[et_pb_section bb_built=”1″ _builder_version=”3.0.82″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_01.jpg” box_shadow_position=”outer” custom_margin=”0px|0px|0px|0px” next_background_color=”#ffffff”][et_pb_row admin_label=”Product Page – Header” _builder_version=”3.0.82″ background_position=”top_left” background_repeat=”repeat” _i=”0″ _address=”0.0″ box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex: Welcome to Autonomous Deception” _builder_version=”3.6″ background_layout=”dark” text_orientation=”center” module_alignment=”center” header_text_color=”#ffffff” text_text_color=”#ffffff” header_font_size=”42px” header_font_size_tablet=”38px” header_font_size_phone=”27px” header_font_size_last_edited=”on|desktop” text_font_size=”32″ text_font_size_last_edited=”on|phone” header_font=”|700|||||||”]
Acalvio Shadowplex
Welcome to
Autonomous Deception
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_01.svg” box_shadow_position=”outer” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″ width_unit=”off” custom_width_percent=”70%” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex Autonomous Deception delivers” _builder_version=”3.0.82″ background_layout=”light” text_orientation=”center” header_text_align=”center” border_style=”solid” box_shadow_position=”outer” module_alignment=”center” text_font_size=”28″ text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size=”34px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” text_font=”Roboto||||” header_font=”Roboto||||” header_letter_spacing=”1px”]
ShadowPlex Autonomous Deception
Accurate Detection
Timely Detection
Cost-Effective Detection
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex is designed for Enterprise IT, IoTand ICS environments” _builder_version=”3.7.1″ text_font_size=”28″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” text_line_height=”1.3em”]
ShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#41505b;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex delivers full life cycle detection capability” _builder_version=”3.7.1″ background_layout=”light” header_text_color=”#f4f4f4″ border_style=”solid” box_shadow_position=”outer” text_orientation=”center” header_text_align=”center” module_alignment=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
Full lifecycle capabilities
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”4_4″][et_pb_image admin_label=”Circle Arrows Image” _builder_version=”3.6″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_DetectEngageRespond_onDARK.svg” align=”center” max_width=”90%” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” module_class=”row-background” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex has all essential” _builder_version=”3.7.1″ header_text_align=”center” text_font_size=”28″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”4_4″][et_pb_image admin_label=”Pentagon” _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_RequirementsForDeceptionPentagon_onLIGHT-1.png” align=”center” max_width=”70%” custom_margin=”|||50px” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#f1f2f2;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”Deception Farms” _builder_version=”3.7.1″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer”]
Deception Farms
Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility.
[/et_pb_text][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_DeceptionFarms_onLIGHT-1-jh-1.png” max_width=”70%” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” module_class=”row-background” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″][et_pb_column type=”4_4″][et_pb_text admin_label=”Fluid Deception” _builder_version=”3.6″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” text_orientation=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” module_alignment=”center”]
Fluid Deception
Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys.
[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_FluidDeceptions_onLIGHT-2-jh-1.png” align=”center” force_fullwidth=”on” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#41505b;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex distributed deception platform” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer”]
ShadowPlex Distributed Deception Platform
[/et_pb_text][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_DistributedDeceptionPlatform_onDARK_OL.png” border_style=”solid” max_width=”70%” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_HOME.png” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Intuitive Dashboard” _builder_version=”3.6″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Intuitive Dashboard
Comprehensive visibility into Deception alerts and their scope and status
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_2″][et_pb_text admin_label=”Recommendation Engine” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Recommendation Engine
AI-driven suggestions for ideal deception campaigns
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_RECOMMENDATION.png” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_01.svg” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_INTENT-BASED-CONFIGURATION.png” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Intent based Configuration” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Intent based Configuration
Simplifies the process of designing complex, yet effective deception campaigns
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_2″][et_pb_text admin_label=”Deception Incidents Dashboard” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Deception Incidents Dashboard
Visualize incident timelines and details
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_DECEPTION_INCIDENTS.png” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_INCIDENT_DETAILS.png” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Incident Details” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Incident Details
Complete forensics of adversary behavior, including PCAPs, full host logging, network connections, file downloads, and generated IOCs.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_2″][et_pb_text admin_label=”High Interaction Decoy” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
High Interaction Decoys
Authentic host systems are used to attract and keep adversaries engaged, while providing detailed logging.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_DECOYS.png” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.6″ box_shadow_position=”outer” background_size=”contain” background_position=”center_right” module_alignment=”right” custom_css_main_element=”background-size:50%;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_SIEM-INTEGRATION.png” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”SIEM Integration” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
SIEM Integrations
ShadowPlex integrates with all the leading SIEMs.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_04.svg” background_size=”contain” background_position=”center_right” module_alignment=”right” custom_css_main_element=”background-size:50%;” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”1_2″][et_pb_text admin_label=”ArcSight Integration” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
ArcSight Integration
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_ARCSIGHT_INTEGRATION.png” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” background_size=”contain” background_position=”center_right” module_alignment=”right” prev_background_color=”#ffffff” next_background_color=”#f1f2f2″ bottom_divider_style=”arrow”][et_pb_row][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_KIBANA.png” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Kibana” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Kibana
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_2″][et_pb_text admin_label=”Splunk” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”margin-top:20px;”]
Splunk
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_image _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Screenshots_on_Laptop_SPLUNK.png” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”3.6″ background_color=”#f1f2f2″ custom_padding=”50px|||”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”API Support” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer”]
API Support
ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer”]
- Threat Intelligence
- IT Change Management platforms
- SOAR (Security Orchestration and Response)
- SIEM
- Perimeter Defense
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer”]
- NAC (Network Access Control)
- Vulnerability Managers
- SSO, Identity Management, Privileged User Management Systems
- EDR, End-point
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”CTA with side x side Buttons” specialty=”off” _builder_version=”3.6″ border_color_all=”#a21d20″ prev_background_color=”#f1f2f2″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg”][et_pb_row _builder_version=”3.6″ width_unit=”off” module_alignment=”center” use_custom_width=”on”][et_pb_column type=”4_4″][et_pb_text admin_label=”Next Steps” _builder_version=”3.6″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” custom_padding=”|25px||25px” text_text_color=”#ffffff” header_text_color=”#ffffff”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”3.6″ text_text_color=”#ffffff” background_layout=”dark” text_font_size=”24px”]
Let us show you our patented Deception 2.0 technology for your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer” custom_css_main_element=” ” module_class=”btn-inline”][et_pb_column type=”4_4″][et_pb_button admin_label=”Demo Button” _builder_version=”3.6″ button_text=”SCHEDULE A DEMO” button_url=”https://go.acalvio.com/demo” background_layout=”dark” custom_button=”on” button_use_icon=”off” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_border_color_hover=”#ffffff” button_border_color=”#a21d20″ /][/et_pb_column][/et_pb_row][/et_pb_section]