ACALVIO TECHNOLOGIES, INC.

 ACALVIO TECHNOLOGIES, INC. contact information is shown below
Owner:ACALVIO TECHNOLOGIES, INC.
Owner Address:2520 Mission College Blvd., Suite 110 Santa Clara CA 95054
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byACALVIO TECHNOLOGIES, INC.

Brand:

ACALVIO

Description:

software as a service (SAAS) services featuring cloud-based enterprise security solutions for use in cybersecurity intelligence and protection, namely, software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches;

Category: SOFTWARE AS SERVICE SAAS
Brand:

ACTIVE THREAT DECEPTION

Description:

Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;ACTIVE THREAT;

Category: ENTERPRISE COMPUTER HARDWARE SOFTWARE
Brand:

ACTIVE THREAT DECEPTION

Description:

ACTIVE THREAT;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems; software as a service (SAAS) services featuring software to detect and mitigate security risks and threats on enterprise service providers, and governmental networks;

Category: ACTIVE THREAT
Brand:

ADVERSARY BEHAVIOR ANALYTICS

Description:

Software as a service (SAAS) services featuring security software for tracking and predicting security breaches within enterprise networks;

Category: SOFTWARE AS SERVICE SAAS
Brand:

DECEPTION FARMS

Description:

DECEPTION;Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems;

Category: DECEPTION
Brand:

DECEPTION MESH

Description:

Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems;

Category: SOFTWARE AS SERVICE SAAS
Brand:

DEVOPS FOR DECEPTION

Description:

Software as a service (SAAS) services featuring cloud-based enterprise security solutions in the nature of security software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network operating systems, and security sensors;

Category: SOFTWARE AS SERVICE SAAS
Brand:

FLUID DECEPTION

Description:

DECEPTION;software as a service (SAAS) services featuring cloud-based enterprise security solutions in the nature of security software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;

Category: DECEPTION
Brand:

SHADOW AGENT

Description:

AGENT;Software as a service (SAAS) services featuring enterprise software for mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network systems, and data;

Category: AGENT
Brand:

SHADOW AGENT

Description:

Enterprise computer software solutions deployed on host systems for mitigating advanced network attacks by dynamically creating and deploying decoy systems, decoy network operating systems, and data;AGENT;

Category: ENTERPRISE COMPUTER SOFTWARE SOLUTIONS DEPLOYED
Brand:

SHADOW HOST

Description:

Virtualized enterprise computer software for detecting and mitigating advanced network attacks that is deployed and configured as a decoy computer system;HOST;

Category: VIRTUALIZED ENTERPRISE COMPUTER SOFTWARE
Brand:

SHADOW HOST

Description:

HOST;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks that is deployed and configured as a decoy computer system;

Category: HOST
Brand:

SHADOW LABS

Description:

LABS;Computer services, namely, monitoring, testing, evaluating, analyzing, and reporting information and data generated by decoy systems and decoy network operating systems to ensure proper functioning; computer services, namely, monitoring, testing, evaluating, analyzing, and reporting information and data generated by computer software in the fields of computer and network security to ensure proper functioning and for quality control purposes; computer software and network security analysis services in the nature of analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of network security;

Category: LABS
Brand:

SHADOW NETWORKS

Description:

NETWORKS;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;

Category: NETWORKS
Brand:

SHADOW NETWORKS

Description:

Enterprise computer hardware and software solutions for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;NETWORKS;

Category: ENTERPRISE COMPUTER HARDWARE SOFTWARE
Brand:

SHADOWBOX

Description:

Enterprise computer appliances, namely, computer hardware and peripheral devices with one or more central processing units that contain software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;

Category: ENTERPRISE COMPUTER APPLIANCES
Brand:

SHADOWNET

Description:

Enterprise computer hardware and software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;SHADOW NET;Software as a service (SAAS) services featuring enterprise software for detecting and mitigating advanced network attacks by dynamically creating and deploying decoy systems and decoy network operating systems;

Category: ENTERPRISE COMPUTER HARDWARE SOFTWARE
Brand:

SHADOWPLEX

Description:

On-premises installed software delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems such as clients, servers, applications, utilities, and file systems;Software as a service (SAAS) services featuring security software for delivering enterprise security solutions for advanced threat defense of malicious lateral movement or insider threats by dynamically creating and deploying decoy systems such as clients, servers, applications, utilities, and file systems;

Category: ON PREMISES INSTALLED SOFTWARE DELIVERING ENTERPRISE