Automated and Integrated Intelligence

PacketViper customers repeatedly deceive threats to harvest, identify and apply new intelligence.  Sources for threat intelligence are everywhere but applying it can be challenging.  Actionable threat intelligence is just not enough.  PacketViper makes threat intelligence easy to operationalize.

More than actionable, it’s applied intelligence

New intelligence harvested through decoys is easily operationalized and applied in an automated, ongoing manner to consistently keep updating defense in real time.  Harvest new intelligence based on how threats are interacting with decoys on, and at the edge of your network, while easily integrating it into their perimeter defense strategies.

Addressing the Challenges

Threat intelligence is everywhere but is frequently challenging to apply and not integrated well with defense solutions. Quality concerns also are a problem with many third-party intelligence providers. PacketViper overcomes common challenges to make the intelligence harvested through deception, as well as third-party intelligence, an asset that strengthens the overall cybersecurity defense posture.

  • High quality intelligence from multiple sources
  • Extremely low false positives
  • Unique intelligence based on real-time network activity
  • Integration with perimeter defense.

From Our Blog

  • Case Study: Water authority cyber-physical defense

    A water authority conducted Red Team exercises simulating a physical breach whereby the team gained access to the network via a physical connection at a control panel at two of the unmanaged locations. The result was a success with PacketViper protecting the critical operations network, blocking the attacker’s ability to further penetrate the network while alerting operators of the attack.

  • PacketViper Named to Carahsoft Contract to Support U.S. Army Cybersecurity

    PacketViper today announced that it has been named a manufacturer on the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for the U.S. Army Computer CHESS. This contract is held by Carahsoft Technology Corp.

  • A Compensating Control for the Vanishing Air Gap

    Operational technology (OT) networks are becoming more connected to IT environments. As such, the once dependable ‘air gap’ protection between IT and OT no longer exists. This creates cyber risk that can result in substantial financial losses, the disruption of essential services, and possibly affect national security and public welfare. For organizations relying on OT, … Continue reading >>>

  • Download PacketViper’s Ransomware Use Case for OT and IT

    Ransomware Image for PacketViper Use Case to Harden OT Security Without Risking DowntimeRansomware is on the rise and the increasing convergence of information technology (IT) and operational technology (OT) networks creates new pathways for attackers into coveted OT environments. As connected OT networks become more accessible to threat actors of all motivations, security teams need to look at more pragmatic ways to harden OT security without the … Continue reading >>>

  • Transform Threat Hunting

    into proactive threat huntingHow can you transform threat hunting? Consider this home security scenario: Imagine you have a choice of two home security systems: The first one only alerts you about intruders after they have broken into your house. The second one works when the threat is on your front lawn and keeps it away. Which do you … Continue reading >>>

  • Bit-and-piece DDoS threats are on the rise

    Fight DDoS Attacks with Packetviper Deception360Distributed denial of service (DDoS) attacks are on the rise. According to the Nexusguard Q2 2020 Threat Report, overall DDoS attacks increased by 515% year over year. And ‘bit-and-piece’ style attacks were up 570% compared to the same period last year. So how can you deceive bit-and-piece DDoS threats? This is a challenge, especially now, … Continue reading >>>

  • 3 Steps to Close the Proxy Loophole on Malicious Nation-State Attackers

      Heightened geopolitical tensions led to a recent warning from CISA on strengthening cyber defenses in anticipation of increased nation-state cyber attacks.  While we know the specific nation-states we are most concerned with, targeting defenses against them is tricky. Attackers have abundant resources to wage dynamic, persistent attacks. Unfortunately, common cyber defense solutions are typically … Continue reading >>>

  • Mitigate EDoS Attacks: Creeping Normality and the Boiling Frog Fable

    Everyday Denial of Service (D0S)Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought against and defeated.