GNL Dashboard: Threat Intelligence Sources

GNL Dashboard: Threat Intelligence Sources

PacketViper comes with its own unique set of threat intelligence sources.  Threat Intelligence requires a combination of people, process, and technology that integrate which deliver less false positives and stronger security.  Our Threat Intelligence is collected in several forms:



    • Crowd Sourced

    • Web Sourced

    • Sole Sourced 

    • Self Sourced


Crowd Sourced - PacketViper has secured partnerships in the efforts to exchange Threat Intelligence. When receiving this intelligence, we put it through a rigorous process of vetting and verification before it makes it our customers.

Web Sourced  - Hundreds of PacketViper processes scour the internet for data sources, which are then collected for analysis, viability, and verification against our Sole Sourced intelligence. 

Sole Sourced - PacketViper has built a purpose built sensor array using proprietary techniques to collect new and emerging threat sources. Our sensor array is never standing still providing it to gain better perspectives of threat sources. We have taken great care designing this array to provide the highest quality of intelligence.

Self Sourced - PacketViper provides the ability to build your own intelligence based on the network activity at your network perimeter in real-time. Using techniques like our Virtual Minefields (VMZ), you can build threat intelligence based on your network perimeter. By far one of our most unique PacketViper capability.

Enabling Threat Intelligence Lists

 




    • Related Articles

    • PacketViper Admin Guide - Version 5.9

      The v5 Admin Guide contains how-to information on configuration and policy creation scenarios as well as usage details to customize your PacketViper solution. Published: June, 2023
    • Custom Rules: Purpose of Interception Rules

      Within the Custom Rules, you can create rules that intercept specific types of connections. In addition craft a custom message for the source which matches the custom rules. In order for the interception to function properly, an IP address must be ...
    • Creating a Grouping for High Risk Network Ports

      PacketViper can create Network Port Groupings to apply to Countries, Global Network Lists, Custom Rules, and triggers.  Below is a list of well-known malicious ports you may want to consider creating a grouping. While you could simply block these ...
    • Some Common High-Risk Ports

      In PacketViper we will often use deception and dynamic perimeter technology to trap, observe, alert, and respond to certain patterns of traffic.  One of the most invaluable tools in that sort of pattern analysis is the target or destination port that ...