Quick Connect Hardware

PacketViper acts inline at key transition points throughout the network. Licenses are deployed in one of three models: on-premise, cloud/AWS and bring your own hardware (BYOH). For the on-premise client, we offer hardware with options for multi-gateway, enterprise connectivity, full redundancy and fail through capability. We scaled our hardware products to fit any size business and budget, from  fully redundant enterprise model down to the small form factor desktop model.

Not sure which option is best for you?  Simply contact one of our representatives at the contact us page and we can talk through your options based on your connection details and business needs.

PacketViper Hardware Options


Default Configuration

  • Desktop Model/Wall Mount
  • Dimensions: 4.5 x 4.5 x 2
  • E3845 Intel Atom Processor
  • 4GB 1Memory
  • 4 x 10/100/1000 copper NIC (Non-Bypass)
  • Monitor Mode
  • 3/1 Deception Sensor or 1 non bypass bridge
  • 32GB SSD
  • 60W External Power Adapter
  • 1 Year RMA Warranty

1U Rack Mountable

Default Configuration

  • 1U Rack Mount Design
  • 3.3GHz G4400 Processor
  • 8GB 2400MHz Memory
  • 4 x 10/100/1000 Copper Bypass NIC
  • 2 x 10/100/1000 Integrated NIC
  • New Connections Per Sec: 50,000
  • Concurrent Connections: 1.1m
  • Support Monitor Mode
  • Dual gateway
  • 1 Deception Sensor(s)
  • 480GB SAS3 6Gps HDD
  • 1 x 260W Power Supply
  • 1 Year RMA Warranty

2U Rack Mountable

Default Configuration

  • 2U Rack Mount Design
  • 3.5 GHz Quad-Core 10MB L3 Cache Processor
  • 16GB 2666MHz DDR4 Memory
  • 2 x 10/100/1000 Integrated NIC
  • 4 x 10/100/1000 Copper Bypass NIC
  • 4 x 10/100/1000 Copper Non By-Pass
  • New Connections Per Sec: 90,000
  • Concurrent Connections: 2.2m
  • Support Monitor Mode
  • Dual gateway
  • 5 Deception Sensor(s)
  • 2 480GB SAS3 12Gps Hot-Swap, Hardware RAID
  • 2 x 700W Hot Swappable Redundant Power
  • 1 Year RMA Warranty

From Our Blog

  • NIST gets down with Deception

    A lot of CISOs look to the National Institute of Standards and Technology (NIST) and ISO for third-party validation of appropriate security controls and security program approaches. In this blog, read how NIST recommends Deception for protecting critical programs and high-value assets.

  • Deception Gets Screen Time at Gartner Security Risk and Management Summit 2019

    Don Gray recaps the Gartner® Security and Risk Management Summit 2019 commenting on three key points: deception prominently referenced in the keynote presentation, 7 imperatives of CARTA, and DevSecOps.

  • What is Internal and External Cyber Deception Technology?

    Internal and external cyber deception technology together is not your traditional approach to deception, nor to security in general. Since the days of honeypots, cybersecurity experts have utilized deception as a way to protect the network interior. Threat detection at the network perimeter, on the other hand, has seemingly been the role of firewalls. Read More...

  • Deception at the cyber “front line”

    Cyber Deception Front LineWhatever you call the front, the ability to stop the enemy where you first face them is vital. A paired approach of deception both externally and internally represents a tremendous opportunity to reduce attack vectors and strengthen overall cyber defense.