Acalvio Technologies

Deception Threat Defense

The most comprehensive deception solution in the industry

ShadowPlex Autonomous Fluid Deception

The most comprehensive Distributed Deception Platform for organizations looking to deploy Deceptions “at Enterprise Scale”.

Unmatched
Technology Leadership

25 issued patents so far,
15 more are pending to be issued

What is Deception 2.0 and why should you consider?

Duration : Less than 5 minutes

Depth and Breadth in Technology

Combines Deception Quality and Density

Seminal Innovations

Comprehensive Deception Palette

Baits, Lures, breadcrumbs, honeytokens, Decoys

Future Proof Design and Architecture

(APIs & Micro Services), Enterprise Scale, IoT-Scale Architecture

Powered by Artificial Intelligence

On Premises and Cloud Architecture

Analyst Views

Acalvio is the first to offer a unified platform for public, private, and hybrid cloud deception.  ShadowPlex Cloud represents a new benchmark in deception technology ease of deployment, detection efficacy, scalability, user experience and API support.

—Jack Poller, Senior Analyst at Enterprise Strategy Group

Top ten considerations
to bear in mind while choosing a potent
cyber deception solution


1. Deception must provide both SCALE and DEPTH

Enterprise deception solutions should scale up cost-effectively to deploy thousands of decoys, while also providing the ability to engage and respond to the attack.


Caution

Solutions that provide only one or the other are based on the first iteration of the deception technologies

2. Deception must be dynamic

Staleness is the enemy of deception. As the network and threat environments evolve, deception must adapt.


Caution

Solutions with static deceptions are easy to fingerprint and are of little value.


3. Deceptions must be pervasive

Effective deception needs various kinds of decoys, baits, lures and breadcrumbs


Caution

Solutions that are decoy-only (or even worse honeypot-only) or breadcrumbs-only are partial, incomplete and marginally effective solutions

4. Deceptions must be automatic

An enterprise-scale deception solution needs to lay out a multitude of deceptions and manage them dynamically. Automation of every step is a requirement for practical deception at scale.


Caution

Solutions that require manually deploying or managing deceptions do not scale.


5. Deceptions must not introduce new Risks

Deception technologies, by design, introduce vulnerable systems in the enterprise network to lure and engage attacks. A vulnerable system increases the risk of compromise as the threat actor can use this as a pivot point to launch attacks against other systems in the network.


Caution

Solutions that physically locate high-interaction decoys in the enterprise network (connected directly to an access port or a trunk port) run the risk of compromise pivoting to the enterprise servers.

6. Deceptions must be intelligent

Data science is an integral part of an effective deception solution. Machine intelligence is imperative for automation.


Caution

Beware of solutions that do not leverage machine intelligence. The effort involved to design, deploy, manage, monitor deceptions and correlate threat data is near untenable without the uncanny leverage of Data Science.


7. Deceptions must blend into enterprise

A deception should not look any different from the network neighborhood. This applies to all decoys, baits and breadcrumbs. Requires dynamic deception to keep up with the changes in the network.


Caution

Solutions that need manual  setup for blending do not scale.

8. Deceptions must be Data Driven

A deception solution must be driven by the vulnerabilities in the network and the current threat landscape. Integration with the SIEM and cyber threat feeds is essential for effective deception.


Caution

Solutions that do not integrate with the SIEM cannot be dynamic.


9. Deceptions must study attacks

Threat engagement and analysis is an intrinsic part of a complete deception solution. A thorough understanding of the attack helps fix all vulnerabilities targeted by the attack and close all back doors to completely neutralize the attack.


Caution

Solutions that do not provide attack TTPs are equivalent to low interaction solutions

10. Deceptions must be part of layered defense

A deception solution cannot function in isolation. It needs to integrate with the security ecosystem to both provide effective deception and quick response.


Caution

Solutions that do not interact with the security ecosystem cannot respond to the attacks.

Why is Acalvio different?

Traditional deception offerings are plagued with a conundrum – do you deploy lots of inexpensive low interaction decoys that provide breadth and coverage but no depth; OR a few high interaction decoys that provide depth and detail but are expensive. Through Fluid Deception technology, ShadowPlex delivers the best of both worlds. The result is cost-effective deceptions at scale, offering excellent Total Cost of Ownership.

ShadowPlex supports the most comprehensive palette of deceptions: lures, baits, breadcrumbs, honeytokens and decoys. This pervasive approach allows organizations to launch an effective and efficient campaign to combat advanced attackers. Acalvio’s patented innovations allow ShadowPlex Fluid Deception to project the behavior of assets that are not otherwise easily virtualized or emulated [examples include IoT devices, CAT Scanner, Dialysis Pumps, Routers, Switches, ICS controllers, etc.]

Comprehensive Deception Palette

Full Lifecycle Capabilities

First generation Deception solutions are saddled with legacy architectures. In contrast, ShadowPlex is based on modern technology foundations such as API-driven Micro-services, Kubernetes and Cloud-native with full support for on-premises and AI-powered to reduce manual overhead

Future Proof Technology

About Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.