Public Sector


[et_pb_section fb_built=”1″ _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/02/Acalvio_Public-Sector_1920x486_01.jpg” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Page Title Acalvio Active Defense b Meeting the Adversary Challenge for US Federal” _builder_version=”4.7.0″ header_font=”|700|||||||” header_text_align=”center” header_text_color=”#000000″ header_font_size=”40px” header_line_height=”1.5em” header_font_size_tablet=”30px” header_font_size_phone=”28px” header_font_size_last_edited=”on|phone”]

Acalvio Active Defense b Meeting the Adversary Challenge for US Federal

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22″ custom_margin=”||0px|” custom_padding=”||0px|” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ custom_margin=”||0px|” custom_padding=”||0px|”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”All federal entities (DoD, Intel Community, and Civilian Agencies) ” _builder_version=”4.7.0″ header_font=”|600|||||||” header_text_align=”left” header_text_color=”#191919″ header_font_size=”40px” header_line_height=”1.5em” header_3_text_align=”left” header_3_line_height=”1.5em” header_font_size_tablet=”38px” header_font_size_phone=”28px” header_font_size_last_edited=”on|phone”]

All federal entities (DoD, Intel Community, and Civilian Agencies) are under continuous attack from the most sophisticated adversaries, including nation state actors. Perimeter defenses have repeatedly failed, and it would be foolhardy to assume that this will ever change. Detection systems have recently garnered more attention, but the passive approach still leaves the entity simply waiting for the inevitable, and unable to respond quickly enough to mitigate the damage.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.7.0″ _module_preset=”default” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Federal and Industry organizations have recognized the efficacy” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”16px” link_text_color=”#a21d20″ header_font=”|600|||||||” header_text_align=”left” header_text_color=”#a21d20″ header_2_font=”|700|||||||” header_2_text_color=”#a21d20″ header_2_font_size=”28px” header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]Federal and Industry organizations have recognized the efficacy of Active Defense based on Cyber Deception as the threats become increasingly sophisticated. CISA is urging immediate deployment of Cyber Deception for Network Security in the latest “2022-2026 Strategic Technology Roadmap, Version 4″. NSA has published a detailed report on the effectiveness of cyber deception based on large red-team studies in the bThe Next Waveb Vol 23, 2021. [/et_pb_text][et_pb_text admin_label=”Active Defense is bThe employment of limited offensive ” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” width=”80%” max_width=”80%” module_alignment=”center” custom_padding=”18px|18px|18px|18px|true|true” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”#dbdbdb”]

Active Defense is bThe employment of limited offensive action and counterattacks to deny a contested area or position to the enemy.b US DoD

[/et_pb_text][et_pb_text admin_label=”When using Active Defense” _builder_version=”4.7.0″ header_font=”|600|||||||” header_2_font=”|700|||||||” header_2_text_align=”left” header_2_text_color=”#a21d20″ header_2_font_size=”28px” header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|desktop”]When using Active Defense, organizations engage with incoming threats to better understand and counter them, rather than operating static security controls and hoping for the best. In practice, Active Defense requires a process that includes four ingredients:

  • High-fidelity detection: Itbs not enough to just detect an attack: It must happen immediately, no matter from what vector, and without spurious false positives and minor alerts that obscure the threat.
  • Engagement: Once detected, Active Defense enables the responders to channel and contain the attack, without the adversary knowing about it.
  • Analysis: Now contained, the attackerbs TTPs can safely be observed and understood, and their identity and motivations revealed. High value assets can be obfuscated from the attackerbs perspective.
  • Response: With the full picture in hand, the defenders can decide how, when, and where to respond, as well as improve controls to defeat future attempts to use the same TTPs.

[/et_pb_text][et_pb_text admin_label=”MITRE has come up with MITRE Engage” _builder_version=”4.7.0″ text_font_size=”16px” link_text_color=”#a21d20″ text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]MITRE has come up with MITRE Engage, an Active Defense framework for adversary engagement operations to secure network interior based on deception.[/et_pb_text][et_pb_text admin_label=”Acalvio is a pioneer in Active Defense strategies” _builder_version=”4.7.0″ text_font_size=”16px” header_font=”|600|||||||” header_font_size=”20px” header_line_height=”1.5em” header_2_font=”|600|||||||” header_3_text_align=”left” header_3_font_size=”20px” header_3_line_height=”1.3em” hover_enabled=”0″ text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”18px” header_font_size_phone=”16px” header_font_size_last_edited=”on|desktop” header_3_font_size_tablet=”18px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone” sticky_enabled=”0″]Acalvio is a pioneer in Active Defense strategies, leveraging innovations in Distributed Deception, Artificial Intelligence, and Threat Analysis. Our ShadowPlex solution allows government entities to implement Active Defense at scale, across on-premises and cloud infrastructure. [/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_code admin_label=”Four key security controls Code” _builder_version=”4.7.0″ _module_preset=”default”]

At the most fundamental level, Acalvio strives to provide four key security controls

[/et_pb_code][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Acalviobs deception-based detection is superior” _builder_version=”4.7.0″ _module_preset=”default” hover_enabled=”0″ text_font_size=”16px” header_3_font_size=”20px” sticky_enabled=”0″]Acalviobs deception-based detection is superior to alternative approaches such as behavioral analytics because it is both more accurate (few false positives) and more efficient and easier to deploy. By adopting an Active Defense strategy, federal, state, and local governments can establish a scalable resistance to attacks of all types: ransomware, data theft, or service denial. They also can implement control activities consistent with the control objectives in NIST CSF, 800-160, and 800-171/172. With a low-operational footprint and integrations with key security architecture components, ShadowPlex is well-suited to supporting government efforts to detect and defeat all types of attackers, including nation states and criminal enterprises.[/et_pb_text][et_pb_text admin_label=”External Resources” _builder_version=”4.7.0″ _module_preset=”default” link_text_color=”#a21d20″ hover_enabled=”0″ text_font_size=”16px” header_font=”||||||||” header_3_font_size=”20px” sticky_enabled=”0″]

External Resources:

  1. CISA 2022-2026 Strategic Technology Roadmap, Version 4
  2. NSA bThe Next Waveb, Vol 23 2021

[/et_pb_text][et_pb_text admin_label=”Blank” _builder_version=”4.7.0″ _module_preset=”default” link_text_color=”#a21d20″ hover_enabled=”0″ text_font_size=”16px” header_font=”||||||||” header_3_font_size=”20px” sticky_enabled=”0″][/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”NIST CYBER SECURITY FRAMEWORK” _builder_version=”4.7.0″ header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#a21d20″ header_2_font_size=”24px” text_orientation=”center” header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]

Additional Content


Get the Report

[/et_pb_text][et_pb_text admin_label=”Acalvio-and-NIST-sp-800-171b” _builder_version=”3.27.4″ text_orientation=”center”]

Get the Report


[/et_pb_text][et_pb_text admin_label=”Acalvio Deception and the Mitre Attack framework” _builder_version=”4.7.0″ text_orientation=”center”]

Get the Report

[/et_pb_text][et_pb_text admin_label=”Osterman Research WP” _builder_version=”4.7.0″ text_orientation=”center” custom_padding=”||50px||false|false”]

Free analyst report: Security threats in the public sector

[/et_pb_text][/et_pb_column][/et_pb_section]