A Compensating Control for Vanishing Air Gaps

Air gaps were once the ultimate enabler of ‘security by obscurity’. Since the OT network wasn’t directly connected to other networks, threats were unable to locate and access the network, making attack difficult. As operational devices and infrastructure become more connected to corporate and cloud environments the ‘air gap’ between IT and OT no longer exists. The OT/IT boundary must be defended while the OT network requires the ability to dynamically detect threats and respond without introducing the risk of unplanned downtime. PacketViper provides deception-driven boundary protection while delivering enhanced threat detection within the operational network.

Containment

The harsh reality is that threats can move between remote locations at wire speed in connected networks. The limited security layer at remote facilities allows the sprawl to widely propagate causing potential damage and expensive down time. PacketViper detects and contains threats and anomalies at remote locations as they are discovered. The technology prevents unauthorized and malicious communication and applies defenses across all notes on the network, while simultaneously generating alerts and alarms for the operations and security teams.

Third Party Risk Management

Vendor ecosystems are expanding and evolving at a dynamic rate making it more difficult to maintain continual digital trust on networks. Each supplier granted network access adds a layer of risk to the enterprise. ICS/OT environments are at greater risk due to normal physical interactions behind the security layer. Vendors, third parties and employees frequently plug-in with external storage or internet connected devices for maintenance and monitoring, creating a vector for introduced and undetected threats. PacketViper protects against vendor-related breach by continuously analyzing behavior-based vendor traffic as it interacts with network assets. This helps organizations establish digital trustworthiness with false-positive proof attribution and real-time, wire-speed connected vendor monitoring and adaptive response management.

Protection for Aging and Unsupported Devices

Properly functioning OT networks frequently push the limits of aging devices as manufacturers announce impending end of support, and as technologies approach their end of useful life. This forces teams to consider the risk between the cost of upgrades versus the cost of unplanned downtime if aging and vulnerable control systems are attacked. Many facilities continue to use equipment far beyond the end of manufacturer support. As new threats emerge, the organization is at significant risk. PacketViper builds a security fence around aging and vulnerable OT network assets that require connectivity to operate effectively. The solution provides deception-driven boundary protection—free from false positives—while delivering enhanced threat detection within the operational network.

 

DDoS Protection

Skyrocketing global IP traffic volumes create an increased risk of a successful DDoS attack. PacketViper decoys can identify anomalies in network traffic and can actively block threats.

Geo-Targeting

Both troublesome content delivery networks and worldwide enterprises are leveraging server infrastructure all around the globe. PacketViper’s geo-targeting can help you stay ahead of attackers and in touch with global companies you want to do business with.

SIEM Optimization

Stripping away IP traffic that an organization has no need for goes a long way toward increasing the efficiency and value of security information and event management (SIEM) applications.

Threat Intelligence

There are unique opportunities to harvest threat intelligence at your network edge based on real-time activity. Use PacketViper to overcome the challenges of easily applying threat intelligence to network defense.

An agentless, active solution to prevent and detect attackers sooner, harvest intelligence, take action and repeat.

PacketViper goes to work early in the Cyber Kill Chain®, at important network boundaries, and at critical OT endpoints.  We solve important cybersecurity problems and produce practical, real-world results, including dynamic network defense and relief of security operational costs and burdens.