Acalvio Shadowplex
Welcome to
Autonomous Deception
ShadowPlex Autonomous Deception
Accurate Detection
Timely Detection
Cost-Effective Detection
ShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.
Full lifecycle capabilities
ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)

Deception Farms
Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility.

Fluid Deception
Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys.

ShadowPlex Distributed Deception Platform


Intuitive Dashboard
Comprehensive visibility into Deception alerts and their scope and status
Recommendation Engine
AI-driven suggestions for ideal deception campaigns


Intent based Configuration
Simplifies the process of designing complex, yet effective deception campaigns
Deception Incidents Dashboard
Visualize incident timelines and details


Incident Details
Complete forensics of adversary behavior, including PCAPs, full host logging, network connections, file downloads, and generated IOCs.
High Interaction Decoys
Authentic host systems are used to attract and keep adversaries engaged, while providing detailed logging.


SIEM Integrations
ShadowPlex integrates with all the leading SIEMs.
ArcSight Integration


Kibana
Splunk

API Support
ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:
- Threat Intelligence
- IT Change Management platforms
- SOAR (Security Orchestration and Response)
- SIEM
- Perimeter Defense
- NAC (Network Access Control)
- Vulnerability Managers
- SSO, Identity Management, Privileged User Management Systems
- EDR, End-point
Next Steps
Let us show you our patented Deception 2.0 technology for your enterprise.