ShadowPlex Identity Security

Perfect Complement to CrowdStrike Falcon Identity Protection

“Identity as the new security perimeter” is the reality. The traditional security perimeter has become porous with the rapid adoption of cloud services, mobile solutions, internet-facing applications, and the recent hybrid work-from-home model. The new normal is that the traditional perimeters will be breached sooner or later. The focus is now on internal identity security so that the breaches do not become disasters.

ShadowPlex Identity Security

Attacks compromise identities from identity repositories to the multiple identity caches across the enterprise endpoints. Acalvio ShadowPlex Identity Security includes visibility and management of the identity attack surface area and an effective deception-based solution to detect and respond against identity attacks. The first step in reducing the attacker’s chance for success is discovering the identity attack surface. For the attack surface that cannot be removed due to operational reasons, ShadowPlex provides identity-specific deceptive elements to detect and respond to compromise attempts.

For more information

ShadowPlex Identity Security

Attacks compromise identities from identity repositories to the multiple identity caches across the enterprise endpoints. Acalvio ShadowPlex Identity Security includes visibility and management of the identity attack surface area and an effective deception-based solution to detect and respond against identity attacks. The first step in reducing the attacker’s chance for success is discovering the identity attack surface. For the attack surface that cannot be removed due to operational reasons, ShadowPlex provides identity-specific deceptive elements to detect and respond to compromise attempts.

For more information

Comprehensive Identity Protection Through Deep Integration

Acalvio and CrowdStrike have built a strategic partnership to offer the best-in-class Identity Security solution on the CrowdStrike platform. A key part of this partnership between Acalvio and CrowdStrike is the tight integration between
Acalvio’s ShadowPlex and CrowdStrike’s Falcon platforms.

Acalvio App on the CrowdStrike (CS) Store allows CrowdStrike customers
to try-and-buy the ShadowPlex Identiy Security solution.

CrowdStrike Falcon Identity Threat Protection enables hyper accurate threat detection and real-time prevention of identity-based attacks combining the power of advanced AI, behavioral analytics, and a flexible policy engine to enforce risk-based conditional access.

Acalvio ShadowPlex analyses endpoint credential caches and credential repositories, and provides visibility into attack paths that leverage exploitable chains of relations. ShadowPlex also leverages the power of AI to deploy a layer of identity deception across the identity repositories, identity caches, and the network to detect identity attacks and generate high fidelity alerts.

Identity Security is a critical component of the enterprises’ overall security strategy. Acalvio ShadowPlex Identity Security provides complementary capabilities to the CrowdStrike Identity Protection features, and both together provide a complete identity security solution.

CrowdStrike Falcon Identity Threat Protection enables hyper accurate threat detection and real-time prevention of identity-based attacks combining the power of advanced AI, behavioral analytics, and a flexible policy engine to enforce risk-based conditional access.
Acalvio ShadowPlex analyses endpoint credential caches and credential repositories, and provides visibility into attack paths that leverage exploitable chains of relations. ShadowPlex also leverages the power of AI to deploy a layer of identity deception across the identity repositories, identity caches, and the network to detect identity attacks and generate high fidelity alerts.

Identity Security is a critical component of the enterprises’ overall security strategy. Acalvio ShadowPlex Identity Security provides complementary capabilities to the CrowdStrike Identity Protection features, and both together provide a complete identity security solution.

Next Steps

Explore our patented technologies to enable Active Defense and Identity Security in your enterprise.

Loading...