[et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.7.1″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2020/05/why-acalvio.jpg” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer” make_fullwidth=”on”][et_pb_column type=”4_4″][et_pb_text admin_label=”Why Acalvio” _builder_version=”3.7.1″ border_style=”solid” text_font_size=”24″ text_line_height=”1.8em” text_orientation=”center” module_alignment=”center” text_text_color=”#000000″ header_font=”|600|||||||” header_text_align=”center” custom_css_main_element=”color:#ffffff;font-weight:600;” header_text_color=”#000000″ text_font_size_tablet=”18″ text_font_size_phone=”22″ text_font_size_last_edited=”on|phone” header_font_size=”42px” header_font_size_tablet=”36px” header_font_size_phone=”26px” header_font_size_last_edited=”on|desktop”]
Why Acalvio
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”Detect Breaches” specialty=”off” _builder_version=”3.6″ box_shadow_horizontal=”0px” box_shadow_vertical=”0px” box_shadow_blur=”18px” box_shadow_spread=”0px” box_shadow_position=”inner” background_position=”bottom_right” custom_css_main_element=”background-position: center bottom; ” custom_margin=”0px|0px|0px|0px” custom_margin_last_edited=”off|” background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01a.png” background_size=”contain” prev_background_color=”#ffffff” next_background_color=”#ffffff”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”ShadowPlex Autonomous Deception” _builder_version=”3.7.1″ background_layout=”light” border_style=”solid” box_shadow_position=”outer” text_letter_spacing=”-1″ header_font_size=”32px” header_font_size_tablet=”24px” header_font_size_phone=”22px” header_font_size_last_edited=”on|desktop” text_font_size=”24″ text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”off|desktop”]
ShadowPlex Autonomous Deception
[/et_pb_text][et_pb_text admin_label=”ShadowPlex Sub Headline” _builder_version=”3.7.1″ text_letter_spacing=”-1″ header_font_size=”32px” header_font_size_tablet=”14px” header_font_size_phone=”12px” header_font_size_last_edited=”off|desktop” text_font_size=”24″ text_font_size_tablet=”22″ text_font_size_phone=”20″ text_font_size_last_edited=”on|desktop”]
The most comprehensive b Cloud Firstb Distributed Deception Platform for organizations looking to deploy Deceptions “at Enterprise Scale”.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Cloud First Architecture” _builder_version=”3.7.1″ title=”Cloud First Architecture” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ module_id=”#pervasive-deception” url=”#cloud-architecture” /][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Combines Deception Quality and Quantity” _builder_version=”3.7.1″ title=”Combines Deception Quality and Density” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ url=”#deception-quantity” /][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Future-proof ” _builder_version=”3.6″ title=”Future-proof ” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ url=”#future-proof”]
(APIs & Micro-services) Enterprise-Scale, IoT-Scale Architecture
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Seminal Patented Innovations” _builder_version=”3.6″ title=”Seminal Patented Innovations” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ url=”#patents” /][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Comprehensive Support For Deception Artifacts ” _builder_version=”3.6″ title=”Comprehensive Support For Deception Artifacts ” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ module_id=”#comprehensive” url=”#comprehensive”]
(Lures, Baits, Decoys)
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Powered by AI” _builder_version=”3.6″ title=”Powered by AI” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” custom_css_main_element=”background-color:#0e3050;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ url=”#powered-by-ai” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ custom_css_main_element=”background-color:#F1F2F2;” prev_background_color=”#000000″ next_background_color=”#000000″ module_id=”cloud-architecture”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” make_equal=”on” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”Pervasive Deception” _builder_version=”3.6″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” module_id=”pervasive-deception”]
