[et_pb_section fb_built=”1″ admin_label=”Title and Background Section ” _builder_version=”4.7.0″ background_color=”#000000″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2022/08/Picture1.jpg” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” module_alignment=”center” make_fullwidth=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Why do I need ShadowPlex Cyber Deception” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”24″ text_line_height=”1.8em” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”42px” module_alignment=”center” text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” custom_css_main_element=”color:#ffffff;font-weight:600;”]
Why do I need
ShadowPlex Cyber Deception
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Intro: Why Deception” _builder_version=”4.7.0″ background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” custom_css_main_element=”background-position: center bottom; ” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”Why Deception” _builder_version=”4.7.0″ module_alignment=”center” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Most organizations implement relatively static” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
Most organizations implement relatively static and denial-based cybersecurity defenses. They deploy controls such as firewalls, anti-virus, and vulnerability management, and start monitoring for events. The problem is that attackers can repeatedly probe for weaknesses in these denial-based defenses, and then apply maximum pressure at the defenderb s weak point. In addition, defense evasion measures for many of these security solutions are well-known and public. Determined attackers eventually find a way in b it has become a question of b whenb and not b ifb .
[/et_pb_text][et_pb_text admin_label=”Cyber Deception provides ” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” link_font=”Roboto|500|on||||||” link_text_color=”#a21d20″ header_text_align=”left” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop”]
Cyber Deception provides Active Defense, by introducing new decoy assets into the enterprise network. The decoy assets are not part of the normal business processes, and any attacker interaction results in a high-fidelity alert. In addition to detection, deception also disrupts attacks not by denying access, but by confusing and diverting attacks away from enterprise assets and engaging using decoy assets.
[/et_pb_text][et_pb_text admin_label=”Deception is Complementary to Traditional Cyber Defenses” _builder_version=”4.7.0″ text_font_size=”24″ text_letter_spacing=”-1″ header_font_size=”38px” text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Deception is Complementary to Traditional Cyber Defenses
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”3_5,2_5″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”display:flex;margin:auto;”][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_text admin_label=”Traditional cybersecurity defenses monitor” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]
Traditional cybersecurity defenses monitor all activity against regular assets and alert on suspicious activity – detected based on signatures or anomaly detection using probabilistic machine learning models. This results in a lot of false positives and also misses zero-day exploits.
[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_css_main_element=”margin:auto;”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/yinyan.png” title_text=”yinyan” show_bottom_space=”off” align=”center” admin_label=”Image: Yin Yan” _builder_version=”4.7.0″ _module_preset=”default” width=”60%” max_width=”60%” module_alignment=”center” min_height=”60%” height=”60%” max_height=”60%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Cyber deception deploys a pervasive deceptive layer” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font_size=”32px” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop”]
Cyber deception deploys a pervasive deceptive layer across the enterprise network and endpoints. Detection is based on activity against deception and does not depend on signatures or anomaly detection. This provides several benefits:
- Generates a new stream of low volume and high-fidelity alerts, which adds to and extracts value from the alerts raised by other defenses
- Provides another layer of defense based on orthogonal detection methodology, complementary to the traditional cyber defenses
- Detects even zero-day exploits, since deception-based detection does not depend on whether the exploit has been seen before
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Deception Provides Dynamic Defense” module_id=”comprehensive” _builder_version=”4.7.0″ background_color=”#F1F2F2″ custom_margin=”||-4%|” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Deception Provides Dynamic Defense” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” text_orientation=”center” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Deception Provides Dynamic Defense
[/et_pb_text][et_pb_text admin_label=”Denial-based cybersecurity defenses are relatively ” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Denial-based cybersecurity defenses are relatively same throughout the enterprise and even across enterprises. If an attacker manages to evade a specific defense, this monoculture helps attacker use the same strategy to evade that same defense everywhere else as well.
