Automated and Integrated Intelligence

PacketViper customers repeatedly deceive threats to harvest, identify and apply new intelligence.  Sources for threat intelligence are everywhere but applying it can be challenging.  Actionable threat intelligence is just not enough.  PacketViper makes threat intelligence easy to operationalize.

More than actionable, it’s applied intelligence

New intelligence harvested through decoys is easily operationalized and applied in an automated, ongoing manner to consistently keep updating defense in real time.  Harvest new intelligence based on how threats are interacting with decoys on, and at the edge of your network, while easily integrating it into their perimeter defense strategies.

Addressing the Challenges

Threat intelligence is everywhere but is frequently challenging to apply and not integrated well with defense solutions. Quality concerns also are a problem with many third-party intelligence providers. PacketViper overcomes common challenges to make the intelligence harvested through deception, as well as third-party intelligence, an asset that strengthens the overall cybersecurity defense posture.

  • High quality intelligence from multiple sources
  • Extremely low false positives
  • Unique intelligence based on real-time network activity
  • Integration with perimeter defense.

From Our Blog

  • Build a Business Case for Deception Technology

    NCSAM 2019Three unique use cases build a business case for deception technology as we mark the start of National Cyber Security Awareness Month (NCSAM).

  • NIST gets down with Deception

    A lot of CISOs look to the National Institute of Standards and Technology (NIST) and ISO for third-party validation of appropriate security controls and security program approaches. In this blog, read how NIST recommends Deception for protecting critical programs and high-value assets.

  • Deception Gets Screen Time at Gartner Security Risk and Management Summit 2019

    Don Gray recaps the Gartner® Security and Risk Management Summit 2019 commenting on three key points: deception prominently referenced in the keynote presentation, 7 imperatives of CARTA, and DevSecOps.

  • What is Internal and External Cyber Deception Technology?

    Internal and external cyber deception technology together is not your traditional approach to deception, nor to security in general. Since the days of honeypots, cybersecurity experts have utilized deception as a way to protect the network interior. Threat detection at the network perimeter, on the other hand, has seemingly been the role of firewalls. Read More...

  • Deception at the cyber “front line”

    Cyber Deception Front LineWhatever you call the front, the ability to stop the enemy where you first face them is vital. A paired approach of deception both externally and internally represents a tremendous opportunity to reduce attack vectors and strengthen overall cyber defense.

  • Announcing PacketViper at RSAC Early Stage Expo

    RSAC Early Stage ExpoBe our guest at RSAC 2019. Register with our special code to gain entrance to the RSAC Expo arena. Visit the large halls at the Moscone but also come visit us at the Early Stage Expo in the Marriott just down the street from the conference.

  • Four cyber deception delusions diminished

    Successful adoption of cyber deception as an impactful security tool, and more than just another data generating detection solution, demands avoidance of these four common delusions. .

  • Remove botnets’ freedom to operate and manage botnet risk

    botnet riskThere are plenty of news articles claiming botnets and zombie computers are taking over the world.  While I do not necessarily agree with the allegation, I believe whole heartedly botnets are the driving force of all attacks. Botnet risk is at it’s all time high. By hook or by crook, the first goal for any attacker … Continue reading >>>