SIPM


[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]

ShadowPlex

Security & Identity Posture Management

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]

Acalvio ShadowPlex Security & Identity Posture Management (SIPM) gives Enterprises unprecedent visibility to the attack surfaces on their endpoints, AD and network. ShadowPlex SIPM also helps Enterprises manage their enterprise security posture as seen by an attacker who is already inside the network perimeter. Security breaches are increasing every year and supply chain attacks have become dominant. Use of stolen credentials is increasingly the main attack vector. Advanced Threats leverage credential caches and credential stores to establish persistence, elevate privileges, and move laterally. ShadowPlex SIPM evaluates the identity posture of the network and endpoints and provides the ability to manage and obfuscate the identities which attacks are likely to compromise.

[/et_pb_text][et_pb_text admin_label=”Active Directory Insights” _builder_version=”4.7.0″ text_font_size=”24″ text_letter_spacing=”-1″ header_font_size=”38px” text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Active Directory Insights

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Active Directory (AD) is at the core of most enterprise ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

Active Directory (AD) is at the core of most enterprise infrastructures, and it holds valuable and critical information about user identities, network assets, applications, services, policies, and authentication data. However, given the legacy architecture principles that AD was built upon decades ago, completely securing this crown jewel with todaybs diverse technology and infrastructure complexity has been a challenge for most organizations. This challenge is compounded by the rapid and sophisticated evolution of the threat landscape.

[/et_pb_text][et_pb_text admin_label=”ShadowPlex AD InSights provides security and IT administrators ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

ShadowPlex AD InSights provides security and IT administrators continuous visibility into potential security risk exposure introduced by factors such as unprotected administrator accounts, shadow administrators, over-permissioned accounts, kerberoastable accounts, unmanaged SPNs, and service accounts, among other misconfigurations. ShadowPlex generates these extensive insights spanning user and computer accounts, groups, GPOs, ACLs, domains, forests and trust relationships, and other AD artifacts. The AD InSights engine is powered by AI Threat Models that use data from real and evolving attacks against the Active Directory.

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/azureAD.png” title_text=”azureAD” admin_label=”Image: Azure AD” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”ShadowPlex AD Insights also covers Azure AD ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]

ShadowPlex AD Insights also covers Azure AD and provides attack surface visibility into Applications, Storage Accounts, Database Servers, and Virtual Machines. ShadowPlex does not require special privileges or permissions on the domain to generate the attack surface insights and does not affect AD operations.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Network Asset Insights” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Network Asset Insights” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Network Asset Insights

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Discovers network assets ” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Discovers network assets and automatically clusters them across multiple dimensions. The outliers are highlighted for evaluation

[/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/nw-assets-insights-1.png” title_text=”nw-assets-insights-1″ align=”center” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Continuous Discovery b tracks and evaluates” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

Continuous Discovery b tracks and evaluates new assets joining the network and provides unique visibility into dynamic network assets

[/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/SIPM-NWAssetsInsights.png” title_text=”SIPM-NWAssetsInsights” align=”center” _builder_version=”4.7.0″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Endpoint Insights Section” module_id=”cloud-architecture” _builder_version=”4.7.0″ custom_css_main_element=”background-color:#F1F2F2;” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row make_equal=”on” _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Endpoint Insights” module_id=”pervasive-deception” _builder_version=”4.7.0″ text_font_size=”24″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

Endpoint Insights

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Endpoint Attack Surface Management” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]

Endpoint Attack Surface Management

[/et_pb_text][et_pb_text admin_label=”Discovers and surfaces OS and Applications (List)” _builder_version=”4.7.0″ _module_preset=”default” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]

  • Discovers and surfaces OS and Applications credentials and connections on endpoints that attackers leverage for privilege escalation and lateral movement
  • Optionally, deletes the cached credentials and connections or replaces them with deception
    • [/et_pb_text][et_pb_text admin_label=”Endpoint Security Posture” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]

      Endpoint Security Posture

      [/et_pb_text][et_pb_text admin_label=”Discovers and surfaces endpoint (List)” _builder_version=”4.7.0″ _module_preset=”default” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]

      • Discovers and surfaces endpoint misconfigurations and potential attack vectors
        • [/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/EndpointInsights2.png” title_text=”EndpointInsights2″ admin_label=”Image Endpoint Insights” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Attack Paths Section” module_id=”deception-quantity” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01_LighterMiddle.png” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Attack Paths” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|700|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_2_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”28px” header_2_font_size_phone=”18px” header_2_font_size_last_edited=”on|phone”]

          Attack Paths

          [/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”All sophisticated attacks use pre-analysis tools ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

          All sophisticated attacks use pre-analysis tools that can zero in on identities to compromise once they are inside the enterprise and move within the network without being detected. The misconfigurations in identity repositories combined with the unknown and unattended identity caches lying around on the network provide ideal lateral movement paths for the attacks. Adversaries know exactly how to use these to their advantage, and traditional detection systems would be none the wiser as all of these seem like perfectly legitimate traffic on the network.

          [/et_pb_text][et_pb_text ul_item_indent=”24px” ol_position=”outside” ol_item_indent=”18px” admin_label=”ShadowPlex Attack Paths capability combines” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ol_font=”Roboto|500|||||||” ol_text_align=”left” ol_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ol_font_size_tablet=”14px” ol_font_size_phone=”12px” ol_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

          ShadowPlex Attack Paths capability combines identity repository insights and the endpoint attack surface area with other inputs to identify attack paths involving exploitable chains of relations. This powerful capability has multiple applications, such as:

          1. Which users have access to a key enterprise asset?
          2. Are there any exploitable paths from a member of a group (guests, contractors, interns, etc.) to any key enterprise assets?
          3. Attack paths from one network segment to another, such as attack paths from IT to OT network
          4. Blast radius analysis b list of exploitable assets and attack paths from a compromised identity
          5. What-if analysis b perform scenario analysis prior to making network modifications or policy changes

          [/et_pb_text][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/shadowplex-attack-paths.png” title_text=”shadowplex-attack-paths” align=”center” admin_label=”Attack Paths Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text ul_item_indent=”24px” admin_label=”In addition, ShadowPlex Attack Paths ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]

          In addition, ShadowPlex Attack Paths also provides Ranked Attack Surface Analytics. It is common to find repositories such as Active Directory with hundreds and thousands of identity and asset misconfigurations. Mitigating and fixing these misconfigurations may be a time-consuming task for the security and IT teams. Acalvio provides a Ranked Attack Surface view by scoring the attack surface based on pathways to key assets and providing the defense teams a prioritized list of remediations based on impact.

          [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Customer Benefits Section” module_id=”patents” _builder_version=”4.7.0″ background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Customer Benefits” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

          Customer Benefits

          [/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Customer Benefits List” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]

          • Visibility into Attack Surface inside the enterprise network
            • → enables SOC to eliminate the lateral movement avenues
          • Reduced Identity Attack Surface on the endpoints
            • → reduces the ability for privilege escalation
          • Minimal IT Overhead
            • → all capabilities are driven autonomously with minimal IT resource requirements

          [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

          Next Steps

          [/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]

          Explore our patented technologies to enable Active Defense in your enterprise.

          [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]

          Next Steps

          [/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]

          Let us show you our patented Deception 2.0 technology for your enterprise.

          [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]