Quick Connect Hardware Suitable for Any Environment

PacketViper sits inline at key transition points throughout the network. Licenses are deployed in one of three models: on-premise, cloud/AWS and bring your own hardware (BYOH). For the on-premise client, we offer hardware with options for multi-gateway, enterprise connectivity, full redundancy and fail through capability. We scaled our hardware products to fit any size business and budget, from the fully redundant enterprise model PV-310 down to the small form factor desktop model PV-50.

Not sure which option is best for you?  Simply contact one of our representatives at the contact us page and we can talk through your options based on your connection details and business needs.

PacketViper Hardware Options

PV-50

Default Configuration

  • Desktop Model/Wall Mount
  • Dimensions: 7.75 x 7.75 x 2.75
  • 2.4GHz 8-Core 4M L3 Cache Processor
  • 4GB 1600MHz Memory
  • 4 x 10/100/1000 copper NIC
  • 60GB SSD
  • 60W External Power Adapter
  • IPMI Port
  • 1 Year RMA Warranty

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

PV-100

Default Configuration

  • 1U Rack Mount Design
  • 2.9GHz Dual-Core 3M L3 Cache Processor
  • 4GB 1333MHz Memory
  • 2 x 10/100/1000 Bypass NIC
  • 2 x 10/100/1000 Standard NIC
  • 500GB 7.2K SATA HDD
  • 1 x 260W Power Supply
  • 1 Year RMA Warranty

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

PV310

PV-310

Default Configuration

  • 2U Rack Mount Design
  • 3.2 GHz Quad-Core 8M L3 Cache Processor
  • 8GB 1333MHz Memory
  • 4 x 10/100/1000 Bypass NIC
  • 2 x 10/100/1000 Standard NIC
  • Supports dual gateways
  • 2 300GB 15K SAS Hot-Swap, Hardware RAID
  • 2 x 700W Hot Swappable Redundant Power
  • 1 Year RMA Warranty

Expandable

  • Scalable to 10 x 10/100/1000 copper gateways
  • Expandable to multiple 10GbE gateways
  • Fiber and/or Copper Connections
  • SMF or MMF Fiber

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

From Our Blog

  • Four cyber deception delusions diminished

    Successful adoption of cyber deception as an impactful security tool, and more than just another data generating detection solution, demands avoidance of these four common delusions. .

  • Remove botnets’ freedom to operate and manage botnet risk

    botnet riskThere are plenty of news articles claiming botnets and zombie computers are taking over the world.  While I do not necessarily agree with the allegation, I believe whole heartedly botnets are the driving force of all attacks. Botnet risk is at it’s all time high. By hook or by crook, the first goal for any attacker … Continue reading >>>

  • Vendor Risk – Times are a Changin’

    Vendor RiskVendor Risk is a relatively new anomaly. I sometimes wonder how we ever got through the 90’s. It seems like only a few years ago when vendors received a key, code, or swipe card to come through the front door of our buildings whenever they liked. We trusted them to do their job once inside. I … Continue reading >>>

  • Take password protection seriously and practice what you preach

    password protectionOver the past several weeks I have been practicing what I preach about password protection. I changed all my passwords to each of my online accounts to a unique password with a minimum of 20 random characters. I thought this would be a fairly simple thing to do. I decided on a common password manager, … Continue reading >>>