Acalvio Staging

  • Acalvio Buyers Guide
  • Acalvio Crowdstrike Partnership
  • Acalvio Customer Reference Consumer Services
  • Acalvio ShadowPlex Active-Directory Protection
  • Acalvio ShadowPlex Case Study: Financial Services Company
  • Acalvio ShadowPlex Customer Reference Research University
  • Acalvio ShadowPlex Customer Reference: Industrial Manufacturer
  • Acalvio Verizon Blackhat 2019
  • Acalvio-and-NIST-SP-800-171B
  • Active Directory Protection
  • Active Threat Hunting with Autonomous Deception
  • Alliances
  • Apply Now
  • at-a-glance
  • Blog
    • Thank You
  • Blog
    • Resources
  • Blog-2020
  • Cisco Solution Brief
  • Cloud Software Engineer
  • Combat Zero Day ransomware
  • Company
    • Careers Thank You
  • Contact
  • Crowdstrike
  • Data Processing Agreement
  • Deception and the MITRE Att&ck Framework
  • Deception for Dummies
  • deception2dot0
  • Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers
  • Divi Slider
  • Download 3 Minutes Until the Apocalypse
  • Download Acalvio Deception NIST CSF White Paper
  • Download the Definitive Guide to Cyber Deception 2.0
  • DR TEST PAGE
  • EMA Research Report
  • EPRI_Deception_Paper
  • ESG Labs WhitePaper
  • eula
  • Firecompass Deception Report
  • firecompass_buyers_guide
  • Form Testing
  • From Honeypots to Modern Cyber Deception: The Path to Greater ROI and Effectiveness
  • High Accuracy, Low Noise Breach Detection
  • HOME
  • Home 2021
  • Home 2022
  • Market Spotlight for Cyber Deception Systems
  • Osterman Research Paper
  • OT Risk Management b Deceiving Your Way to OT/ICS Security
  • Partners
  • plbleads
  • Privacy Policy
  • Privacy Policy
  • Product
  • Product Backup
  • Public Sector
  • QA Engineer
  • Request A Demo
  • Reseller
  • Resources
    • Analyst Reports
    • Case Studies
      • Acalvio Customer Reference – Consumer Packaged Goods
      • Acalvio ShadowPlex – Customer Reference Digital Media
      • Acalvio ShadowPlex – Customer Reference Semiconductor
    • Data Sheets
    • E- Books
    • E-Books
    • Events
    • Events
    • In the News
    • Press Releases
    • Thank You
    • Webinars
    • Webinars
    • White Papers
      • 7 Critical Considerations for Effective Breach Detection
  • Review Pages
    • Active Defense
    • Careers
    • Detect Respond
    • Director Product Marketing, Security
    • Intelligent SOC & Threat Hunting
    • Main
    • Regional Sales Director – Central
    • Regional Sales Director – East
    • ShadowPlex Identity Security
    • SIPM
    • Technology
    • What is Deception
    • Why Deception
  • RSA 2020
  • RSS FEED
  • Sample Page
  • SANS Webinar – Real World Implementation of Deception Technologies
  • SANS Whitepaper
  • Schedule a Demo
  • Schedule a Meeting
  • SDN-Network Developer
  • Setup a Meeting with Us
  • ShadowPlex – Combating Zero-Day Ransomware
  • ShadowPlex Cloud
  • ShadowPlex Cloud b Datasheet
  • ShadowPlex Crowdstrike
  • ShadowPlex Crowdstrike Solution Brief
  • ShadowPlex Crowdstrike-2 col
  • ShadowPlex Google Cloud Data Sheet
  • ShadowPlex-2020
  • ShadowPlex-Cloud-2020
  • Sitemap
  • Slider 2019
  • Slider Test Page
  • Solution Brief: How deception can improve your security and identity posture
  • Template 2018
  • TEST Company
  • Thank You
  • Thank you for Contacting Us
  • Thank you for Demo Request
  • The KuppingerCole Leader Compass Report 2021
  • Threat Hunting
  • Unifying Risk Management and Threat Detection for IT/OT Convergence
  • US Federal
  • Why Acalvio
    • FAQ and Glossary
  • Why Acalvio 2020
  • Why Active Defense?
Illustration of a bird flying.
  • Beyond the Hype: AI in Information Security

    Beyond the Hype: AI in Information Security

    In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce are already embedding AI into their products, the Information Security (InfoSec) industry is also catching up […]

    December 7, 2017
  • Lateral Movement of Emotet

    Lateral Movement of Emotet

    Acalvio Threat Research Labs. Introduction Emotet is one of many information stealer malware families which have been active in the recent months. The initial delivery vector of the malware is via phishing campaign. The blog by TrendMicro[1] and Microsoft[2] discusses the first stage infection of the malware and shares statistics on the global infection. Once […]

    December 4, 2017
  • CSO Magazine Names ShadowPlex One of Best Security Products

    CSO Magazine Names ShadowPlex One of Best Security Products

    CSO Magazine has named Acalvio’s ShadowPlex as one of theB best security products of the year. CSO specifically cites Acalvio’s ease of use and “unlimited deception assets without constant overhead or maintenance” as value added features. You may read the entireB review of ShadowPlex here. The reviewers performed hands-on evaluations of some of “the most […]

    November 30, 2017
  • Technical White Paper : Using Deception to Detect Spreading Techniques

    Technical White Paper : Using Deception to Detect Spreading Techniques

    The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such […]

    November 22, 2017
  • Three Minutes Until the Apocalypse

    Three Minutes Until the Apocalypse

    [et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”This blog covers three main topics:” _builder_version=”4.7.0″ _module_preset=”default”]This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,3_4″ […]

    November 7, 2017
  • Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs. To help organizations find the right vendor for their infrastructure, companies can use rFinderybs cybersecurity marketplace to aid in making buying decisions. […]

    November 6, 2017
  • Spreading Technique used by Retadup Worm.

    Spreading Technique used by Retadup Worm.

    Acalvio Threat Research Lab Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend Labs[1][2].B This blog will share the spreading technique used by the worm […]

    October 2, 2017
  • Can We Automate Threat Hunting?

    Can We Automate Threat Hunting?

    Threat hunting has been primarily a playground for security experts to surface unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt […]

    September 21, 2017
  • Ransomware Defense Webinar with Acalvio & Splunk

    Ransomware Defense Webinar with Acalvio & Splunk

    Ransomware is the fastest-growing threat facing enterprises, threatening to reach a total cost of $5 Billion in impact. A deception centric architecture provides inherent advantages over other traditional architectures. Learn more about how a deception-based approach can be an effective part of your overall security strategy. Speakers: Raj Gopalakrishna, Acalvio and Vijay Chuahan, Splunk August […]

    August 15, 2017
  • Deception Centric Defense Against Ransomware

    Team Acalvio It is estimated that in 2017, damages due to the ransomware will exceed $5 billion.[8]B When successful, ransomware can not only infect the endpoint, it can also spread across the network extending its exploit. The initial versions of ransomware like CryptoWall, CryptoFortess, DMA-Locker, CryptoLuck used mapped and unmapped drive for lateral movement. B […]

    August 7, 2017
←Previous Page
1 … 22 23 24 25 26 … 33
Next Page→

Acalvio Staging

Proudly powered by WordPress