Research Library

Powered by

All Research Sponsored By:Acalvio

  • Cyber Deception Systems

    This Market Segment Report covers Cyber Deception Systems (CDS) and the market position of 18 vendors delivering products and services for CDS. Read on to learn about CDS capabilities (e.g. lures, breadcrumbs, honeypots, decoys, and traps) as well as the different vendors in the market.

  • The Five Tenets Of Enterprise Deception

    Deception has many security benefits and has evolved from putting a couple of honey pots out in the environment to a full enterprise deception deployment. To keep up with the complexity of deception, organizations should follow the 5 requirements explained in this video. Tune in to learn more today.

  • Acalvio Deception and the NIST Cybersecurity Framework 1.1

    The NIST Cybersecurity Framework 1.1 (CSF) is being widely adopted by organizations of all types as they seek to minimize risk. In this white paper, explore an overview of the CSF core controls and learn how Acalvio supports the NIST Cybersecurity Framework.

  • Acalvio Deception Intro Video

    In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.

  • Deception 2.0 For Dummies

    Inside Deception 2.0 For Dummies, find cybersecurity deception concepts and technologies in 6 chapters that cover: how the modern cyber threat has evolved and how deception can break the cyberattack life cycle, why prevention technologies alone aren't enough to protect enterprise networks and how honeypots can help, and more.

  • Definitive Guide to Deception 2.0

    Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.

  • Acalvio Deception and the MITRE ATT&CK Framework

    The Cyber Kill Chain has long been used to describe the stages of an attack commonly used to compromise sensitive assets. Unfortunately, too much emphasis has been placed on the initial exploitation stages, and not enough on the later stages. To overcome this problem, MITRE has developed ATT&CK. Read on to learn about the framework today.

  • Acalvio Google Cloud Overview

    In this product demo, learn about various cloud attack vectors, deception in the cloud, and the security benefits of using Google Cloud today.

  • Acalvio ShadowPlex Presentation

    Acalvio ShadowPlex provides advanced threat detection capabilities using enterprise deception at the core of its solution. Watch this live demo of Acalvio ShadowPlex to learn more about the platform and how to use it.

  • 3 Minutes Until the Apocalypse

    Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.

  • High-Fidelity Breach Detection with Acalvio Autonomous Deception

    ESG Lab validated that Acalvio ShadowPlex is quick and easy to implement at scale. ShadowPlex can deploy hundreds of deception points across numerous network segments and automatically scan your network and make configuration recommendations. Download this ESG lab review to learn more about Acalvio ShadowPlex today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.