Acalvio Shadowplex

Welcome to
Autonomous Deception

ShadowPlex Autonomous Deception

Accurate Detection

Timely Detection

Cost-Effective Detection

ShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.

Full lifecycle capabilities

ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)

Deception Farms

Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility.

Fluid Deception

Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys.

ShadowPlex Distributed Deception Platform

Intuitive Dashboard

Comprehensive visibility into Deception alerts and their scope and status

Recommendation Engine

AI-driven suggestions for ideal deception campaigns

Intent based Configuration

Simplifies the process of designing complex, yet effective deception campaigns

Deception Incidents Dashboard

Visualize incident timelines and details

Incident Details

Complete forensics of adversary behavior, including PCAPs, full host logging, network connections, file downloads, and generated IOCs.

High Interaction Decoys

Authentic host systems are used to attract and keep adversaries engaged, while providing detailed logging.

SIEM Integrations

ShadowPlex integrates with all the leading SIEMs.

ArcSight Integration

Kibana

Splunk

API Support

ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:

  • Threat Intelligence
  • IT Change Management platforms
  • SOAR (Security Orchestration and Response)
  • SIEM
  • Perimeter Defense
  • NAC (Network Access Control)
  • Vulnerability Managers
  • SSO, Identity Management, Privileged User Management Systems
  • EDR, End-point

Next Steps

Let us show you our patented Deception 2.0 technology for your enterprise.

Loading...