[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”ShadowPlex Intelligent SOC & Threat Hunting” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]
ShadowPlex
Intelligent SOC & Threat Hunting
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Acalvio ShadowPlex Intelligent SOC & Threat Hunting (ISOC) ” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px||0px||false|false” custom_margin_last_edited=”off|” custom_padding=”||0px||false|false” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Acalvio ShadowPlex Intelligent SOC & Threat Hunting (ISOC) ” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Acalvio ShadowPlex Intelligent SOC & Threat Hunting (ISOC) ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
Acalvio ShadowPlex Intelligent SOC & Threat Hunting (ISOC) provides a unique set of threat investigation capabilities that leverage cyber deception to improve Security Operations Center efficiency. Rapid threat investigation requires narrowing the set of assets that are likely to have been compromised, quick analysis of the collected attack artifacts and automated threat hunting. ShadowPlex ISOC provides capabilities in each of these three areas, besides also providing unified global visibility and situational awareness into attack progression.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”ShadowPlex ISOC Capabilities” _builder_version=”4.7.0″ _module_preset=”default” header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#a21d20″ header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
ShadowPlex ISOC Capabilities
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”ShadowPlex ISOC Capabilities List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
- Adversary Traversal
- → Uses data from the enterprise data lake to trace the path of the attack through the enterprise network
- Similarity Analysis
- → Leverages data from known compromised machines to determine the list of similar exploitable assets
- Targeted Endpoint Forensics
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”ShadowPlex ISOC Capabilities List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
- Active Threat Hunting
- → Enables SOC analysts to do hypothesis testing and threat confirmation using deception technology
- Link Analysis
- → Links events from various security products and highlights relationships across various observations
- Analysis of Attack Artifacts
- → Machine learning based PowerShell script and log analysis, providing capability and attribution
- → Memory snapshot analysis for memory-resident malware
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Active Threat Hunting Section” _builder_version=”4.7.0″ _module_preset=”default” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”Active Threat Hunting” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
Active Threat Hunting
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” admin_label=”Active Threat Hunting UL List” _builder_version=”4.7.0″ _module_preset=”default” collapsed=”off”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_text admin_label=”Threat Hunting activities are mandatory to reduce risk ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]
Threat Hunting activities are mandatory to reduce risk and to meet the requirements of recommendations such as the NIST CyberSecurity Framework. The challenge is to execute these activities with limited staff and budget. Advanced Deception solutions are very well suited to meeting this challenge: You simply configure and deploy deception assets such that attackers who satisfy your hunting hypothesis will be attracted to them.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/threat_hunting.jpg” title_text=”threat_hunting” align=”center” admin_label=”Image: Active threat hunting” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Adversary Traversal” module_id=”deception-quantity” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01_LighterMiddle.png” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text ul_item_indent=”24px” admin_label=”Adversary Traversal” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
Adversary Traversal
[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”UL List: AI-driven automated analysis leverages” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
- AI-driven automated analysis leverages a known security incident and uses data from the enterprise data lake to trace the path of the attack through the enterprise network
- Narrows down the set of potential compromised assets and enables rapid investigation
[/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/adversary-traversal.png” title_text=”adversary-traversal” align=”center” admin_label=”Image: Adversary Traversal” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Similarity Analysis” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Similarity Analysis” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Similarity Analysis
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_text ul_item_indent=”24px” admin_label=”UL List: Innovative AI-driven automated analysis” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
- Innovative AI-driven automated analysis leverages data collected from known compromised machines to determine the list of similar exploitable enterprise assets
- Extracts additional value from existing enterprise data lakes
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/SimilarityAnalysis.png” title_text=”SimilarityAnalysis” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Endpoint Forensics” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||||false|false” hover_enabled=”0″ da_disable_devices=”off|off|off” collapsed=”off” sticky_enabled=”0″ da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Endpoint Forensics” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Endpoint Forensics
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_text ul_item_indent=”24px” admin_label=”UL List: Deep and comprehensive forensics collected” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
- Deep and comprehensive forensics collected on any compromised enterprise endpoint
- AI-Driven analysis to determine attack TTPs
- Increases SOC efficiency by making compromised endpoint analysis faster and easier
[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/EndpointForensics.png” title_text=”EndpointForensics” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Many Advanced Analytics Section” module_id=”cloud-architecture” _builder_version=”4.7.0″ custom_css_main_element=”background-color:#F1F2F2;” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row make_equal=”on” _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Many Advanced Analytics” module_id=”pervasive-deception” _builder_version=”4.7.0″ text_font_size=”24″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Many Advanced Analytics
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” collapsed=”on”][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_text admin_label=”Automated Forensic Evidence Analysis” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Automated Forensic Evidence Analysis
[/et_pb_text][et_pb_text admin_label=”PowerShell Logs (List)” _builder_version=”4.7.0″ _module_preset=”default” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]
- PowerShell Logs
- PowerShell Scripts
- Memory dumps
- Event Logs
- Links various security events for holistic view
- Highlights relationships across various observations
- → Deceptions Events
- → Enterprise Endpoints Events
- Shows Attack progression
- Provides context for nodes
- Provides situational awareness
- Shows asset activity heat map
- [/et_pb_text][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/MemoryForensicAnalysis.png” title_text=”MemoryForensicAnalysis” admin_label=”Image Endpoint Insights” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text admin_label=”Caption: Memory Forensic Analysis (Process Hollowing)” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_orientation=”center” custom_margin=”12px||||false|false” custom_padding=”0px||||false|false” text_font_size_tablet=”12px” text_font_size_phone=”10px” text_font_size_last_edited=”on|phone”]
Memory Forensic Analysis (Process Hollowing)
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Link Analysis” _builder_version=”4.7.0″ _module_preset=”default” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Link Analysis” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|700|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]
Link Analysis
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_text ul_item_indent=”24px” admin_label=”Link Analysis” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”align-self: center;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/LinkAnalysis.png” title_text=”LinkAnalysis” align=”center” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Next Steps” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]
Let us show you our patented Deception 2.0 technology for your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]