admin_label=”ShadowPlex operates independently of the production systems, ” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]ShadowPlex operates independently of the production systems, without agents, in-line appliances, or active scanning. This fact is crucial to alleviating concerns about potential negative impact to the plant. It provides continuous visibility with respect to whatb s on the network by passive scanning. And because Deception can easily be deployed in both IT and OT networks, it can provide protection for the IT/OT network interface, a key attack vector.[/et_pb_text][et_pb_text admin_label=”Acalviob s strategy for Deception centers on flexible customization. ” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”18px” text_line_height=”1.3em” ul_font_size=”18px” ul_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]Acalviob s strategy for Deception centers on flexible customization. Because OT environments vary so widely, deploying a turn-key solution and expecting it to be credible is unrealistic. ShadowPlex Autonomous Deception crafts deception assets to blend into the OT network, and can deploy decoys that leverage OT-specific custom web interfaces and golden images. It can mimic hardware devices seen in OT environments, and custom breadcrumbs can be deployed on either the IT or OT side to lure adversaries to the decoys. These features make ShadowPlex an ideal choice for OT risk management and security.[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row disabled_on=”on|on|on” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” disabled=”on”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”|0px||0px|false|false”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/08/pdf-download-2.png” title_text=”pdf-download-2″ url=”https://www.acalvio.com/unifying-risk-management-and-threat-detection-for-it-ot-convergence/” align=”center” admin_label=”PDF icon” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_margin=”|0px||0px|false|true” custom_padding=”|0px||0px|false|true”][/et_pb_image][et_pb_button button_url=”https://www.acalvio.com/unifying-risk-management-and-threat-detection-for-it-ot-convergence/” button_text=”Acalvio ShadowPlex in OT/ICS Environments” button_alignment=”center” admin_label=”Acalvio ShadowPlex in OT/ICS Environments – button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_margin=”30px|0px|30px|0px|true|true” custom_css_main_element=”background-color: #A21D20;margin-right:12px;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” locked=”off” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”CTA with side x side Buttons” _builder_version=”3.22″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” border_color_all=”#a21d20″][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Next Steps
[/et_pb_text][et_pb_text admin_label=”Explore our patented technologies to enable Active Defense in your enterprise.” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px” background_layout=”dark”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ module_alignment=”center” hover_enabled=”0″ custom_css_main_element=” ” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” sticky_enabled=”0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][et_pb_button button_url=”https://www.acalvio.com/resources-and-documents/case-studies/” button_text=”CASE STUDIES” admin_label=”CASE STUDIES button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_te
xt_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” hover_enabled=”0″ custom_margin=”0px||||false|false” custom_padding=”0px||||false|false” sticky_enabled=”0″][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/unifying-risk-management-and-threat-detection-for-it-ot-convergence/” button_text=”Download the Whitepaper: ShadowPlex in OT/ICS Environments” button_alignment=”center” admin_label=”Download the Whitepaper: ShadowPlex in OT/ICS Environments” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]