Quick Connect Hardware Suitable for Any Environment

PacketViper sits inline at key transition points throughout the network. Licenses are deployed in one of three models: on-premise, cloud/AWS and bring your own hardware (BYOH). For the on-premise client, we offer hardware with options for multi-gateway, enterprise connectivity, full redundancy and fail through capability. We scaled our hardware products to fit any size business and budget, from the fully redundant enterprise model PV-310 down to the small form factor desktop model PV-50.

Not sure which option is best for you?  Simply contact one of our representatives at the contact us page and we can talk through your options based on your connection details and business needs.

PacketViper Hardware Options

PV-50

Default Configuration

  • Desktop Model/Wall Mount
  • Dimensions: 7.75 x 7.75 x 2.75
  • 2.4GHz 8-Core 4M L3 Cache Processor
  • 4GB 1600MHz Memory
  • 4 x 10/100/1000 copper NIC
  • 60GB SSD
  • 60W External Power Adapter
  • IPMI Port
  • 1 Year RMA Warranty

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

PV-100

Default Configuration

  • 1U Rack Mount Design
  • 2.9GHz Dual-Core 3M L3 Cache Processor
  • 4GB 1333MHz Memory
  • 2 x 10/100/1000 Bypass NIC
  • 2 x 10/100/1000 Standard NIC
  • 500GB 7.2K SATA HDD
  • 1 x 260W Power Supply
  • 1 Year RMA Warranty

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

PV310

PV-310

Default Configuration

  • 2U Rack Mount Design
  • 3.2 GHz Quad-Core 8M L3 Cache Processor
  • 8GB 1333MHz Memory
  • 4 x 10/100/1000 Bypass NIC
  • 2 x 10/100/1000 Standard NIC
  • Supports dual gateways
  • 2 300GB 15K SAS Hot-Swap, Hardware RAID
  • 2 x 700W Hot Swappable Redundant Power
  • 1 Year RMA Warranty

Expandable

  • Scalable to 10 x 10/100/1000 copper gateways
  • Expandable to multiple 10GbE gateways
  • Fiber and/or Copper Connections
  • SMF or MMF Fiber

Licensing

  • No Connection Limits
  • No User Limits
  • No Bandwidth Limits

From Our Blog

  • Vendor Risk – Times are a Changin’

    Vendor RiskVendor Risk is a relatively new anomaly. I sometimes wonder how we ever got through the 90’s. It seems like only a few years ago when vendors received a key, code, or swipe card to come through the front door of our buildings whenever they liked. We trusted them to do their job once inside. I … Continue reading >>>

  • Take password protection seriously and practice what you preach

    password protectionOver the past several weeks I have been practicing what I preach about password protection. I changed all my passwords to each of my online accounts to a unique password with a minimum of 20 random characters. I thought this would be a fairly simple thing to do. I decided on a common password manager, … Continue reading >>>

  • FOR SALE:  A much smaller cybersecurity haystack

    Cybersecurity HaystacksIt’s budget season. For enterprise cybersecurity teams that means getting ready to ask for more. In most cases, not enough, but definitely more budget to find the needles in the haystacks. And most likely, more of the same stuff you already have. Far too many cybersecurity leaders are going to ask their executive teams for drastically … Continue reading >>>

  • It’s time to take a different approach to utilizing threat intelligence

    network defenseThreat Intelligence has gotten a lot of attention in the last few years. What is it? Who understands it? Is it actionable?  Plus think about the substantial investment for security organizations to create such a perishable good and then actually using it to protect a network can be complicated. Don’t forget the numerous reports about … Continue reading >>>