Acalvio ShadowPlex
Autonomous Deception
“Acalvio’s innovations have made deception practical and affordable at scale without sacrificing any of the efficacy.”
Dr Eugene Spafford, Executive Director Emeritus of the
Center for Education and Research in Information Assurance and Security (CERIAS)
Patented Deception Farm Architecture
Autonomous Deception
- Ease of Use: Because all the decoys are in one place, you don’t have to worry about managing multiple servers all over the network. Deception objects are easy to configure, deploy, and manage, thanks to Autonomous Deception.
- Scale: You can scale up the number of decoys and their distribution across the enterprise simply by adding compute power in the Deception Farm. Fluid Deception and the sharing of compute resources allows you to minimize the amount of compute, storage, and software licenses required.
- Effectiveness: Deception objects are automatically customized for each part of the network; decoys and breadcrumbs and baits are autonomously updated to keep them fresh and relevant as network characteristics change.
Rich Palette of Realistic Deception Objects: The solution supports a vast array of deception objects, beginning with decoys that mimic hosts running standard operating systems, including OT and IoT hosts. They also include endpoint lures, breadcrumbs, and baits: fake artifacts including registry entries, credentials, shared drives and many more that either act as tripwires in their own right, or lead the attacker towards the decoys. ShadowPlex supports an extensive set of field-expandable object types and variations, and automates the generation and deployment of these assets so that they blend in with their surroundings.
- InSights Evaluates AD objects and identifies risks automatically. Includes object information, summary statistics, and detailed identification of dozens of types of potential security risks within the AD object database
- Deception Decoys and Breadcrumbs Obfuscates AD infrastructure and exposes attempts to attack it, using fake domain controllers, AD forests, and baits
- Cached Credential Clean Up Reduces attack surface and diverts attackers from AD
Next Steps
Explore our patented technologies to enable Active Defense in your enterprise.