Please read if you are a partner or client of PacketViper and intend to export our products.

The following information is not intended to replace the U.S. Export Administration Regulations (the “EAR”), other U.S. export laws, or the Harmonized Tariff Schedule (“HTS”), but are provided as an accommodation to our partners and customers to be used in conjunction with said laws to assist you in the export and import of PacketViper products. The exporter is responsible for exporting PacketViper products in accordance with the requirements of the EAR, other U.S. export laws, and the HTS. End-user, end-use and country of ultimate destination may affect export licensing requirements. All Export Control Classification Numbers (“ECCN”), HTS Numbers and License Authorization information are subject to change without notice. Modification in any way to a PacketViper product voids the classification. It is your obligation as an exporter to verify such export policy information and comply with the current applicable regulations. IF YOU EXPORT PACKETVIPER PRODUCTS, YOU ARE RESPONSIBLE FOR COMPLYING WITH THE REQUIREMENTS OF THE U.S. COMMERCE DEPARTMENT’S BUREAU OF INDUSTRY AND SECURITY, THE EAR, AND OTHER U.S. EXPORT LAWS.

All export information is provided “as-is”. PacketViper makes no warranty or representation that the information contained on this site is accurate, current, or complete. It is your obligation as the exporter to comply with the current applicable requirements of U.S. export laws and regulations. Any use of such information by you is without recourse to PacketViper and is at your own risk. PacketViper is in no way responsible for any damages, whether direct, consequential, incidental, or otherwise, suffered by you as a result of using or relying upon such information for any purpose.

Embargoed Destinations

PacketViper software and/or technical data may NOT be exported, re-exported or transferred, either directly or indirectly, to any country listed in Country Group E:1 in Supplement No. 1 to part 740 of the EAR (currently, Cuba, Iran, North Korea, Sudan & Syria). Please note that this list (“Embargoed Destinations”) is subject to change.

Denied Persons and Entities Lists

In addition to the Embargoed Destinations, PacketViper software and/or technical data may NOT be exported, re-exported or transferred, either directly or indirectly, to a person or entity barred by the United States government from participating in export activities. Denied persons/entities include, but are not limited to, persons and/or entities such as those listed on the U.S. Commerce Department’s Denied Persons List, Entities List and the U.S. Department of Treasury’s Office of Foreign Assets Control (“OFAC”) Specially Designated Nationals List.

U.S. Department of Commerce Denied Persons List
U.S. Department of Commerce Denied Entity List
U.S. Department of Commerce Unverified List
U.S. Department of Treasury Specially Designated Nationals List
U.S. Department of State Debarred List
U.S. Department of State Nonproliferation Sanctions

Product and Technology Matrix

Encryption Registration Number: R103378

Product Name ECCN License Exception
PacketViper 5D002C1 ENC Unrestricted 740.17(b)(1)
PV100 PacketViper Appliance 5A002A1 ENC Unrestricted 740.17(b)(1)
PV300 PacketViper Appliance 5A002A1 ENC Unrestricted 740.17(b)(1)
PV310 PacketViper Appliance 5A002A1 ENC Unrestricted 740.17(b)(1)

From Our Blog

  • A Paradigm Shift for Cybersecurity Managed Service Providers

    PacketViper Partner ProgramShifts in the current cybersecurity service provider market somewhat resemble an episode of the infamous game show Wheel of Fortune, where contestants purchase letters to capitalize and prosper on the show. We’ve seen Managed Service Providers (MSPs) “buy an S”, or invest heavily in their businesses in order to become a Managed Security Service Provider … Continue reading >>>

  • Hackers For Hire

    In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term “hacker” stirs up controversy among organizations and leaves a sore-spot with many. What if there was a solution… Are there good hackers today? If you answered “YES”, then you answered correctly.

  • The Insanities of Network Security

    Thinking you have to allow every connection to every open network port. Thinking because you have a VPN portal it’s secure. Thinking your a IDS isn’t based on variables on the past, and can predict the future. Thinking you won’t be chasing your tail over and over on false positives, and will not become jaded. … Continue reading >>>

  • Irony of Network Security

    As I read through articles on the latest security threats, breaches, door opening exploits, and vulnerabilities that left doors opened. I Ironically see a firewall ad next to the security article saying ‘The Complete Firewall Solution, Get Total Visibility Into Your Security”. The article in Reuters explained how many security systems found they were susceptible … Continue reading >>>

  • Network Security Convolution

    It takes an army of security professional today to identify, isolate, track, and eliminate security threats, and breaches. The convolution within network security in my opinion have reached irresponsible levels. The days of the past where anomalies were quickly squashed by the network staff on hand is over from what I’m reading. It always seems to be a … Continue reading >>>

  • Overcoming the #1 Security Challenge in Operations

    The Problem The overwhelming volume of global IP traffic hitting networks today creates a crushing amount of security alerts. Too frequently, many of these alerts go unchecked while the quantity of alerts increases daily. Additionally, security analyst teams are frequently understaffed and resources/expertise are scarce across the industry. Together this presents the biggest security challenge … Continue reading >>>

  • WannaCry over WannaCrypt? PacketViper Blocks New Ransomware Threat

    The ransomware that brought hospitals throughout England and Scotland to an operational standstill is a strain of WannaCry/WannaCrypt ransomware which contains a potent and dangerous payload called ExtendBlue. What if you could block the ransomware? ExtendBlue exploits Microsoft’s SMB protocol and gives it legs. ExtendBlue allows the attacker to discover new exploitable systems within the … Continue reading >>>

  • Three Industries Benefit From Proactive Cybersecurity

    Financial Services Companies in the financial services sector possess highly sensitive data, and therefore cyber-attackers typically consider the time, effort and risk of attacking them to be well worth the potential reward. At the same time that financial services companies need to leverage technology advances to support customer demands, they also need to provide superior … Continue reading >>>