Pervasive Deception
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer” width_unit=”off” make_equal=”on” custom_css_main_1=”width:80%;” make_fullwidth=”on” use_custom_width=”on”][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Cloud On-Premises” _builder_version=”3.0.82″ title=”Cloud to On-Premises” url_new_window=”off” use_icon=”off” use_circle=”off” use_circle_border=”off” icon_placement=”top” use_icon_font_size=”off” box_shadow_position_image=”outer” background_layout=”light” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”background-color:#274C7F;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ custom_margin=”|5%||5%” image_max_width=”107%” /][et_pb_image _builder_version=”3.0.82″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_ADC_Cloud_to-OnPrem.svg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” always_center_on_mobile=”on” border_style=”solid” force_fullwidth=”off” show_bottom_space=”on” box_shadow_position=”outer” custom_css_main_element=”width:90%;” align=”center” /][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”22″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer” text_orientation=”center” module_alignment=”center” text_font=”Roboto||||”]
Easy deployment from your favorite cloud provider
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”On-Premises On-Premises” _builder_version=”3.0.82″ url_new_window=”off” use_icon=”off” use_circle=”off” use_circle_border=”off” icon_placement=”top” use_icon_font_size=”off” box_shadow_position_image=”outer” background_layout=”light” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”background-color:#274C7F;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” body_font_size_tablet=”28″ body_font_size_last_edited=”off|tablet” header_font_size=”28″ custom_margin=”|5%||5%” content_max_width=”600px” title=”On-Premises to On-Premises” /][et_pb_image _builder_version=”3.0.82″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_ADC_OnPrem_to-OnPrem.svg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” always_center_on_mobile=”on” border_style=”solid” force_fullwidth=”off” show_bottom_space=”on” box_shadow_position=”outer” custom_css_main_element=”width:90%;” align=”center” /][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”22″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer” text_orientation=”center” module_alignment=”center”]
On-premises hosting of our cloud-scalable deception platform
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_blurb admin_label=”Cloud Cloud” _builder_version=”3.0.82″ title=”Cloud to Cloud” url_new_window=”off” use_icon=”off” use_circle=”off” use_circle_border=”off” icon_placement=”top” use_icon_font_size=”off” box_shadow_position_image=”outer” background_layout=”light” text_orientation=”center” header_font=”Roboto||||” header_text_align=”center” header_text_color=”#ffffff” body_font=”Roboto||||” body_text_align=”center” body_font_size=”18″ body_text_color=”#ffffff” border_style=”solid” box_shadow_position=”outer” custom_css_main_element=”background-color:#274C7F;||height:150px;display: flex; || flex-direction: column; || justify-content: center;padding:12px;border-radius:12px;width:90%;” body_line_height=”1.5em” custom_margin=”|5%||5%” body_font_size_tablet=”16″ body_font_size_last_edited=”on|tablet” header_font_size=”28″ max_width=”200%” image_max_width=”200%” /][et_pb_image _builder_version=”3.0.82″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/Acalvio_ADC_Cloud_to-Cloud.svg” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” always_center_on_mobile=”on” border_style=”solid” force_fullwidth=”off” show_bottom_space=”on” box_shadow_position=”outer” custom_css_main_element=”width:90%;” align=”center” /][et_pb_text _builder_version=”3.0.82″ background_layout=”light” text_font_size=”22″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” border_style=”solid” box_shadow_position=”outer” text_orientation=”center” module_alignment=”center”]
Protect cloud workloads with deceptions delivered from the cloud
