[et_pb_section fb_built=”1″ admin_label=”Header Section” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/product-shadowplex.jpg” custom_margin=”0px|0px|0px|0px”][et_pb_row admin_label=”Product Page – Header” _builder_version=”3.25″ background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Header: ShadowPlex: Welcome to Autonomous Deception” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”32″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”42px” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”38px” text_orientation=”center” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”32px” header_2_font_size_phone=”24px” header_2_font_size_last_edited=”on|phone”]
Acalvio ShadowPlex
Autonomous Deception
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|off” admin_label=”Dr Eugene Spafford quote” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” background_size=”contain” background_position=”bottom_right” hover_enabled=”0″ collapsed=”off” sticky_enabled=”0″][et_pb_row admin_label=”Dr Eugene Spafford quote” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Dr Eugene Spafford quote” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”32px” custom_padding=”24px|24px|24px|24px|true|true” hover_enabled=”0″ border_radii=”on|8px|8px|8px|8px” border_width_all=”2px” border_color_all=”#0c71c3″ box_shadow_style=”preset2″ sticky_enabled=”0″]
b Acalviob s innovations have made deception practical and affordable at scale without sacrificing any of the efficacy.b
Dr Eugene Spafford, Executive Director Emeritus of the
Center for Education and Research in Information Assurance and Security (CERIAS)
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”Dr Eugene Spafford quote with pic” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” background_size=”contain” background_position=”bottom_right” disabled=”on” collapsed=”on”][et_pb_row column_structure=”1_4,3_4″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” animation_style=”fade” custom_css_main_element=”display: flex;|| align-items: center;|| justify-content: center;” border_radii=”on|12px|12px|12px|12px” border_width_all=”2px” border_color_all=”#0c71c3″ box_shadow_style=”preset3″][et_pb_column type=”1_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/09/spaf.jpg” title_text=”spaf” align=”center” admin_label=”Dr Eugene Spafford Pic” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Dr Eugene Spafford quote” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”32px” custom_padding=”24px|24px|24px|24px|true|true” border_color_all=”#0c71c3″]
b Acalviob s innovations have made deception practical and affordable at scale without sacrificing any of the efficacy.b
Dr Eugene Spafford, Executive Director Emeritus of the
Center for Education and Research in Information Assurance and Security (CERIAS)
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ background_enable_color=”off” custom_margin=”50px||||false|false” custom_padding=”0px||||false|false” collapsed=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Organizations are turning to Active Defense” _builder_version=”4.7.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]Organizations are turning to Active Defense solutions based on advanced deception because they are low-risk to deploy and avoid the false-positive issues of alternative approaches. Acalviob s offering, ShadowPlex, has been architected to set a new standard for APT, ransomware and malware mitigation in the following dimensions:[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.7.0″ _module_preset=”default” collapsed=”off”][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/10/Acalvio_Website_PRODUCT_400X250_EASE-OF-USE4.jpg” title_text=”Acalvio_Website_PRODUCT_400X250_EASE-OF-USE(4)” align=”center” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/10/Acalvio_Website_PRODUCT_400X250_SCALE4.jpg” title_text=”Acalvio_Website_PRODUCT_400X250_SCALE(4)” align=”center” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/10/Acalvio_Website_PRODUCT_400X250_EFFECTIVENESS4.jpg” title_text=”Acalvio_Website_PRODUCT_400X250_EFFECTIVENESS(4)” align=”center” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Patented Deception Farm Architecture” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
Patented Deception Farm Architecture
[/et_pb_text][et_pb_text admin_label=”Acalviob s key differentiator is our patented Deception Farm architecture” _builder_version=”4.7.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Acalviob s key differentiator is our patented Deception Farm architecture. All deception solutions deploy deceptive artifacts that act as tripwires to detect intruders. However, unlike alternatives, ShadowPlex centralizes the process. In the case of decoys (fake hosts or b honeypotsb ) they are hosted in a single area (on-prem or in the Cloud), and then are strategically b projectedb across the enterprise network, where they appear as realistic local assets. Furthermore, we change the complexity of a decoy b on the flyb in response to attacker engagement, another patented Acalvio capability we call Fluid Deception. This unique method of resource efficiency allows ShadowPlex to deliver both high scale and depth of decoy realism. [/et_pb_text][et_pb_text admin_label=”Autonomous Deception” _builder_version=”4.7.0″ text_font_size=”28″ header_font=”|600|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
Autonomous Deception
[/et_pb_text][et_pb_text admin_label=”Another key differentiator is Autonomous Deception” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Another key differentiator is Autonomous Deception: ShadowPlex automates and simplifies the configuration and deployment of deception objects. Combining pre-defined playbooks with an AI-based Recommendation Engine, the system self-generates and places the appropriate deception objects within the environment. This not only reduces the operational effort, but also creates a deception environment that is more credible and maintains credibility over time. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”6px||||false|false” custom_padding=”0px||||false|false”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” custom_margin=”0px||||false|false” custom_padding=”0px||||false|false”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2021/04/Acalvio-Active-Defense-New-Web-Graphic-APR-2021_V01_SVG-1.svg” title_text=”Acalvio_Active_Defense_5-part_Graphic_New_ReversedForSlider(WhiteType)” align=”center” admin_label=”Active Defense 5 Part Graphic” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text admin_label=”Leveraging over 25 patents, these ShadowPlex differentiators provide” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Leveraging over 25 patents, these ShadowPlex differentiators provide several critical benefits:[/et_pb_text][et_pb_text admin_label=”Ease of Use list description” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” ul_font=”||||||||” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
- Ease of Use: Because all the decoys are in one place, you donb t have to worry about managing multiple servers all over the network. Deception objects are easy to configure, deploy, and manage, thanks to Autonomous Deception.
