ShadowPlex Identity Security


[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Identity Security” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]

ShadowPlex

Identity Security

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Identity as the new security perimeterb is the reality” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]

bIdentity as the new security perimeterb is the reality. The traditional security perimeter has become porous with the rapid adoption of cloud services, mobile solutions, internet-facing applications, and the recent hybrid work-from-home model. The new normal is that the traditional perimeters will be breached sooner or later. The focus is now on internal identity security protection so that the breaches do not become disasters.

Acalvio ShadowPlex Identity Protection includes visibility and management of the identity attack surface area and an effective deception-based solution to detect and respond against identity attacks. The first step in reducing the attackerbs chance for success is to identify the identity attack surface. For the attack surface that cannot be removed, ShadowPlex provides targeted cyber deception to detect and respond to identity compromise attempts.

[/et_pb_text][et_pb_text admin_label=”Identity Attack Surface Visibility & Management” _builder_version=”4.7.0″ text_font_size=”24″ text_letter_spacing=”-1″ header_text_align=”center” header_font_size=”38px” text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Identity Attack Surface Visibility & Management

[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/IdentityAttackSurface2.jpg” title_text=”IdentityAttackSurface2″ align=”center” admin_label=”Image: Identity Attack Surface ” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text admin_label=”Identity Attack Surface includes identity repositories” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Identity Attack Surface includes identity repositories and credential caches on endpoints. ShadowPlex provides deep visibility into the attack vectors in both kinds of identity stores and proactive management of the identity attack paths.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Identity Repositories” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Identity Repositories

ShadowPlex provides insights into the attack targets in on-premises AD deployments, Azure AD, and Hybrid AD deployments. ShadowPlex also provides visibility into M365B. email attack surface area. ShadowPlex does not require special privileges or permissions on the domain to generate the attack surface insights and does not affect AD operations.

[/et_pb_text][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/attack_paths_6.jpg” title_text=”attack_paths_6″ admin_label=”Image: Identity Attack Surface ” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/Credential-Caches_6.jpg” title_text=”Credential-Caches_6″ admin_label=”Image: Credential Caches” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Credential Caches” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Credential Caches

A credential cache holds credentials (or tickets) on an endpoint so that authenticating to a service or an enterprise asset multiple times doesnbt require repeated contacting the credential store or re-entering the credentials. When adversaries breach the enterprise network, it is rather simple to enumerate cached credentials and select an identity to compromise. ShadowPlex Endpoint Attack Surface Management capability provides in-depth visibility into identity caches.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Attack Paths” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Attack Paths

All sophisticated attacks use pre-analysis tools that can zero in on identities to compromise once they are inside the enterprise and move within the network without being detected. ShadowPlex Attack Paths capability combines identity repository insights and the endpoint attack surface area with vulnerability data and observed exploits to identify attack paths involving exploitable chains of relations.

[/et_pb_text][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/attack_paths_3.jpg” title_text=”attack_paths_3″ admin_label=”Image: Attack Paths” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/identity_protection.jpg” title_text=”identity_protection” admin_label=”Image: Identity” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Identity Protection” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Identity Protection

[/et_pb_text][et_pb_text admin_label=”Identity Protection” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

ShadowPlex provides early detection of identity attacks with precision and speed. ShadowPlex deploys blended and targeted deception in identity repositories and identity caches, to detect identity exploit attempts and lead attacks to decoys.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”ShadowPlex AD attack detection uses ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_font_size_tablet=”14px” text_font_size_phone=”” text_font_size_last_edited=”on|phone”]

ShadowPlex AD attack detection uses a combination of decoy users, computers, and SPNs to detect sophisticated attacks against AD. Based on the attack type, ShadowPlex uses an AI module to automatically recommend the deception to deploy. By leveraging the insights gained from identity attack surface visibility, ShadowPlex can craft a set of precise deceptions that address the attack type and blend into the contents of the AD. ShadowPlex provides a pre-built curated palette of non-fingerprintable deceptions designed specifically to detect advanced Active Directory attacks

[/et_pb_text][et_pb_text admin_label=”ShadowPlex also provides management of endpoint” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_font_size_tablet=”14px” text_font_size_phone=”” text_font_size_last_edited=”on|phone”]

ShadowPlex also provides management of endpoint attack surface area to reduce the attack surface by removing the cached credentials in various endpoint credential caches, as well as a capability to replace any cached real credentials with deceptions.

[/et_pb_text][et_pb_text admin_label=”ShadowPlex has an extensive palette of identity ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” text_font_size_tablet=”14px” text_font_size_phone=”” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone”]

ShadowPlex has an extensive palette of identity deceptions to deploy in all endpoint credential caches to detect credential cache exploits and redirect attacks to decoys. This includes

  • Privileged User Credentials and Profiles
  • Pathways for lateral movement
  • Security configurations
  • Security configurations

The endpoint identity deceptions are blended and personalized by an AI engine for each endpoint, and the deployment process leaves no fingerprints. The deceptions are customizable and extensible, including customer-specific applications. The deceptions are also automatically refreshed as endpoint configurations change.

[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Read More” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#414042″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_3_font=”Roboto|500|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ module_alignment=”left” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

Read More

[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Identity Security is a critical component of the enterprisesb ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#414042″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|tablet” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

Identity Security is a critical component of the enterprisesb overall security strategy. The right depth of visibility, analysis, guidance and control on mitigation can remarkably help strengthen the proactive security posture. Acalvio provides novel AI-powered automated processes to obtain visibility into identity exposure risk and analysis at enterprise scale. Leveraging an award-winning Autonomous Deception platform, ShadowPlex can deploy a layer of identity deception across the identity repositories, identity caches, and the network to detect and respond to identity attacks. Follow the links below to read more.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Next Steps

[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]

Explore our patented technologies to enable Active Defense in your enterprise.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Next Steps

[/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]

Let us show you our patented Deception 2.0 technology for your enterprise.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]