• slide


PacketViper is an active threat facing cybersecurity deception solution. PacketViper uses agentless, lightweight network-based deception earlier in the cyber kill chain, and at the perimeter to solve important cybersecurity problems and produces practical, real-world results, including dynamic network defense, relief of security operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper is unlike complex and incomplete deception solutions that don’t provide any value until the threat is on the network, can’t deceive threats during perimeter reconnaissance scans and contribute to alert overload without the ability to directly and easily take action.

“Lightweight deception” speaks to our agentless, software-based decoys and responses which are automated, dynamic, highly believable and NOT honeypots. “Heavyweight Results” speaks to the active nature of PacketViper’s high impact, practical problem-solving results that are way more than just amplified alerts and supports policy enforcement.


Blogs by PacketViper
Feb 3, 2020
Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought agai…
Dec 18, 2019
Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought agai…
Nov 21, 2019
Is your organization looking for a way to protect against a vendor-related breach? Do you want to enforce policies around how your vendors behave on your network? Read this blog to learn how. The post Vendor Risk Monitoring 360:  It’s Continuous and it’s …
Oct 25, 2019
This blog takes a look at crypto mining from a networking perspective. Fundamentally, crypto mining is a very long-lived TCP connection between a client and a server. The ports and protocol can vary, and the TCP communication can be encrypted. Discover ho…
Oct 1, 2019
Three unique use cases build a business case for deception technology as we mark the start of National Cyber Security Awareness Month (NCSAM). The post Build a Business Case for Deception Technology appeared first on PacketViper.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - May 1, 2025

State & Local Contracts

National Cooperative Purchasing Alliance (NCPA)

Term: through November 30, 2021

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

Pennsylvania COSTARS-3 IT Hardware Contract

Contract: COSTARS-003-451 Contract Period: Through July 18, 2021


Latest News

PacketViper, the cyber deception leader for automated threat detection, prevention and response, announced the general availability of Deception360® for Microsoft® Azure®. Deception360 for Azure ...
PacketViper, a leader in external and internal deception technology, and Deception360™ were recently included in the new report from Gartner, Improve Your Threat Detection Function With Deception ...
PacketViper, a leading provider of cybersecurity deception solutions, today announced version 5.0 of their active, threat facing deception platform. PacketViper 5.0 includes an updated user interface ...


Case Study

On Network, Real-Time Vendor Risk Management


The historical goal for deception technologies has primarily been detection. The value of deception solutions focused on amplified detection and higher fidelity alerts has been questionable in this era of alert fatigue. These technologies have an unappealing prerequisite - that the attacker is alrea...

Product Brief

Product Brief
Lightweight deception. Heavyweight results.


Vendor ecosystems are evolving at a dynamic rate. Each supplier granted network access is, in effect, a trusted partner; one that your business will rely on to strengthen your cyber defense posture.


Deception is a commonly used strategy in warfare deployed with the intent of causing one’s enemy to make mistakes. Deception is an active and proactive defense measure that can make one stronger than is actually the case based on available resources. Time continues to demonstrate that reactive cyb...

The static nature of common firewall-based network configurations has made it increasingly easy to scan, attack and breach a network. Leveraging their advantages of time and anonymity, attackers repeatedly and continuously conduct reconnaissance and NMAP scans to determine vulnerabilities and formul...