ShadowPlex Cloud Security (SCS) provides a new Deception Technology-based cloud threat detection. SCS is agent-less, enterprise-scale and protects cloud-native workloads. SCS leverages native APIs by Cloud providers to not only deploy and manage but also monitor and alert on honeytoken usage to provide an effective deception-based Cloud Threat Detection solution across multiple clouds.
What Are Honeytokens
Honeytokens is a Deception Technology technique that is proven to be extremely powerful and effective in detecting a variety of threats. ShadowPlex honeytokens cover both IAM directories and cloud workloads. Any usage or manipulation of these honeytokens is a high-fidelity indicator of a threat.
IAM Honeytokens are deceptive credentials (representing user and service accounts, roles, policies) in Identity and Access Management (IAM) that are specifically designed to lure attackers and deflect them away from real credentials.
Workload Honeytokens include deceptive credentials and data embedded in legitimate cloud resources such as compute instances, secrets manager/vault, serverless functions, container clusters etc. where attackers look for exposed credentials.
ShadowPlex Cloud Security
Automates Honeytoken Deployment – At Scale
ShadowPlex automates the creation and deployment of honeytokens such as IAM users, roles, policies, and credentials (e.g., access keys and secrets) across cloud credential stores, including Instance Metadata and Secrets Store.
Protects Multi-Cloud Workloads
ShadowPlex deploys honeytokens across multiple cloud environments, ensuring comprehensive protection for cloud-native and multi-cloud workloads.
Agent-less, Minimal Deployment Footprint
With no agents needed, ShadowPlex offers easy and fast deployment.
Integrates Seamlessly
ShadowPlex integrates with cloud service providers and security platforms, enabling response automation and threat investigation workflows.
Key Features
The dynamic nature of cloud workloads continuously expands the attack surface as new workloads are provisioned and resources are deployed. Even with active posture management, it remains impractical to eliminate the attack surface entirely.
Built on
Proven Deception
Technology
Supports Multi-Cloud
Networks
Agentless
Detects Threats
Across All
Cloud-native
Workloads
Flexible Deployment
ShadowPlex Cloud Security is available in two deployment modes
SaaS Service
Deception service is hosted by Acalvio and can support multiple clouds
Customer Hosted
Packaged service that customer can host on their own. Suitable for single cloud provider.
Customers will have complete control over types and counts of honeytokens created. It will only require Read access to the CloudTrail logs.
Discover More
Learn more about Acalvio ShadowPlex Cloud Security Product
Strengthen your Cloud Security
Achieving comprehensive cloud security requires multiple layers of defense working in harmony. Acalvio ShadowPlex complements CSPM and CNAPP solutions and provides robust protection across cloud-native and multi-cloud workloads.
Reach out today to learn more about our industry leading deception platform and its role in cloud threat detection across multi-cloud workloads
Next Steps
Defend your cloud environment from cyber threats