[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”What is ShadowPlex Cyber Deception” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]
What is ShadowPlex Cyber Deception
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Acalvio ShadowPlex Security & Identity Posture Management” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Cyber Deception detects threats by overlaying” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
Cyber Deception detects threats by overlaying a fabric of pervasive deception across the enterprise network. Deception is not part of the enterprise business processes and systems. Hence any interaction with deception generates a high-fidelity alert. This form of threat detection, which can detect even zero-day exploits, is increasingly acknowledged as an important security layer in the fight against cyber attacks.
[/et_pb_text][et_pb_text admin_label=”Cyber Deception has been around for a couple of decades” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
Cyber Deception has been around for a couple of decades mostly as honeypots – cleverly crafted fake computing resources, placed as to seem part of the enterprise IT network and containing valuable information. Honeypots, though effective, have been difficult to deploy at scale and to manage by keeping them fresh and relevant.
[/et_pb_text][et_pb_text admin_label=”The state of cyber deception has evolved ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
The state of cyber deception has evolved significantly in the recent years. ShadowPlex is a state-of-the-art Distributed Deception Platform (DDP), which can automatically deploy thousands of deceptions corresponding to any network element, across distributed and hybrid enterprise networks.
[/et_pb_text][et_pb_text admin_label=”Deception is NOT” _builder_version=”4.7.0″ text_font_size=”24″ text_letter_spacing=”-1″ header_font_size=”38px” text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Deception is NOT just Honeypots
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”ShadowPlex Cyber Deception provides a comprehensive ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]
ShadowPlex Cyber Deception provides a comprehensive deception palette that includes Decoys (also called honeypots), Lures, Breadcrumbs and Baits. The deceptive assets are blended into and deployed throughout the distributed (and hybrid) network, on the enterprise endpoints and in credential stores such as Active Directory. Any attacker access to deception generates a high-fidelity alert.
[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/breadcrumbslures.png” title_text=”breadcrumbslures” admin_label=”Image: Lures Breadcrumbs” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Start with Decoy Types” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Start with Decoy Types” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Start with Decoy Types
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/acalvio-innovation.png” title_text=”acalvio-innovation” align=”center” admin_label=”Image: Acalvio Innovation” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Low Interaction Decoys” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” header_3_text_color=”#414042″ max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Low Interaction Decoys
- Network services and applications
- Attacker cannot login
- Often done via emulation leading to lower quality decoys
- Can deploy many decoys
[/et_pb_text][et_pb_text admin_label=”High Interaction Decoys” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” header_3_text_color=”#414042″ max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
High Interaction Decoys
- Real VM Hosts, Applications, Database Servers, Shares
- Attacker can login b full interaction higher quality decoys
- Can only deploy Few Decoys
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Add Lures to make Decoys Attractive” module_id=”comprehensive” _builder_version=”4.7.0″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Add Lures to make Decoys Attractive” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Add Lures to make Decoys Attractive
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Deliberately place Lures” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” header_3_text_color=”#a21d20″ max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Deliberately place Lures
- Vulnerabilities in OS, Application, Protocols
- Weak configurations and permissions
- Fake Service Accounts
[/et_pb_text][et_pb_text admin_label=”Acalvio Innovation” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” header_3_text_color=”#a21d20″ max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Acalvio Innovation
→ Extensible framework for the customer to add lures as necessary[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/attractive-lures3.png” title_text=”attractive-lures3″ align=”center” admin_label=”Image: Acalvio Innovation” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Lead Attacks to Decoys Section” module_id=”cloud-architecture” _builder_version=”4.7.0″ custom_css_main_element=”background-color:#F1F2F2;” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row make_equal=”on” _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Lead Attacks to Decoys” module_id=”pervasive-deception” _builder_version=”4.7.0″ text_font_size=”24″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Lead Attacks to Decoys
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Many uses for Breadcrumbs / Baits” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Many uses for Breadcrumbs / Baits
- Act as Micro-sensors
- Give (mis)information
- Give booby trapped tools
- Redirect attacks to decoys
- → Completely automated configuration, deployment and management of breadcrumbs and baits
- Networks can change
- Adversary behavior will change
- Threats will change
- → Integrated AI keeps track of each network neighborhood and each endpoint settings across the enterprise and automatically blends deception
- Hardly changes
- Easy to fingerprint & avoid
- → Always auto-changing
- → Hard to identify or fingerprint
- Initial foothold
- Attacker has remote command & control
- Initial recon
- Redundancy
- Sacrificial lambs
- Initial foothold
- Data exfiltration
- Disruption
- Dense Minefield
- Detect Adversary as Beachheads Established
- Present False Trail
- Deceive Adversary During Recon
- Divert Away from Mission Objective to Decoy
- Tripwires detect and alert when accessed
- [/et_pb_text][et_pb_text admin_label=”Acalvio Innovation” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Acalvio Innovation
- [/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/breadcrumbsleadattacks.png” title_text=”breadcrumbsleadattacks” admin_label=”breadcrumbs Lead Attacks Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Blend Deception Section” module_id=”deception-quantity” _builder_version=”4.7.0″ background_enable_image=”off” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Blend Deception” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|700|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_2_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”28px” header_2_font_size_phone=”18px” header_2_font_size_last_edited=”on|phone”]
