Active Defense


[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”ShadowPlex Active Defense” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]

ShadowPlex

Active Defense

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Active Defense” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Acalvio ShadowPlex Active Defense” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”The bad actors are still winning” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]

The bad actors are still winning. The new normal is that adversaries will succeed in breaching and gaining a foothold on machine one, sooner or later. Once inside the network, advanced threats have evolved to living-off-the-land, file-less, malware-less, becoming stealthier and persistent, making them very hard to detect. Cyber defense needs to not only detect and deny attackers from accomplishing their mission they must also significantly reduce dwell time and increase the cost/uncertainty for attackers.

[/et_pb_text][et_pb_text admin_label=”Passive Defense vs Active Defense” _builder_version=”4.7.0″ text_font_size=”24″ text_letter_spacing=”-1″ header_font_size=”38px” text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Passive Defense vs Active Defense

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” disabled_on=”on|on|off” admin_label=”Desktop: Cyber security defenses can be Passive or Active.” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Cyber security defenses can be Passive or Active” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Cyber security defenses can be Passive or Active. Passive solutions focus on bDenialb; essentially denying access to an asset when an attack against it is detected. Active Defense proactively detects and diverts attacks and engages the adversary to learn the attack Tactics, Techniques, and Procedures (TTPs). Active Defense is also about dynamically changing the landscape or the attackerbs perception to detect and mitigate attacks early.

[/et_pb_text][et_pb_text admin_label=”Comprehensive cyber security requires” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#A21D20″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Comprehensive cyber security requires both Passive and Active Defense.

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/passive-active-defense2.jpg” title_text=”passive-active-defense2″ admin_label=”Image: Active Passive Defense” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” disabled_on=”off|off|on” admin_label=”Mobile: Cyber security defenses can be Passive or Active.” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Cyber security defenses can be Passive or Active” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Cyber security defenses can be Passive or Active. Passive solutions focus on bDenialb; essentially denying access to an asset when an attack against it is detected. Active Defense proactively detects and diverts attacks and engages the adversary to learn the attack Tactics, Techniques, and Procedures (TTPs). Active Defense is also about dynamically changing the landscape or the attackerbs perception to detect and mitigate attacks early.

[/et_pb_text][et_pb_text admin_label=”Comprehensive cyber security requires” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#A21D20″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Comprehensive cyber security requires both Passive and Active Defense.

[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/passive-active-defense2.jpg” title_text=”passive-active-defense2″ admin_label=”Image: Active Passive Defense” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Mitre Engage Background image” _builder_version=”4.7.0″ _module_preset=”default” background_enable_color=”off” background_enable_image=”off” background_position=”top_left” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” disabled_on=”on|on|off” admin_label=”Desktop: Mitre Engage” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#262626″ background_enable_image=”off” background_position=”top_left” module_alignment=”center” custom_margin=”0px||0px|0px|true|false” custom_padding=”0px|50px|0px|0px|false|false” custom_css_main_element=”display:flex;”][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” background_enable_color=”off” background_enable_image=”off” background_position=”top_left” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/mitre_background_left_3.jpg” title_text=”mitre_background_left_3″ _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” background_color=”#292929″ custom_padding=”0px|0px|0px|0px|false|false” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”MITRE Engage” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto|700|||||||” text_text_color=”#ffffff” text_font_size=”32px” header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”38px” text_orientation=”center” background_layout=”dark” width=”100%” max_width=”100%” min_height=”100%” height=”100%” text_font_size_tablet=”24px” text_font_size_phone=”20px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]

MITRE Engage

[/et_pb_text][et_pb_text admin_label=”MITRE recently launched MITRE Engage” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#ffffff” text_font_size=”18px” link_font=”Roboto||||||||” link_text_color=”#a21d20″ background_layout=”dark” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone”]

MITRE recently launched MITRE Engage, a knowledge base for Active Defense and adversary engagement. Not surprisingly, MITRE Engage features Deception methodologies as the most effective solution for adopting an Active Defense strategy. Deception technology has taken the center stage for Active Defense, as deceptions do not affect legitimate traffic and transactions, but are deployed to detect and respond to malicious activities.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|on” admin_label=”Mobile Mitre Engage” _builder_version=”4.7.0″ _module_preset=”default” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”10px||10px||true|false”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/mitreengageleft.png” title_text=”mitreengageleft” align=”center” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” max_height=”60%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” background_color=”#262626″ custom_padding=”20px|20px|20px|20px|true|true”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”MITRE Engage” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto|700|||||||” text_text_color=”#ffffff” text_font_size=”32px” header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”38px” text_orientation=”center” background_layout=”dark” width=”100%” max_width=”100%” min_height=”100%” height=”100%” text_font_size_tablet=”24px” text_font_size_phone=”20px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]

MITRE Engage

[/et_pb_text][et_pb_text admin_label=”MITRE recently launched MITRE Engage” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#ffffff” text_font_size=”18px” link_font=”Roboto||||||||” link_text_color=”#a21d20″ background_layout=”dark” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone”]

