Overview

PacketViper is an active threat facing cybersecurity deception solution. PacketViper uses agentless, lightweight network-based deception earlier in the cyber kill chain, and at the perimeter to solve important cybersecurity problems and produces practical, real-world results, including dynamic network defense, relief of security operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper is unlike complex and incomplete deception solutions that don’t provide any value until the threat is on the network, can’t deceive threats during perimeter reconnaissance scans and contribute to alert overload without the ability to directly and easily take action.

“Lightweight deception” speaks to our agentless, software-based decoys and responses which are automated, dynamic, highly believable and NOT honeypots. “Heavyweight Results” speaks to the active nature of PacketViper’s high impact, practical problem-solving results that are way more than just amplified alerts and supports policy enforcement.

Blogs

Blogs by PacketViper
Nov 21, 2019
Is your organization looking for a way to protect against a vendor-related breach? Do you want to enforce policies around how your vendors behave on your network? Read this blog to learn how. The post Vendor Risk Monitoring 360:  It’s Continuous and it’s …
Oct 25, 2019
This blog takes a look at crypto mining from a networking perspective. Fundamentally, crypto mining is a very long-lived TCP connection between a client and a server. The ports and protocol can vary, and the TCP communication can be encrypted. Discover ho…
Oct 1, 2019
Three unique use cases build a business case for deception technology as we mark the start of National Cyber Security Awareness Month (NCSAM). The post Build a Business Case for Deception Technology appeared first on PacketViper.
Jul 31, 2019
A lot of CISOs look to the National Institute of Standards and Technology (NIST) and ISO for third-party validation of appropriate security controls and security program approaches. In this blog, read how NIST recommends Deception for protecting critical …
Jun 25, 2019
Don Gray recaps the Gartner® Security and Risk Management Summit 2019 commenting on three key points: deception prominently referenced in the keynote presentation, 7 imperatives of CARTA, and DevSecOps. The post Deception Gets Screen Time at Gartner Secur…

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

National Cooperative Purchasing Alliance (NCPA)

Term: through November 30, 2021

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

Pennsylvania COSTARS-3 IT Hardware Contract

Contract: COSTARS-003-451 Contract Period: Through July 18, 2019


News

Latest News

PacketViper, a leader in external and internal deception technology, and Deception360™ were recently included in the new report from Gartner, Improve Your Threat Detection Function With Deception ...
READ MORE >
PacketViper, a leading provider of cybersecurity deception solutions, today announced version 5.0 of their active, threat facing deception platform. PacketViper 5.0 includes an updated user interface ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Case Study

On Network, Real-Time Vendor Risk Management

Datasheet

The historical goal for deception technologies has primarily been detection. The value of deception solutions focused on amplified detection and higher fidelity alerts has been questionable in this era of alert fatigue. These technologies have an unappealing prerequisite - that the attacker is alrea...

Product Brief

PV-Logo-Horizontal-dark.png
Product Brief
Lightweight deception. Heavyweight results.

Resources

Vendor ecosystems are evolving at a dynamic rate. Each supplier granted network access is, in effect, a trusted partner; one that your business will rely on to strengthen your cyber defense posture.

Whitepaper

Deception is a commonly used strategy in warfare deployed with the intent of causing one’s enemy to make mistakes. Deception is an active and proactive defense measure that can make one stronger than is actually the case based on available resources. Time continues to demonstrate that reactive cyb...

The static nature of common firewall-based network configurations has made it increasingly easy to scan, attack and breach a network. Leveraging their advantages of time and anonymity, attackers repeatedly and continuously conduct reconnaissance and NMAP scans to determine vulnerabilities and formul...