Deception Solutions for the Smallest Office to the Highest Speed Datacenter

For physical datacenter and network environments without VMWare infrastructure, PacketViper provides a range of appliances that enable broad coverage in a cost-effective manner on the low end and can keep up with the demands of the fastest networks on the high end. We scaled our hardware products to fit any size business and budget, from the fully redundant enterprise model down to the small form factor SOHO model.

PacketViper appliances provide options for multi-gateway, enterprise connectivity, full redundancy, and fail-through capability.

If deploying as an appliance, PacketViper is configurable in three modes:

  1. In-line as a transparent bridge at key transition points throughout the network
  2. In-line as a route hop on the network
  3. Monitor mode using a network tap or mirror port.

Not sure which option is best for you?
Simply contact us to discuss options based on your business needs and infrastructure details.

PacketViper Hardware Appliance Deployment Options

SOHO – Small Form Factor

Default Configuration

  • Desktop Model/Wall Mount
  • Dimensions: 4.5 x 4.5 x 2
  • E3845 Intel Atom Processor
  • 4GB 1Memory
  • 4 x 10/100/1000 copper NIC (Non-Bypass)
  • Monitor Mode
  • 3/1 Deception Sensor or 1 non-bypass bridge
  • 32GB SSD
  • 60W External Power Adapter
  • 1 Year RMA Warranty
Corporate – 1U Rack Mountable

Default Configuration

  • 1U Rack Mount Design
  • 3.3GHz G4400 Processor
  • 8GB 2400MHz Memory
  • 4 x 10/100/1000 Copper Bypass NIC
  • 2 x 10/100/1000 Integrated NIC
  • New Connections Per Sec: 50,000
  • Concurrent Connections: 1.1m
  • Support Monitor Mode
  • Dual gateway
  • 1 Deception Sensor(s)
  • 480GB SAS3 6Gps HDD
  • 1 x 260W Power Supply
  • 1 Year RMA Warranty
Enterprise – 2U Rack Mountable

Default Configuration

  • 2U Rack Mount Design
  • 3.5 GHz Quad-Core 10MB L3 Cache Processor
  • 16GB 2666MHz DDR4 Memory
  • 2 x 10/100/1000 Integrated NIC
  • 4 x 10/100/1000 Copper Bypass NIC
  • 4 x 10/100/1000 Copper Non-bypass
  • New Connections Per Sec: 90,000
  • Concurrent Connections: 2.2m
  • Support Monitor Mode
  • Dual gateway
  • 5 Deception Sensor(s)
  • 2 480GB SAS3 12Gps Hot-Swap, Hardware RAID
  • 2 x 700W Hot Swappable Redundant Power
  • 1 Year RMA Warranty

From Our Blog

  • 3 Steps to Closing the ‘Proxy Loophole’ on Malicious Nation-State Attackers

    Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.

  • Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

    Everyday Denial of Service (D0S)Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.

  • Vendor Risk Monitoring 360:  It’s Continuous and it’s inside

    continuous vendor risk managmentIs your organization looking for a way to protect against a vendor-related breach? Do you want to enforce policies around how your vendors behave on your network? Read this blog to learn how.

  • How to Detect and Prevent Ruthless Cryptojacking

    cryptojackersThis blog takes a look at crypto mining from a networking perspective. Fundamentally, crypto mining is a very long-lived TCP connection between a client and a server. The ports and protocol can vary, and the TCP communication can be encrypted. Discover how to prevent the worm from completing its crypto mining task.