Logo of Acalvio, a leading company in cyber deception technology

ShadowPlex Cloud Security (SCS) provides a new Deception Technology-based cloud threat detection. SCS is agent-less, enterprise-scale and protects cloud-native workloads. SCS leverages native APIs by Cloud providers to not only deploy and manage but also monitor and alert on honeytoken usage to provide an effective deception-based Cloud Threat Detection solution across multiple clouds.

What Are Honeytokens

Honeytokens is a Deception Technology technique that is proven to be extremely powerful and effective in detecting a variety of threats. ShadowPlex honeytokens cover both IAM directories and cloud workloads. Any usage or manipulation of these honeytokens is a high-fidelity indicator of a threat.

Cloud Honeytoken IAM

IAM Honeytokens are deceptive credentials (representing user and service accounts, roles, policies) in Identity and Access Management (IAM) that are specifically designed to lure attackers and deflect them away from real credentials.

Cloud Honeytoken Workload

Workload Honeytokens include deceptive credentials and data embedded in legitimate cloud resources such as compute instances, secrets manager/vault, serverless functions, container clusters etc. where attackers look for exposed credentials.

Multi Cloud Defense Architecture

ShadowPlex Cloud Security

Automates Honeytoken Deployment – At Scale
ShadowPlex automates the creation and deployment of honeytokens such as IAM users, roles, policies, and credentials (e.g., access keys and secrets) across cloud credential stores, including Instance Metadata and Secrets Store.

Protects Multi-Cloud Workloads
ShadowPlex deploys honeytokens across multiple cloud environments, ensuring comprehensive protection for cloud-native and multi-cloud workloads.

Agent-less, Minimal Deployment Footprint
With no agents needed, ShadowPlex offers easy and fast deployment.

Integrates Seamlessly
ShadowPlex integrates with cloud service providers and security platforms, enabling response automation and threat investigation workflows.

Key Features

The dynamic nature of cloud workloads continuously expands the attack surface as new workloads are provisioned and resources are deployed. Even with active posture management, it remains impractical to eliminate the attack surface entirely.

Built on Proven Deception Technology

Built on
Proven Deception
Technology

Dynamic Cloud Environments

Supports Multi-Cloud
Networks

Agentless

Agentless

Threats Across All Cloud-native

Detects Threats
Across All
Cloud-native
Workloads

Flexible Deployment

ShadowPlex Cloud Security is available in two deployment modes

Acalvio Hosting

SaaS Service

Deception service is hosted by Acalvio and can support multiple clouds

Your Cloud Hosting

Customer Hosted

Packaged service that customer can host on their own. Suitable for single cloud provider.

Customers will have complete control over types and counts of honeytokens created. It will only require Read access to the CloudTrail logs.

Strengthen your Cloud Security

Achieving comprehensive cloud security requires multiple layers of defense working in harmony. Acalvio ShadowPlex complements CSPM and CNAPP solutions and provides robust protection across cloud-native and multi-cloud workloads.

Reach out today to learn more about our industry leading deception platform and its role in cloud threat detection across multi-cloud workloads

Next Steps

Defend your cloud environment from cyber threats

Loading...