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ fullwidth=”off” specialty=”off” _builder_version=”3.0.82″ prev_background_color=”#000000″ next_background_color=”#000000″][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”Acalvio Deception Center” _builder_version=”3.7.1″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Acalvio ShadowPlex Architecture
[/et_pb_text][et_pb_image admin_label=”ADC Diagram Image” _builder_version=”3.7.1″ src=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_ADC_onLIGHT_OL_06-21-2018.png” align=”center” max_width=”70%” max_width_tablet=”85%” max_width_last_edited=”on|phone” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Abstract_01_LighterMiddle.png” background_position=”top_right” prev_background_color=”#ffffff” next_background_color=”#ffffff” module_id=”deception-quantity”][et_pb_row _builder_version=”3.0.82″ use_custom_width=”on” width_unit=”off” box_shadow_position=”outer” module_alignment=”center”][et_pb_column type=”4_4″][et_pb_text admin_label=”Deception Quality and Quantity” _builder_version=”3.7.1″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”90%” module_alignment=”center”]
Deception Quality and Density
Traditional deception offerings are plagued with a conundrum b do you deploy lots of inexpensive low interaction decoys that provide breadth and coverage but no depth; OR a few high interaction decoys that provide depth and detail but are expensive. Through our Fluid Deception technology, ShadowPlex delivers the best of both worlds. The result is cost-effective deceptions at scale.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ custom_css_main_element=”background-color:#41505B;” prev_background_color=”#000000″ next_background_color=”#000000″ module_id=”future-proof”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” make_equal=”on” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”Future Proof Technology” _builder_version=”3.6″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” text_text_color=”#ffffff” text_orientation=”center” header_text_align=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_text_color=”#ffffff” header_letter_spacing=”1px” border_style=”solid” module_alignment=”center” max_width=”90%” custom_padding=”|50px||50px”]
Future Proof Technology
[/et_pb_text][et_pb_text admin_label=”Future Proof Technology” _builder_version=”3.6″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|desktop” text_text_color=”#ffffff” text_orientation=”center” header_text_align=”center” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_text_color=”#ffffff” header_letter_spacing=”1px” border_style=”solid” module_alignment=”center” max_width=”90%” custom_padding=”|50px||50px” max_width_phone=”100%” max_width_last_edited=”on|phone”]
First generation Deception solutions are saddled with legacy
architectures. In contrast, ShadowPlex is based on modern technology foundations:
[/et_pb_text][et_pb_text admin_label=”Future Proof UL” _builder_version=”3.6″ background_layout=”dark” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”75%” module_alignment=”center” text_text_color=”#ffffff” custom_padding=”|5%||5%” custom_margin=”|||20%” header_line_height=”2em” text_line_height=”1em” max_width_tablet=”85%” max_width_last_edited=”on|phone”]
- API-driven Micro-services
- Kubernetes and Cloud-native with full support for on-premises
- AI-powered to reduce manual overhead
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” prev_background_color=”#000000″ next_background_color=”#000000″ _builder_version=”3.6″ module_id=”comprehensive” custom_margin=”||-4%|”][et_pb_row _builder_version=”3.6″][et_pb_column type=”4_4″][et_pb_text admin_label=”Comprehensive Deception Palette” _builder_version=”3.6″ border_style=”solid” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”90%” module_alignment=”center” animation_style=”slide” animation_direction=”bottom” module_id=”comprehensive”]
Comprehensive Deception Palette
ShadowPlex supports the most comprehensive palette of deceptions: lures, breadcrumbs, honeytokens and decoys. This pervasive approach allows organizations to launch an effective and efficient campaign to combat advanced attackers. Our patented innovations allow ShadowPlex to project the behavior of assets that are not otherwise easily virtualized or emulated [examples include IoT devices, CAT Scanner, Dialysis Pumps, Routers, Switches, ICS controllers, etc.]