[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/DeceptionProvidesDynamicDefense.png” title_text=”DeceptionProvidesDynamicDefense” align=”center” admin_label=”Image: Deception Provides Dynamic Defense” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text admin_label=”ShadowPlex cyber deception uses Artificial Intelligence ” module_id=”comprehensive” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” header_font=”Roboto|500|||||||” header_text_color=”#414042″ header_font_size=”38px” max_width=”90%” module_alignment=”center” animation_direction=”bottom” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
ShadowPlex cyber deception uses Artificial Intelligence to deploy relevant and blended deception, automatically customized to every endpoint and every subnet even within the same enterprise. The deception is also automatically updated and kept fresh to match any changes in the network neighborhood. Even if an attacker identifies a deceptive asset, it does not provide any insight into the other deceptive assets anywhere else including in the same neighborhood, which makes deception-based cybersecurity very effective.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Deception Covers all Enterprise Assets Section” module_id=”cloud-architecture” _builder_version=”4.7.0″ da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row make_equal=”on” _builder_version=”4.7.0″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Deception Covers all Enterprise Assets” module_id=”pervasive-deception” _builder_version=”4.7.0″ text_font_size=”24″ header_font_size=”38px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Deception Covers all Enterprise Assets
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Cyber deception covers all enterprise assets” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]
Cyber deception covers all enterprise assets. ShadowPlex ships with 150+ built-in deception types and, more importantly, includes a framework to easily add additional deception types. The agentless architecture of ShadowPlex cyber deception can protect all assets where EDR agents cannot be deployed and networks where NDR solutions cannot sit inline.
[/et_pb_text][et_pb_text admin_label=”Deception works extremely well for protecting OT / ICS ” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]
Deception works extremely well for protecting OT / ICS networks as it is a low-risk solution that does not need any agents and does not impact the enterprise assets in any way.
[/et_pb_text][et_pb_text admin_label=”Attackers also go after applications (for example” _builder_version=”4.7.0″ _module_preset=”default” text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_color=”#414042″ ul_font_size=”18px” header_3_font=”Roboto|700|||||||” header_3_text_align=”left” header_3_text_color=”#414042″ text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” ul_font_size_tablet=”14px” ul_font_size_phone=”12px” ul_font_size_last_edited=”on|phone” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]
Attackers also go after applications (for example, Log4Shell is an exploit typically against web applications). Deception is a great mechanism to defend from application threats, by providing new deceptive set of application targets for the attacker and by protecting the real applications by embedding deceptions in them.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/DeceptionCoversEnterpriseAssets.jpg” title_text=”DeceptionCoversEnterpriseAssets” admin_label=”Image Deception Covers all Enterprise Assets” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_bui
lt=”1″ admin_label=”Identity Security Section” module_id=”deception-quantity” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01_LighterMiddle.png” background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Identity Security” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_text_color=”#414042″ header_font_size=”38px” header_2_font=”Roboto|700|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ header_2_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”28px” header_2_font_size_phone=”18px” header_2_font_size_last_edited=”on|phone”]
Identity Security
[/et_pb_text][et_pb_image src=”https://www.acalvio.com/wp-content/uploads/2022/08/IdentitySecurity2.jpg” title_text=”IdentitySecurity2″ align=”center” admin_label=”Identity Security Image” _builder_version=”4.7.0″ _module_preset=”default”][/et_pb_image][et_pb_text ul_item_indent=”24px” admin_label=”Identity is always of interest to attackers” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Identity is always of interest to attackers, as demonstrated through the APT 29/SolarWinds exploits. Current Detect and Respond security solutions do not have built in awareness of Identity threats, Deception is a great defense mechanism to detect Identify compromise. ShadowPlex provides visibility into attack targets in identity stores and caches, and uses deception to detect and respond to identity compromises.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Analyst Recommendations Section” module_id=”patents” _builder_version=”4.7.0″ background_position=”top_right” da_disable_devices=”off|off|off” collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text ul_item_indent=”24px” admin_label=”Analyst Recommendations” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_font_size=”22px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” header_2_font=”Roboto|500|||||||” header_2_text_align=”center” header_2_text_color=”#414042″ text_orientation=”center” max_width=”90%” module_alignment=”center” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”” header_2_font_size_last_edited=”on|desktop”]
Analyst Recommendations
[/et_pb_text][et_pb_text ul_item_indent=”24px” admin_label=”Recent reports from IDC, KuppingerCole” _builder_version=”4.7.0″ text_font=”Roboto||||||||” text_text_color=”#414042″ text_font_size=”18px” ul_font=”Roboto||||||||” ul_text_align=”left” ul_text_color=”#000000″ header_font=”Roboto|500|||||||” header_text_align=”center” header_font_size=”38px” max_width=”90%” module_alignment=”center” text_font_size_tablet=”14px” text_font_size_phone=”12px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_color_all=”rgba(0,0,0,0)”]
Recent reports from IDC, KuppingerCole and other technology analysts endorse the importance of cyber deception.