MITRE recently launched MITRE Engage, a knowledge base for Active Defense and adversary engagement. Not surprisingly, MITRE Engage features Deception methodologies as the most effective solution for adopting an Active Defense strategy. Deception technology has taken the center stage for Active Defense, as deceptions do not affect legitimate traffic and transactions, but are deployed to detect and respond to malicious activities.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”ShadowPlex Active Defense” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”ShadowPlex Active Defense” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

ShadowPlex Active Defense

[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/ShadowPlexActiveDefense.png” title_text=”ShadowPlexActiveDefense” admin_label=”Image: ShadowPlex Active Defense” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text admin_label=”ShadowPlex Active Defense solution provides early” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

ShadowPlex Active Defense solution provides early detection of cyber threats significantly reducing MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond). ShadowPlex is built on 25+ issued patents and leverages AI to make deployment and management of deception autonomous. Based on unique DeceptionFarmsB. architecture, ShadowPlex Active Defense delivers distributed deception at enterprise scale, across on-premises and Cloud workloads and covers both IT and OT networks.

[/et_pb_text][et_pb_text admin_label=”For sophisticated and rapidly growing threats ” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

For sophisticated and rapidly growing threats such as zero-day Ransomware, ShadowPlex Active Defense solution includes specially designed deceptions to rapidly and precisely detect and neutralize the threats without human intervention.

[/et_pb_text][et_pb_text admin_label=”ShadowPlex Active Defense also includes novel deception-” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

ShadowPlex Active Defense also includes novel deception-based response capabilities such as slowing down an attack or diverting attacks away from key assets, and active threat hunting.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Endpoint Insights Section” module_id=”cloud-architecture” _builder_version=”4.7.0″ custom_css_main_element=”background-color:#F1F2F2;” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row make_equal=”on” _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Key Features” module_id=”pervasive-deception” _builder_version=”4.7.0″ text_font_size=”24″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

Key Features

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”Wide Range of Support List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

  • Wide Range of Support
    • → Supports IT and OT networks and both On-premises and Cloud workloads
    • → Flexible Deployment: From Cloud or On-Premises
  • Authentic Deceptions at Scale
    • → Each decoy is unique, and built on real network and application stacks
    • → Just-in-time decoys uniquely enable scale and depth, and reduce license costs for custom decoys
    • → Comprehensive Deception Palette: Decoys, Breadcrumbs and Baits; customizable and extensible
    • → Unique Deception Playbook architecture for autonomous deceptions deployment and management.
  • Protection Against Ransomware Attacks

    • → Specialized Deceptions to detect known and zero-day ransomware
  • Agentless Endpoint Deception Deployment and Refresh

    • → Breadcrumbs/baits automatically configured and personalized for every individual host
    • → No footprint left behind on assets. Ensures no additional attack surface and no fingerprints

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”Comprehensive Active Directory Protection List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

  • Comprehensive Active Directory Protection

    • → Evaluates Active Directory (both on-premises and Azure) for critical configuration vulnerabilities
    • → Requires minimal domain user access; does not affect AD operations
    • → Protect the Production Domain at an early stage of attack and also against advanced AD Attacks

    Maps to MITRE ATT&CK Framework and covers MITRE Engage

  • Powerful Response Capabilities
    • → Powerful Response Capabilities
    • → Quarantine compromised endpoints automatically
    • → Divert attack away from assets and slowdown attacks leveraging deception technology
    • → Just-in-Time Engage using high-interaction decoys and collect TTPs
  • Improves SOC Efficiency

    • → Active Threat Hunting enables SOC analysts do hypothesis testing and threat confirmation
  • Integration with Security Ecosystem
    • → SIEM, EDR, Firewall, NAC, SOAR, etc.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Customer Benefits Section” module_id=”patents” _builder_version=”4.7.0″ background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Customer Benefits” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

Customer Benefits

[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Customer Benefits List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

  • Reduced Attacker Dwell Time
    • → detection of malicious activity with Precision and Speed
  • Enables Rapid Investigation
    • → collects detailed attack artifacts
  • Automated Response
    • →by leveraging extensive integrations
  • Minimal IT Overhead
    • → all capabilities are driven autonomously with minimal IT resource requirements
  • Reduced Attacker Dwell Time
    • → detection of malicious activity with Precision and Speed
  • Novel Response options
    • → by leveraging extensive integrations
  • Low Total Cost of Ownership

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Read More” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” hover_enabled=”0″ text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop” sticky_enabled=”0″]

Read More

[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Read More List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” hover_enabled=”0″ text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop” link_font=”Roboto||||||||” link_text_color=”#a21d20″ sticky_enabled=”0″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Next Steps

[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]

Explore our patented technologies to enable Active Defense in your enterprise.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Next Steps

[/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]

Let us show you our patented Deception 2.0 technology for your enterprise.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]