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”3.6″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_IMAGE_LARGE_BigData_1920wide.jpg” custom_padding=”5%||5%|”][et_pb_row][et_pb_column type=”1_3″][et_pb_image admin_label=”decoys” _builder_version=”3.6″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/decoys.svg” max_width=”85%” max_width_tablet=”70%” max_width_phone=”50%” max_width_last_edited=”on|phone” /][/et_pb_column][et_pb_column type=”1_3″][et_pb_image admin_label=”lures” _builder_version=”3.6″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/lures.svg” max_width=”85%” max_width_tablet=”70%” max_width_phone=”50%” max_width_last_edited=”on|tablet” /][/et_pb_column][et_pb_column type=”1_3″][et_pb_image admin_label=”bread crumbs” _builder_version=”3.6″ src=”https://www.acalvio.com/wp-content/uploads/2018/06/bread-crumbs.svg” max_width=”85%” max_width_tablet=”70%” max_width_phone=”50%” max_width_last_edited=”on|phone” /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_color_gradient_start=”#8e8e8e” background_color_gradient_end=”#f4f4f4″ custom_css_main_element=”background-color:#41505B;” prev_background_color=”#000000″ next_background_color=”#000000″ module_id=”powered-by-ai”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”AI-driven” _builder_version=”3.6″ background_layout=”dark” border_style=”solid” box_shadow_position=”outer” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”90%” module_alignment=”center” text_text_color=”#ffffff” custom_padding=”|5%||5%”]
AI-driven
[/et_pb_text][et_pb_text admin_label=”AI-driven” _builder_version=”3.6″ background_layout=”dark” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”90%” module_alignment=”center” text_text_color=”#ffffff” custom_padding=”|5%||5%”]
ShadowPlex leverages AI at every step resulting in significant reduction in the effort to deploy deceptions and increase detection efficacy. They include:
[/et_pb_text][et_pb_text admin_label=”AI-driven UL” _builder_version=”3.7.1″ background_layout=”dark” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” max_width=”75%” module_alignment=”center” text_text_color=”#ffffff” custom_padding=”|5%||5%” custom_margin=”|||20%” header_line_height=”2em” text_line_height=”1em” max_width_tablet=”85%” max_width_last_edited=”on|phone”]
- AI to determine deception strategy
- AI to generate content for high interaction decoys
- AI to Engage with an Adversary
- AI to Automate Alert Triage
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ specialty=”off” _builder_version=”3.6″ background_position=”top_right” prev_background_color=”#000000″ next_background_color=”#000000″ module_id=”patents”][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” use_custom_width=”on” width_unit=”off” box_shadow_position=”outer”][et_pb_column type=”4_4″][et_pb_text admin_label=”Seminal Innovation” _builder_version=”3.7.1″ text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone”]
Seminal Patented Innovations
[/et_pb_text][et_pb_code admin_label=”Scrolling Patent Text” _builder_version=”3.0.82″ text_orientation=”center” disabled=”on” disabled_on=”on|on|on”]<link href="https://fonts.googleapis.com/css?family=Roboto:300,400,500,500i,700,900" rel="stylesheet"><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><style type="text/css"><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>#marqueecontainer{<!– [et_pb_line_break_holder] –>position: relative;<!– [et_pb_line_break_holder] –>width: 300px; /*marquee width */<!– [et_pb_line_break_holder] –>height: 200px; /*marquee height */<!– [et_pb_line_break_holder] –>background-color: white;<!– [et_pb_line_break_holder] –>overflow: hidden;<!– [et_pb_line_break_holder] –>border: 1px solid #414042;<!– [et_pb_line_break_holder] –>padding: 2px;<!– [et_pb_line_break_holder] –>padding-left: 4px;<!– [et_pb_line_break_holder] –>font-family: 'Roboto', sans-serif;<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –>.patentscrollertitle<!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> font-family: 'Roboto', sans-serif;<!– [et_pb_line_break_holder] –> text-align:center;<!– [et_pb_line_break_holder] –> color:#414042;font-weight:700;line-height:115%;font-size:20px;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –>.patentscrollertext<!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> text-align:center;font-family: 'Roboto', sans-serif;<!– [et_pb_line_break_holder] –> color:#414042;font-weight:400;line-height:115%;font-size:18px;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –>/* Tab – Portrait and Landscape */<!