[/et_pb_text][et_pb_text admin_label=”IDC” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” width=”80%” max_width=”80%” module_alignment=”center” custom_padding=”18px|18px|18px|18px|true|true” hover_enabled=”0″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”#dbdbdb” header_font=”Roboto|700|||||||” header_text_align=”left” header_text_color=”#414042″ header_font_size_last_edited=”on|desktop” sticky_enabled=”0″ header_font_size=”18px” header_line_height=”1.5em”]
“Deception is no longer a luxury item , but another important security layer in the fight against cyber-attacks”
The Role of Deception Technology in IoT/OT Security
IDC Market Perspective, July 2022
[/et_pb_text][et_pb_text admin_label=”KuppingerCole Leadership Compass” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” width=”80%” max_width=”80%” module_alignment=”center” custom_padding=”18px|18px|18px|18px|true|true” hover_enabled=”0″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”#dbdbdb” header_font=”Roboto|700|||||||” header_text_align=”left” header_text_color=”#414042″ header_font_size_last_edited=”on|desktop” sticky_enabled=”0″ header_font_size=”18px” header_line_height=”1.5em”]
“Deception is an established and growing specialty in cybersecurity”
“By design, distributed deception platforms have a far lower false positive rate than IDS/IPS, SIEMs, and some other tools, which can improve efficiency in SOCs”
Distributed Deception Platforms (DDPs)
KuppingerCole Leadership Compass, Sep 2021
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” max_width=”80%” module_alignment=”center”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”24px”]
Explore our patented technologies to enable Active Defense in your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”SCHEDULE A DEMO Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”CTA with side x side Buttons” _builder_version=”4.7.0″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” da_disable_devices=”off|off|off” border_color_all=”#a21d20″ disabled=”on” global_module=”5768″ collapsed=”off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ max_width=”80%” module_alignment=”center” use_custom_width=”on” width_unit=”off” collapsed=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Next Steps” _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24″ header_text_color=”#ffffff” header_font_size=”38px” custom_padding=”|25px||25px” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid”]
Next Steps
[/et_pb_text][et_pb_text _builder_version=”4.7.0″ text_text_color=”#ffffff” text_font_size=”24px”]
Let us show you our patented Deception 2.0 technology for your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”btn-inline” _builder_version=”3.25″ module_alignment=”center” custom_css_main_element=” “][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_button button_url=”https://www.acalvio.com/schedule-a-demo/” button_text=”SCHEDULE A DEMO” admin_label=”Learn More Button” _builder_version=”4.7.0″ custom_button=”on” button_border_width=”3″ button_border_color=”#a21d20″ button_use_icon=”off” background_layout=”dark” custom_padding=”|48px||48px” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_border_color_hover=”rgba(255,255,255,0.5)” button_bg_color_hover=”rgba(255,255,255,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”on” button_text_color__hover=”#ffffff” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(255,255,255,0.5)” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]