Deception 2.0 is based on Acalvio’s patented Fluid Deception™ technology which enables authentic, cost-effective, and scalable deception. Deception 2.0 balances quality of deception vs scale of deception, thus delivering superior Detection Efficiency with Cost Effectiveness.

ShadowNet™ builds on Acalvio’s patented technology, Fluid Deception™ to provide defense against advanced attacks. ShadowNet engages with malicious activity in a realistic but supervised environment to learn from each interaction so that the enterprise can be inoculated from similar future threats. Attacker Behavior Analytics™ (ABA) combines deception data with the enterprise’s existing controls to provide high-fidelity, actionable signals in near real-time to assist IR teams. ShadowNet is designed for on-premise, data center and cloud deployments.

FluidDeception facilitates blended, automatic, adaptive, dynamic and believable deceptions to:

  • Identify attackers as they move laterally across your network
  • Learn from their tactics, tools and procedures in order to remediate
  • Automatically deploy/refresh decoys and deceptions anywhere to attract and engage

Adversary Behavior Analytics™ (ABA): Other approaches like mining every piece of data in an organization or inspecting every packet have been too expensive, impractical or have had limited success in hunt for anomalies in commercial environments. In contrast, Acalvio starts with a positive affirmation of a security event in ShadowNet. ABA provides Incident Response (IR) teams with automated adversary tracking, both historic and forward-looking. ABA can:

  • Detect adversary paths and hosts that may have been used before encountering Acalvio’s distributed deceptions
  • Find machines, hosts, and users that have similar vulnerabilities and risk profiles
  • Prioritize the most credible incidents


Aryaka provides global connectivity for worldwide enterprises and delivers up to 40x faster performance for cloud and SaaS applications.

It significantly reduces the time taken to transfer files globally and on to the cloud. Under certain conditions, bandwidth utilization is reduced by up to 99% and round-trips are sharply reduced—by as much as 95% in some cases.


SkySecure is a turnkey platform to run and manage application workloads that are the highest priority for the business to protect. It fully integrates hardware, software, and service components to simplify the assembly, deployment, and operational effort needed to manage secure servers. The platform is comprised of:

  • SkySecure Systems, hardened compute appliances, that you deploy in your environment to run your VMs

  • SkySecure Compartments, a security layer within the systems, that wrap and protect each VM

  • SkySecure Center is centralized remote management for the entire platform

CyberArk is a global leader and pioneer of a new layer of IT security solutions that protects organizations from cyber attacks that have made their way inside the network perimeter to strike at the heart of the enterprise. CyberArk’s software solution is focused on protecting privileged accounts, which have become a critical target in the lifecycle of today’s cyber attacks.