ShadowPlex-Cloud-2020


[et_pb_section bb_built=”1″ _builder_version=”3.7.1″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/2020_Acalvio_Secondary_1920x486_14-Cloud.jpg” custom_margin=”0px|0px|0px|0px” next_background_color=”#ffffff”][et_pb_row admin_label=”Product Page – Header” _builder_version=”3.0.82″ background_position=”top_left” background_repeat=”repeat” _i=”0″ _address=”0.0″ box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”Acalvio ShadowPlex Cloud” _builder_version=”3.7.1″ background_layout=”dark” text_orientation=”center” module_alignment=”center” header_text_color=”#ffffff” text_text_color=”#ffffff” header_font_size=”42px” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop” text_font_size=”32″ text_font_size_last_edited=”on|phone” header_font=”|600|||||||” header_text_align=”center” header_2_text_align=”center” header_2_font=”|700|||||||” header_2_text_color=”#ffffff” header_2_font_size=”36px” header_2_font_size_tablet=”30px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|desktop” header_3_font=”|600|||||||”]

Acalvio ShadowPlex Cloud

Securing Public Cloud Workloads

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_01.svg” box_shadow_position=”outer” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″ width_unit=”off” custom_width_percent=”70%” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex Autonomous Deception delivers” _builder_version=”3.7.1″ background_layout=”light” text_orientation=”center” header_text_align=”center” border_style=”solid” box_shadow_position=”outer” module_alignment=”center” text_font_size=”28″ text_font_size_tablet=”24″ text_font_size_phone=”18″ text_font_size_last_edited=”on|phone” header_font_size=”34px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” text_font=”Roboto||||” header_font=”Roboto||||” header_letter_spacing=”1px”]

ShadowPlex Autonomous Deception

Accurate Detection

Timely Detection

Cost-Effective Detection

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.7.1″][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex is designed for Enterprise IT, IoTand ICS environments” _builder_version=”3.7.1″ text_font_size=”28″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” text_line_height=”1.3em”]

ShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#41505b;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex delivers full life cycle detection capability” _builder_version=”3.7.1″ background_layout=”light” header_text_color=”#f4f4f4″ border_style=”solid” box_shadow_position=”outer” text_orientation=”center” header_text_align=”center” module_alignment=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]

Full lifecycle capabilities

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”4_4″][et_pb_image admin_label=”Circle Arrows Image” _builder_version=”3.7.1″ src=”https://www.acalvio.com/wp-content/uploads/2018/09/DetectEngageRespond_onDARK-flattened2.svg” align=”center” max_width=”90%” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” module_class=”row-background” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex has all essential” _builder_version=”3.7.1″ header_text_align=”center” text_font_size=”28″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]

ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”4_4″][et_pb_image admin_label=”Pentagon” _builder_version=”3.6″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_RequirementsForDeceptionPentagon_onLIGHT-1.png” align=”center” max_width=”70%” custom_margin=”|||50px” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#f1f2f2;” prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”Deception Farms” _builder_version=”3.7.1″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer”]

Deception Farms

Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility.

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/08/cloudarch.png” max_width=”70%” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_Abstract_02C.svg” module_class=”row-background” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″][et_pb_column type=”4_4″][et_pb_text admin_label=”Fluid Deception” _builder_version=”3.7.1″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” text_orientation=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer” module_alignment=”center”]

Fluid Deception

Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys.

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_FluidDeceptions_onLIGHT_OL.png” align=”center” force_fullwidth=”on” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ box_shadow_position=”outer” custom_css_main_element=”background:#41505b;” prev_background_color=”#000000″ next_background_color=”#f1f2f2″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex distributed deception platform” _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” border_style=”solid” box_shadow_position=”outer”]

ShadowPlex Distributed Deception Platform

[/et_pb_text][et_pb_image _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_DistributedDeceptionPlatform_onDARK_OL-06-21-2018.png” border_style=”solid” max_width=”70%” align=”center” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”3.6″ background_color=”#f1f2f2″ custom_padding=”50px|||”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”API Support” _builder_version=”3.7.1″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone”]

Security Ecosystem Integrations

ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer”]

  • Threat Intelligence
  • IT Change Management platforms
  • SOAR (Security Orchestration and Response)
  • SIEM
  • Perimeter Defense

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer”]

  • NAC (Network Access Control)
  • Vulnerability Managers
  • SSO, Identity Management, Privileged User Management Systems
  • EDR, End-point

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”CTA with side x side Buttons” specialty=”off” _builder_version=”3.6″ border_color_all=”#a21d20″ prev_background_color=”#f1f2f2″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg”][et_pb_row _builder_version=”3.6″ width_unit=”off” module_alignment=”center” use_custom_width=”on”][et_pb_column type=”4_4″][et_pb_text admin_label=”Next Steps” _builder_version=”3.6″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” custom_padding=”|25px||25px” text_text_color=”#ffffff” header_text_color=”#ffffff”]

Next Steps

[/et_pb_text][et_pb_text _builder_version=”3.6″ text_text_color=”#ffffff” background_layout=”dark” text_font_size=”24px”]

Let us show you our patented Deception 2.0 technology for your enterprise.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer” custom_css_main_element=” ” module_class=”btn-inline”][et_pb_column type=”4_4″][et_pb_button admin_label=”Demo Button” _builder_version=”3.6″ button_text=”SCHEDULE A DEMO” button_url=”https://go.acalvio.com/demo” background_layout=”dark” custom_button=”on” button_use_icon=”off” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_border_color_hover=”#ffffff” button_border_color=”#a21d20″ /][/et_pb_column][/et_pb_row][/et_pb_section]