- Scale: You can scale up the number of decoys and their distribution across the enterprise simply by adding compute power in the Deception Farm. Fluid Deception and the sharing of compute resources allows you to minimize the amount of compute, storage, and software licenses required.
- Effectiveness: Deception objects are automatically customized for each part of the network; decoys and breadcrumbs and baits are autonomously updated to keep them fresh and relevant as network characteristics change.
[/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/06/ESG_Quote-1.png” title_text=”ESG_Quote-1″ align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”ESG Labs Quote” _builder_version=”4.7.0″ max_width=”70%”][/et_pb_image][et_pb_text admin_label=”The ShadowPlex solution offers several other key capabilities” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]The ShadowPlex solution offers several other key capabilities:
Rich Palette of Realistic Deception Objects: The solution supports a vast array of deception objects, beginning with decoys that mimic hosts running standard operating systems, including OT and IoT hosts. They also include endpoint lures, breadcrumbs, and baits: fake artifacts including registry entries, credentials, shared drives and many more that either act as tripwires in their own right, or lead the attacker towards the decoys. ShadowPlex supports an extensive set of field-expandable object types and variations, and automates the generation and deployment of these assets so that they blend in with their surroundings. [/et_pb_text][et_pb_text admin_label=”Active Directory Protection: ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Active Directory Protection: Three capabilities prevent attacks against Active Directory
- InSights Evaluates AD objects and identifies risks automatically. Includes object information, summary statistics, and detailed identification of dozens of types of potential security risks within the AD object database
- Deception Decoys and Breadcrumbs Obfuscates AD infrastructure and exposes attempts to attack it, using fake domain controllers, AD forests, and baits
- Cached Credential Clean Up Reduces attack surface and diverts attackers from AD
[/et_pb_text][et_pb_text admin_label=”Integrations” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Integrations: Effective security operations depends on integrating security and infrastructure systems to work together. ShadowPlex has extensive out-of-box integrations with solutions, including EDR, SIEM and SOAR, email servers, network management tools and Active Directory.[/et_pb_text][et_pb_text admin_label=”Incident Response Portal” _builder_version=”4.7.0″ _module_preset=”default” text_font=”||||||||” text_text_color=”#000000″ text_font_size=”1.5em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]Incident Response Portal: ShadowPlex gathers intelligence about attack TTPs based on actual observed behavior, which can be used for forensics or threat hunting. The Analyst Portal makes this data available in a simple user interface aligned with the needs of the forensic analyst.[/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/06/ShadowPlex_ease-of-ops.png” title_text=”ShadowPlex_ease-of-ops” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_font=”|600|||||||” text_orientation=”center” custom_margin=”6px||||false|false” custom_padding=”0px||||false|false”]ShadowPlex provides ease of operations and effectiveness at all stages of the deployment lifecycle[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ background_color=”#fdfdfd”][et_pb_row _builder_version=”4.7.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”ShadowPlex offers rapid time to value for breach detection, response and engagement” _builder_version=”4.7.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”#000000″ text_font_size=”2em” text_line_height=”1.3em” header_font=”Roboto||||” header_text_align=”center” header_font_size=”34px” header_letter_spacing=”1px” background_layout=”dark” module_alignment=”center” text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]ShadowPlex offers rapid time to value for breach detection, response and engagement; proactive Threat Hunting, and more. It can be deployed fully on-premises, in the cloud, or as a service from MSSPs.[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”CTA with side x side Buttons” _builder_version=”3.22″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” border_color_all=”#a21d20″][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Next Steps
[/et_pb_text][et_pb_text admin_label=”Explore our patented technologies to enable Active Defense in your enterprise.” _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px” background_layout=”dark”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/resources-and-documents/case-studies/” button_text=”CASE STUDIES” admin_label=”CASE STUDIES button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Demo Button” _builder_version=”4.7.0″ custom_button=”on” button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”#ffffff” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]