PacketViper’s Deception360™ is cybersecurity software that actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.
Deception360 is a transformative and trusted cybersecurity solution for organizations seeking to cost-effectively defend converging Operational Technology (OT) and Information Technology (IT) networks and modernize cybersecurity without a ‘rip and replace’.
Deception360 provides measurable cybersecurity outcomes that improve OT/IT security, preserve OT process uptime and streamline security operations unlike anything else in the market.
Deception-powered use cases
Simply put, we use deception in a couple of powerful ways to drive security outcomes that make a difference.
First, we stop the threats outside your network from getting in. At the network boundaries Deception360 brings the principles of a moving target defense, making the network hard to understand during reconnaissance. This is true for both external gateways and OT/IT boundaries.
Then for threats on the network, we entice them to reveal themselves so that we can reduce their effective dwell time and take action to eradicate them.
A summary of our use cases includes the following:
- Internal threat detection
- Boundary defense & threat prevention
- Automated threat response
- Threat hunting
- Vendor risk management (VRM)
- Ransomware & DDoS prevention
- Firewall and SIEM optimization
- Compensating control/ critical asset fencing
Not a honeypot
Our deception-based approach is disruptive and makes practical sense. Deception is a dynamic mainstay for attackers who use it to trick us into revealing information that increases their probability of success. In turn, we respond with mostly static, insufficient defenses.
Deception360 turns the tables on threats at the earliest stages of their attack cycle, greatly increasing the difficulty of their attack at initial reconnaissance. Threat detection is equally effective against known and unknown threats.
Other deception solutions are costly and complex while only offering the single use of internal (on-network) threat detection. Alternative technologies like firewalls, SIEM and endpoint solutions are necessary but insufficient for keeping up with threats. Deception360 adds a much-needed layer to the security stack.
Aligning OT & IT security
The agentless nature of Deception360 makes it ideal for OT. Networks can be passively monitored with no false-positives and without unplanned downtime. The solution passively monitors the OT & IT networks without scanning.
This improves visibility while gathering intelligence on network threats performing reconnaissance and moving laterally, all while preserving options to respond to attacks at wire speeds within a segment or across the enterprise.
Measurable security outcomes
You will regularly see the measurable impact of the deception-based approach to network defense.
Expect to harvest thousands of new threats per month, see traffic reductions up to 70% while firewall and SIEM utilization stabilize.