Packet Viper
Try It Now!

Subscribe to our blog!

Post by Category

0 Comments

Is Your IoT Cyber Defense Plan Really a Plan To Fail?

Mar 6, 2017

Category: DDoS, Defense, Bots, Firewall, IoT, malware, mirai, Cyber Attacks, Krebs

Much concern and effort today revolves around protecting networks from the the awesome power of a large scale DDoS attack like Mirai.  While the spreading of bots can be done in many forms, a good majority are spread by a simple scan to a network range, a response, then a password attempt. This is true for WAN’s and LAN’s and gets to the core of the effectiveness of Mirai.  Mirai was so simple ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

100% of Friday's DDoS Victims Have This in Common...

Friday’s massively disruptive DDoS attack was a sobering reminder that we've entered a new era of DDoS threats.  These threats require a new approach to perimeter defense. None of Friday's victims had PacketViper.  None of PacketViper's clients have been hit with DDoS.

View Post
1 Comment

"Hackers For Hire"

The term “hackers” dates back to the 1960s at MIT.  “Hacker” is used to describe extremely skilled individuals that practiced hardcore programming in FORTRAN and other older languages (HelpNet Security). In today’s society, when someone speaks of a “hacker”, we automatically assume that the person was trying to do something illegal and perform a major scam or breach into a network. The term ...

View Post
0 Comments

Perimeter Security Myths Busted: Infographic

DDoS attacks are becoming more prevalent and attackers are getting better at bombarding you with traffic that appears legitimate.  Low and slow attacks harass your network and set the stage for exfiltration.  Sound defense depends on rapid response and a strong perimeter.  A better way of defending yourself begins by rethinking the perimeter.  Check out our infographic to better understand how ...

View Post
0 Comments

Stop Cyber Attacks by Adding More In-Depth Defense

Dec 10, 2015

Category: Defense, Advanced-Ip, Security, Advanced-Ip Layer

Protecting your network against cyber attacks is one of the most important tasks your IT team has. You can never have too much defense against potential threats, right? While it’s true that security is essential, your methods of defense can also be a double edged sword. How? Let’s take a look.

View Post