Quick Connect Hardware

PacketViper acts inline at key transition points throughout the network. Licenses are deployed in one of three models: on-premise, cloud/AWS and bring your own hardware (BYOH). For the on-premise client, we offer hardware with options for multi-gateway, enterprise connectivity, full redundancy and fail through capability. We scaled our hardware products to fit any size business and budget, from  fully redundant enterprise model down to the small form factor desktop model.

Not sure which option is best for you?  Simply contact one of our representatives at the contact us page and we can talk through your options based on your connection details and business needs.

PacketViper Hardware Options

Desktop

Default Configuration

  • Desktop Model/Wall Mount
  • Dimensions: 4.5 x 4.5 x 2
  • E3845 Intel Atom Processor
  • 4GB 1Memory
  • 4 x 10/100/1000 copper NIC (Non-Bypass)
  • Monitor Mode
  • 3/1 Deception Sensor or 1 non bypass bridge
  • 32GB SSD
  • 60W External Power Adapter
  • 1 Year RMA Warranty

1U Rack Mountable

Default Configuration

  • 1U Rack Mount Design
  • 3.3GHz G4400 Processor
  • 8GB 2400MHz Memory
  • 4 x 10/100/1000 Copper Bypass NIC
  • 2 x 10/100/1000 Integrated NIC
  • New Connections Per Sec: 50,000
  • Concurrent Connections: 1.1m
  • Support Monitor Mode
  • Dual gateway
  • 1 Deception Sensor(s)
  • 480GB SAS3 6Gps HDD
  • 1 x 260W Power Supply
  • 1 Year RMA Warranty

2U Rack Mountable

Default Configuration

  • 2U Rack Mount Design
  • 3.5 GHz Quad-Core 10MB L3 Cache Processor
  • 16GB 2666MHz DDR4 Memory
  • 2 x 10/100/1000 Integrated NIC
  • 4 x 10/100/1000 Copper Bypass NIC
  • 4 x 10/100/1000 Copper Non By-Pass
  • New Connections Per Sec: 90,000
  • Concurrent Connections: 2.2m
  • Support Monitor Mode
  • Dual gateway
  • 5 Deception Sensor(s)
  • 2 480GB SAS3 12Gps Hot-Swap, Hardware RAID
  • 2 x 700W Hot Swappable Redundant Power
  • 1 Year RMA Warranty

From Our Blog

  • What is Internal and External Cyber Deception Technology?

    Internal and external cyber deception technology together is not your traditional approach to deception, nor to security in general. Since the days of honeypots, cybersecurity experts have utilized deception as a way to protect the network interior. Threat detection at the network perimeter, on the other hand, has seemingly been the role of firewalls. Read More...

  • Deception at the cyber “front line”

    Cyber Deception Front LineWhatever you call the front, the ability to stop the enemy where you first face them is vital. A paired approach of deception both externally and internally represents a tremendous opportunity to reduce attack vectors and strengthen overall cyber defense.

  • Announcing PacketViper at RSAC Early Stage Expo

    RSAC Early Stage ExpoBe our guest at RSAC 2019. Register with our special code to gain entrance to the RSAC Expo arena. Visit the large halls at the Moscone but also come visit us at the Early Stage Expo in the Marriott just down the street from the conference.

  • Four cyber deception delusions diminished

    Successful adoption of cyber deception as an impactful security tool, and more than just another data generating detection solution, demands avoidance of these four common delusions. .