– [et_pb_line_break_holder] –> @media only screen <!– [et_pb_line_break_holder] –> and (min-device-width: 768px) <!– [et_pb_line_break_holder] –> and (max-device-width: 1024px) <!– [et_pb_line_break_holder] –> and (-webkit-min-device-pixel-ratio: 1) <!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> #patentscrolltext<!– [et_pb_line_break_holder] –> { <!– [et_pb_line_break_holder] –> font-size:16px; font-weight:400;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –> #patentscrolltitle<!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> font-size:18px;font-weight:700;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –>/* Portrait and Landscape */<!– [et_pb_line_break_holder] –>@media only screen <!– [et_pb_line_break_holder] –> and (min-device-width: 414px) <!– [et_pb_line_break_holder] –> and (max-device-width: 736px) <!– [et_pb_line_break_holder] –> and (-webkit-min-device-pixel-ratio: 3) <!– [et_pb_line_break_holder] –> <!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> #patentscrolltext<!– [et_pb_line_break_holder] –> { <!– [et_pb_line_break_holder] –> font-size:14px; font-weight:400;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –> #patentscrolltitle<!– [et_pb_line_break_holder] –> {<!– [et_pb_line_break_holder] –> font-size:24px;font-weight:700;<!– [et_pb_line_break_holder] –> }<!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –></style><!– [et_pb_line_break_holder] –><script type="text/javascript"><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>/***********************************************<!– [et_pb_line_break_holder] –>* Cross browser Marquee II- o?= Dynamic Drive (www.dynamicdrive.com)<!– [et_pb_line_break_holder] –>* This notice MUST stay intact for legal use<!– [et_pb_line_break_holder] –>* Visit http://www.dynamicdrive.com/ for this script and 100s more.<!– [et_pb_line_break_holder] –>***********************************************/<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>var delayb4scroll=2000 //Specify initial delay before marquee starts to scroll on page (2000=2 seconds)<!– [et_pb_line_break_holder] –>var marqueespeed=2 //Specify marquee scroll speed (larger is faster 1-10)<!– [et_pb_line_break_holder] –>var pauseit=1 //Pause marquee onMousever (0=no. 1=yes)?<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>////NO NEED TO EDIT BELOW THIS LINE////////////<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>var copyspeed=marqueespeed<!– [et_pb_line_break_holder] –>var pausespeed=(pauseit==0)? copyspeed: 0<!– [et_pb_line_break_holder] –>var actualheight=''<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>function scrollmarquee(){<!– [et_pb_line_break_holder] –>if (parseInt(cross_marquee.style.top)>(actualheight*(-1)+8)) //if scroller hasn't reached the end of its height<!– [et_pb_line_break_holder] –>cross_marquee.style.top=parseInt(cross_marquee.style.top)-copyspeed+"px" //move scroller upwards<!– [et_pb_line_break_holder] –>else //else, reset to original position<!– [et_pb_line_break_holder] –>cross_marquee.style.top=parseInt(marqueeheight)+8+"px"<!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>function initializemarquee(){<!– [et_pb_line_break_holder] –>cross_marquee=document.getElementById("vmarquee")<!– [et_pb_line_break_holder] –>cross_marquee.style.top=0<!– [et_pb_line_break_holder] –>marqueeheight=document.getElementById("marqueecontainer").offsetHeight<!– [et_pb_line_break_holder] –>actualheight=cross_marquee.offsetHeight //height of marquee content (much of which is hidden from view)<!– [et_pb_line_break_holder] –>if (window.opera || navigator.userAgent.indexOf("Netscape/7")!=-1){ //if Opera or Netscape 7x, add scrollbars to scroll and exit<!– [et_pb_line_break_holder] –>cross_marquee.style.height=marqueeheight+"px"<!– [et_pb_line_break_holder] –>cross_marquee.style.overflow="scroll"<!– [et_pb_line_break_holder] –>return<!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –>setTimeout('lefttime=setInterval("scrollmarquee()",30)', delayb4scroll)<!– [et_pb_line_break_holder] –>}<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>if (window.addEventListener)<!– [et_pb_line_break_holder] –>window.addEventListener("load", initializemarquee, false)<!– [et_pb_line_break_holder] –>else if (window.attachEvent)<!– [et_pb_line_break_holder] –>window.attachEvent("onload", initializemarquee)<!– [et_pb_line_break_holder] –>else if (document.getElementById)<!– [et_pb_line_break_holder] –>window.onload=initializemarquee<!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –></script><!– [et_pb_line_break_holder] –><div style="width:100%;text-align:center;display: flex;align-items: center;justify-content: center;"><!– [et_pb_line_break_holder] –><div id="marqueecontainer" onMouseover="copyspeed=pausespeed" onMouseout="copyspeed=marqueespeed"><!– [et_pb_line_break_holder] –><div id="vmarquee" style="position: absolute; width: 98%;"><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><!–YOUR SCROLL CONTENT HERE–><!– [et_pb_line_break_holder] –><p><!– [et
