US Federal


[et_pb_section fb_built=”1″ _builder_version=”3.22″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/02/02_Acalvio_Federal_1920x486-fade-to-black.jpg”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Page Title Acalvio Active Defense b Meeting the Adversary Challenge for US Federal” _builder_version=”4.7.0″ header_font=”|700|||||||” header_text_align=”center” header_text_color=”#ffffff” header_font_size=”40px” header_line_height=”1.5em” header_font_size_tablet=”30px” header_font_size_phone=”28px” header_font_size_last_edited=”on|phone”]

Acalvio Active Defense b Meeting the Adversary Challenge for US Federal

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22″ custom_margin=”||0px|” custom_padding=”||0px|”][et_pb_row _builder_version=”3.25″ custom_margin=”||0px|” custom_padding=”||0px|”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”All federal entities (DoD, Intel Community, and Civilian Agencies) ” _builder_version=”4.7.0″ header_font=”|600|||||||” header_text_align=”left” header_text_color=”#191919″ header_font_size=”40px” header_line_height=”1.5em” header_3_text_align=”left” header_3_line_height=”1.5em” header_font_size_tablet=”38px” header_font_size_phone=”28px” header_font_size_last_edited=”on|phone”]

All federal entities (DoD, Intel Community, and Civilian Agencies) are under continuous attack from the most sophisticated adversaries, including nation state actors. Perimeter defenses have repeatedly failed, and it would be foolhardy to assume that this will ever change. Detection systems have recently garnered more attention, but the passive approach still leaves the entity simply waiting for the inevitable, and unable to respond quickly enough to mitigate the damage.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Facing this reality, the US Government” _builder_version=”4.7.0″ text_text_color=”#000000″ text_font_size=”16px” header_font=”|600|||||||” header_text_align=”left” header_text_color=”#a21d20″ header_2_font=”|700|||||||” header_2_text_color=”#a21d20″ header_2_font_size=”28px” header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone”]Facing this reality, the US Government has embraced the concept of Active Defense[/et_pb_text][et_pb_text admin_label=”Active Defense is bThe employment of limited offensive ” _builder_version=”4.7.0″ _module_preset=”default” text_font_size=”28″ text_line_height=”1.3em” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_font_size=”32px” header_2_line_height=”1.3em” header_4_line_height=”1.3em” width=”80%” max_width=”80%” module_alignment=”center” custom_padding=”18px|18px|18px|18px|true|true” text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_2_font_size_tablet=”24px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”#dbdbdb”]

Active Defense is bThe employment of limited offensive action and counterattacks to deny a contested area or position to the enemy.b US DoD

[/et_pb_text][et_pb_text admin_label=”When using Active Defense” _builder_version=”4.7.0″ header_font=”|600|||||||” header_2_font=”|700|||||||” header_2_text_align=”left” header_2_text_color=”#a21d20″ header_2_font_size=”28px” header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|desktop”]When using Active Defense, organizations engage with incoming threats to better understand and counter them, rather than operating static security controls and hoping for the best. In practice, Active Defense requires a process that includes four ingredients:

  • High-fidelity detection: Itbs not enough to just detect an attack: It must happen immediately, no matter from what vector, and without spurious false positives and minor alerts that obscure the threat.
  • Engagement: Once detected, Active Defense enables the responders to channel and contain the attack, without the adversary knowing about it.
  • Analysis: Now contained, the attackerbs TTPs can safely be observed and understood, and their identity and motivations revealed. High value assets can be obfuscated from the attackerbs perspective.
  • Response: With the full picture in hand, the defenders can decide how, when, and where to respond, as well as improve controls to defeat future attempts to use the same TTPs.

[/et_pb_text][et_pb_text admin_label=”More detailed information on Active Defense” _builder_version=”4.7.0″ text_font_size=”16px” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]More detailed information on Active Defense can be found within MITREbs Shield Project.[/et_pb_text][et_pb_text admin_label=”Acalvio is a pioneer in Active Defense strategies” _builder_version=”4.7.0″ text_font_size=”16px” header_font=”|600|||||||” header_font_size=”20px” header_line_height=”1.5em” header_2_font=”|600|||||||” header_3_text_align=”left” header_3_font_size=”20px” header_3_line_height=”1.3em” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”18px” header_font_size_phone=”16px” header_font_size_last_edited=”on|desktop” header_3_font_size_tablet=”18px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone”]Acalvio is a pioneer in Active Defense strategies, leveraging innovations in Distributed Deception, Artificial Intelligence, and Threat Analysis. Our ShadowPlex solution allows government entities to implement Active Defense at scale, across on-premises and cloud infrastructure. [/et_pb_text][et_pb_text admin_label=”Four key security controls” _builder_version=”4.7.0″ header_line_height=”1.3em” header_3_font_size=”20px” header_3_font_size_tablet=”18px” header_3_font_size_phone=”16px” header_3_font_size_last_edited=”on|phone”]

At the most fundamental level, Acalvio strives to provide four key security controls

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ make_equal=”on” _builder_version=”4.7.0″ _module_preset=”default” module_alignment=”left” custom_margin=”0px|0px|0px|0px|true|true” custom_padding=”0px|0px|0px|0px|true|true”][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”|0px||0px|false|true”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/07/Acalvio_Federal_1.jpg” title_text=”Acalvio_Federal_1″ show_bottom_space=”off” _builder_version=”4.7.0″ _module_preset=”default” width=”100%” max_width=”100%” module_alignment=”left” custom_margin=”|6px|6px||false|false” custom_padding=”|6px|||false|false”][/et_pb_image][/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”|0px||0px|false|true”][et_pb_image src=”https://acalvio.p2staging.us/wp-content/uploads/2021/07/Acalvio_Federal_2.jpg” title_text=”Acalvio_Federal_2″ show_bottom_space=”off” _builder_version=”4.7.0″ _module_preset=”default” width=”100%” max_width=”100%” module_alignment=”left” custom_margin=”|6px|6px||false|false” custom_padding=”|6px|||false|false”][/et_pb_image][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”Acalviobs deception-based detection is superior” _builder_version=”4.7.0″ _module_preset=”default”]Acalviobs deception-based detection is superior to alternative approaches such as behavioral analytics because it is both more accurate (few false positives) and more efficient and easier to deploy. By adopting an Active Defense strategy, federal, state, and local governments can establish a scalable resistance to attacks of all types: ransomware, data theft, or service denial. They also can implement control activities consistent with the control objectives in NIST CSF, 800-160, and 800-171/172. With a low-operational footprint and integrations with key security architecture components, ShadowPlex is well-suited to supporting government efforts to detect and defeat all types of attackers, including nation states and criminal enterprises.[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”NIST CYBER SECURITY FRAMEWORK” _builder_version=”4.7.0″ header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#a21d20″ header_2_font_size=”24px” text_orientation=”center” hover_enabled=”0″ header_2_font_size_tablet=”20px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” sticky_enabled=”0″]

Additional Content


Get the Report

[/et_pb_text][et_pb_text admin_label=”Acalvio-and-NIST-sp-800-171b” _builder_version=”3.27.4″ text_orientation=”center”]

Get the Report


[/et_pb_text][et_pb_text admin_label=”Acalvio Deception and the Mitre Attack framework” _builder_version=”4.7.0″ text_orientation=”center”]

Get the Report

[/et_pb_text][et_pb_text admin_label=”Osterman Research WP” _builder_version=”3.27.4″ text_orientation=”center”]

Get the Report


[/et_pb_text][/et_pb_column][/et_pb_section]