• slide

Overview

PacketViper is an active threat facing cybersecurity deception solution. PacketViper uses agentless, lightweight network-based deception earlier in the cyber kill chain, and at the perimeter to solve important cybersecurity problems and produces practical, real-world results, including dynamic network defense, relief of security operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper is unlike complex and incomplete deception solutions that don’t provide any value until the threat is on the network, can’t deceive threats during perimeter reconnaissance scans and contribute to alert overload without the ability to directly and easily take action.

“Lightweight deception” speaks to our agentless, software-based decoys and responses which are automated, dynamic, highly believable and NOT honeypots. “Heavyweight Results” speaks to the active nature of PacketViper’s high impact, practical problem-solving results that are way more than just amplified alerts and supports policy enforcement.

Blogs

Blogs by PacketViper
Sep 29, 2020
Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought agai…
Feb 3, 2020
Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought agai…
Dec 18, 2019
Much like the boiling frog fable, this change to our networks has happened very gradually to the point where we just accept it as normal. It's time for a paradigm shift. It’s time for EDoS to take its place next to DDoS and DoS as things to be fought agai…
Nov 21, 2019
Is your organization looking for a way to protect against a vendor-related breach? Do you want to enforce policies around how your vendors behave on your network? Read this blog to learn how. The post Vendor Risk Monitoring 360:  It’s Continuous and it’s …
Oct 25, 2019
This blog takes a look at crypto mining from a networking perspective. Fundamentally, crypto mining is a very long-lived TCP connection between a client and a server. The ports and protocol can vary, and the TCP communication can be encrypted. Discover ho…

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

News

Latest News

PacketViper, the cyber deception leader for automated threat detection, prevention and response, announced the general availability of Deception360® for Microsoft® Azure®. Deception360 for Azure ...
READ MORE >
PacketViper, a leader in external and internal deception technology, and Deception360™ were recently included in the new report from Gartner, Improve Your Threat Detection Function With Deception ...
READ MORE >
PacketViper, a leading provider of cybersecurity deception solutions, today announced version 5.0 of their active, threat facing deception platform. PacketViper 5.0 includes an updated user interface ...
READ MORE >

Resources

Case Study

On Network, Real-Time Vendor Risk Management

Datasheet

The historical goal for deception technologies has primarily been detection. The value of deception solutions focused on amplified detection and higher fidelity alerts has been questionable in this era of alert fatigue. These technologies have an unappealing prerequisite - that the attacker is alrea...

Product Brief

PV-Logo-Horizontal-dark.png
Product Brief
Lightweight deception. Heavyweight results.

Resources

Vendor ecosystems are evolving at a dynamic rate. Each supplier granted network access is, in effect, a trusted partner; one that your business will rely on to strengthen your cyber defense posture.

Whitepaper

Deception is a commonly used strategy in warfare deployed with the intent of causing one’s enemy to make mistakes. Deception is an active and proactive defense measure that can make one stronger than is actually the case based on available resources. Time continues to demonstrate that reactive cyb...

The static nature of common firewall-based network configurations has made it increasingly easy to scan, attack and breach a network. Leveraging their advantages of time and anonymity, attackers repeatedly and continuously conduct reconnaissance and NMAP scans to determine vulnerabilities and formul...