Blend Deception
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;” collapsed=”off”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Deception needs to blend (List)” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Deception needs to blend into the environment continuously to be effective
- [/et_pb_text][et_pb_text admin_label=”Acalvio Innovation” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Acalvio Innovation
- [/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/blend-deception.png” title_text=”blend-deception” admin_label=”Blend Deception Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Keep Deception Dynamic Section” module_id=”deception-quantity” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01_LighterMiddle.png” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Keep Deception Dynamic” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|700|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_2_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”28px” header_2_font_size_phone=”18px” header_2_font_size_last_edited=”on|phone”]
Keep Deception Dynamic
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;” collapsed=”off”][et_pb_column type=”1_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Blank” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ custom_margin=”||0px||false|false” custom_padding=”0px||12px||false|false” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/static-deceptions-4.png” title_text=”static-deceptions-4″ admin_label=”Keep Deception Dynamic Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Blank” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ custom_margin=”||0px||false|false” custom_padding=”0px||12px||false|false” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
[/et_pb_text][et_pb_text admin_label=”Static Deceptions List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Static Deceptions
- [/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Blank” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ custom_margin=”||0px||false|false” custom_padding=”0px||12px||false|false” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/dynamic-deceptions-3.png” title_text=”dynamic-deceptions-3″ admin_label=”Shape-Shifting Mimic Octopus Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Acalvio Innovation” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ custom_margin=”0px||0px||false|false” custom_padding=”0px||12px||false|false” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Acalvio Innovation
[/et_pb_text][et_pb_text admin_label=”Dynamic Deceptions” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Dynamic Deceptions
- [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”How does Deception work?” module_id=”deception-quantity” _builder_version=”4.7.0″ background_enable_image=”off” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”on” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”How does Deception work?” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|700|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_2_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”28px” header_2_font_size_phone=”18px” header_2_font_size_last_edited=”on|phone”]
How does Deception work?
[/et_pb_text][et_pb_text admin_label=”A Spear-phishing Example” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ module_alignment=”center” custom_margin=”||0px||false|false” custom_padding=”0px||12px||false|false” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
A Spear-phishing Example
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;” collapsed=”on”][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Spear-phish List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Spear-phish
- [/et_pb_text][et_pb_text admin_label=”Establish Additional Beachheads List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Establish Additional Beachheads
- [/et_pb_text][et_pb_text admin_label=”Lateral move towards Mission Objective(s) List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#A21D20″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Lateral move towards Mission Objective(s)
- [/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/09/howdoesdeceptionwork.png” title_text=”howdoesdeceptionwork” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Decoys List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#1F64A8″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Decoys
- [/et_pb_text][et_pb_text admin_label=”Breadcrumbs List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#1F64A8″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Breadcrumbs
- [/et_pb_text][et_pb_text admin_label=”Baits List” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” text_line_height=”1em” ul_font=”Roboto||||||||” ul_text_color=”#414042″ header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#1F64A8″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|tablet”]
Baits
- [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”How does this help me?” module_id=”patents” _builder_version=”4.7.0″ background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Cyber Deception provides a completely different ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ max_width=”90%” module_alignment=”center” hover_enabled=”0″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop” sticky_enabled=”0″]
Cyber Deception provides a completely different way to detect attacks and complements existing security solutions which are based on signatures and behavioral models. Cyber Deception has proven to be very effective, but the first-generation solutions had limitations. Acalvio ShadowPlex provides a modern platform, that is enterprise scale and autonomous.
[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Please follow the b Read Moreb link to understand” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ ul_font_size=”18px” header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ max_width=”90%” module_alignment=”center” hover_enabled=”0″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop” sticky_enabled=”0″]
Please follow the b Read Moreb link to understand why you need cyber deception when you have other security solutions already deployed in your enterprise network.
[/et_pb_text][et_pb_text admin_label=”READ MORE CTA” _builder_version=”4.7.0″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″]
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”NeXt STEPS” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” ” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]
Let us show you our patented Deception 2.0 technology for your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]