_pb_line_break_holder] –><span class="patentscrollertitle">Network Infrastructure Obfuscation</span><!– [et_pb_line_break_holder] –><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext">US Patent 9,021,092; <br>9,350,751; 9,729,567</span><!– [et_pb_line_break_holder] –></p><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><p><span class="patentscrollertitle">Network Stimulation Engine</span><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext"><!– [et_pb_line_break_holder] –>US Patent 8,335,678; 8,413,216; </span><!– [et_pb_line_break_holder] –><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext"><!– [et_pb_line_break_holder] –>8,978,102; 9,680,867</span><!– [et_pb_line_break_holder] –></p><!– [et_pb_line_break_holder] –><p><!– [et_pb_line_break_holder] –><span class="patentscrollertitle">Dynamic Hiding of Deception Mechanism<!– [et_pb_line_break_holder] –>US Patent </span><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext">9,756,075</span><!– [et_pb_line_break_holder] –></p><!– [et_pb_line_break_holder] –><p><!– [et_pb_line_break_holder] –><span class="patentscrollertitle">Context Aware Knowledge System and Methods for Deploying Deception Mechanisms</span><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext"><!– [et_pb_line_break_holder] –>US Patent 9,853,999</span><!– [et_pb_line_break_holder] –></p><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><p><!– [et_pb_line_break_holder] –><span class="patentscrollertitle">Suspicious Processes In A Compromised Computer Network</span><!– [et_pb_line_break_holder] –><br><!– [et_pb_line_break_holder] –><span class="patentscrollertext">US Patent 9,576,145; 9,773,109</span><!– [et_pb_line_break_holder] –></p><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><!–YOUR SCROLL CONTENT HERE–><!– [et_pb_line_break_holder] –></div><!– [et_pb_line_break_holder] –></div><!– [et_pb_line_break_holder] –></div><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –><!– [et_pb_line_break_holder] –>[/et_pb_code][et_pb_text admin_label=”Patent Graphic” _builder_version=”3.0.82″ background_layout=”light” border_style=”solid” animation_style=”slide” animation_duration=”2000ms” animation_delay=”1000ms” animation_intensity_zoom=”100%” box_shadow_horizontal=”6px” box_shadow_vertical=”6px” box_shadow_blur=”18px” box_shadow_spread=”0px” box_shadow_position=”outer” custom_margin=”20px|||” disabled=”on” disabled_on=”on|on|on”]

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 1″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” use_border_color=”on” custom_padding=”20px||20px|” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Network Infrastructure Obfuscation
US Patent 9,021,092;
9,350,751; 9,729,567
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 2″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”200ms” use_border_color=”on” custom_padding=”20px||25px|” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Network Stimulation Engine
US Patent 8,335,678; 8,413,216;
8,978,102; 9,680,867
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 3″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”600ms” use_border_color=”on” custom_padding=”15px|20px|25px|15px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Dynamic Hiding of Deception Mechanism
US Patent 9,756,075
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 4″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”800ms” use_border_color=”on” custom_padding=”15px|10px|15px|10px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px” custom_margin=”|10px||10px”]
Context Aware Knowledge System and Methods
for Deploying Deception Mechanisms
US Patent 9,853,999
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 5″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”1000ms” use_border_color=”on” custom_padding=”15px|15px|15px|15px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Suspicious Processes In A
Compromised Computer Network
US Patent 9,576,145; 9,773,109
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 6″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”2000ms” animation_delay=”1000ms” use_border_color=”on” custom_padding=”20px|15px|20px|15px” custom_css_main_element=”background-color: #ffffff;” disabled=”off” disabled_on=”off|off|off” border_color_all=”#000000″ border_width_all=”1px”]
Systems and Methods For Identifying Similar Hosts
US Patent 9,836,512
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.6″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 6″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”800ms” use_border_color=”on” custom_padding=”15px|10px|15px|10px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px” custom_margin=”|10px||10px”]
Threat Engagement and Deception Solution
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 8″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”1000ms” use_border_color=”on” custom_padding=”15px|15px|15px|15px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Tunneling for Network Deceptions
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 9″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”2000ms” animation_delay=”1000ms” use_border_color=”on” custom_padding=”20px|15px|20px|15px” custom_css_main_element=”background-color: #ffffff;” disabled=”off” disabled_on=”off|off|off” border_color_all=”#000000″ border_width_all=”1px”]
Deception to Detect Network Scans
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.6″ module_alignment=”center” box_shadow_position=”outer”][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 10″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”800ms” use_border_color=”on” custom_padding=”15px|10px|15px|10px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px” custom_margin=”|10px||10px”]
Systems and Methods for Detecting and Tracking Adversary Trajectory
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][et_pb_text admin_label=”Patent 11″ _builder_version=”3.6″ animation_style=”slide” animation_direction=”right” animation_duration=”1200ms” animation_delay=”1000ms” use_border_color=”on” custom_padding=”15px|15px|15px|15px” custom_css_main_element=”background-color: #ffffff;” border_color_all=”#000000″ border_width_all=”1px”]
Cyber Vaccines and Antibodies
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”CTA with side x side Buttons” specialty=”off” _builder_version=”3.6″ border_color_all=”#a21d20″ background_image=”https://acalvio.p2staging.us/wp-content/uploads/2018/06/Acalvio_Secondary_1920x486_06.jpg” custom_css_main_element=”z-index: 0;” prev_background_color=”#ffffff” global_module=”5768″][et_pb_row global_parent=”5768″ _builder_version=”3.6″ width_unit=”off” module_alignment=”center” use_custom_width=”on”][et_pb_column type=”4_4″][et_pb_text admin_label=”Next Steps” global_parent=”5768″ _builder_version=”3.6″ border_style=”solid” text_font_size=”24″ text_font_size_tablet=”18″ text_font_size_phone=”14″ text_font_size_last_edited=”on|phone” header_font_size=”38px” header_font_size_tablet=”28px” header_font_size_phone=”24px” header_font_size_last_edited=”on|phone” custom_padding=”|25px||25px” text_text_color=”#ffffff” header_text_color=”#ffffff”]
Next Steps
[/et_pb_text][et_pb_text global_parent=”5768″ _builder_version=”3.6″ text_font_size=”24px” text_text_color=”#ffffff”]
Let us show you our patented Deception 2.0 technology for your enterprise.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row global_parent=”5768″ _builder_version=”3.0.82″ module_alignment=”center” box_shadow_position=”outer” custom_css_main_element=” ” module_class=”btn-inline”][et_pb_column type=”4_4″][et_pb_button admin_label=”Learn More Button” global_parent=”5768″ _builder_version=”3.7.1″ button_text=”LEARN MORE” button_url=”https://www.acalvio.com/product/” background_layout=”dark” custom_button=”on” button_use_icon=”off” custom_css_main_element=”background-color: #A21D20;” custom_padding=”|48px||48px” button_text_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_border_color_hover=”rgba(255,255,255,0.5)” button_border_color=”#a21d20″ button_border_width=”3″ /][et_pb_button admin_label=”Demo Button” global_parent=”5768″ _builder_version=”3.7.1″ button_text=”SCHEDULE A DEMO” button_url=”https://go.acalvio.com/demo” background_layout=”dark” custom_button=”on” button_use_icon=”off” custom_css_main_element=”background-color: #A21D20;” button_text_color_hover=”#ffffff” button_bg_color_hover=”rgba(255,255,255,0)” button_border_color_hover=”#ffffff” button_border_color=”#a21d20″ /][/et_pb_column][/et_pb_row][/et_pb_section]