Asset Management

Know every device.
Trust only what you verify.

PacketViper discovers OT devices passively, builds a complete inventory without scanning, and enforces trust relationships between assets – all from the network layer.

You can’t protect what you can’t see. And you can’t see it with active scanning.

0
OT protocols
discovered passively
0
CVE signatures in the
Virtual Agent engine
0
Agents installed on
protected devices
Passive
All discovery from observed
traffic, no scanning

Active scanning is the enemy of OT uptime.

Industrial control environments were never designed to tolerate network probes. A single scan packet arriving at the wrong time can trip a PLC mid-cycle, halt a production line, or crash a legacy controller that hasn’t been rebooted since it was commissioned. The devices running water treatment plants, power substations, and manufacturing floors don’t have the CPU headroom to process unexpected traffic – and they don’t fail gracefully when they’re overwhelmed.

Traditional asset management tools make this worse by requiring software agents installed directly on endpoints. In OT environments, that means voiding manufacturer warranties, introducing untested code onto safety-critical systems, and creating maintenance dependencies that operations teams never asked for. The result is that most industrial organizations either accept blind spots in their asset inventory or take on operational risk every time they try to close them. Neither option is acceptable when uptime is measured in lives and dollars per minute.

Passive discovery. Continuous inventory. Enforced trust.

Passive Asset Discovery

PacketViper observes all traffic crossing the bridge interfaces. When a device communicates using a known OT protocol, it’s automatically identified. No probes, no agents, no network footprint.

Virtual Agents

Software-defined protection proxies for every OT device. Protocol-aware parsing, CVE signature matching, anomaly detection, and access control – all without touching the protected device.

Trust Relationships

Define exactly which devices can talk to which assets. Traffic from unauthorized sources gets blocked, not just logged. Enforcement happens inline at wire speed.

Complete OT asset lifecycle, one platform.

42+ Protocol Support

Modbus, DNP3, S7comm, EtherNet/IP, BACnet, OPC-UA, IEC 61850, PROFINET, MQTT, and more. Protocol-aware parsing at the command and register level.

CVE Signature Engine

290+ vulnerability signatures covering Modbus, DNP3, S7comm, EtherNet/IP, and OPC-UA. Automatic updates from PacketViper cloud, or offline deployment for air-gapped environments.

Trust Map Visualization

Visual representation of all trust relationships between partners, asset groups, and protected assets. See who talks to what, and where unauthorized paths exist.

Incident Playbooks

Structured response procedures with safety guardrails, triage steps, and tiered containment actions built for OT environments where wrong action is worse than slow action.

Discovery Portal

Browser-based agentless fingerprinting. Create a campaign URL, share it, and devices that visit are automatically cataloged. No software install, works on any device with a browser.

SCADA Gateway Integration

Security telemetry surfaces in existing operator displays via Modbus TCP. OT operators see security status without learning a new tool.

See what your firewall never told you.

Book a live demo – we’ll show you your own assets, not a canned inventory.

How does PacketViper discover OT assets without scanning?

PacketViper operates as a transparent bridge and observes all traffic crossing its interfaces. When a device communicates using a known OT protocol (Modbus on port 502, DNP3 on port 20000, S7 on port 102, etc.), it is automatically identified and added to the discovery queue. No probe packets are sent. No network footprint is created.

What is a Virtual Agent?

A Virtual Agent is a software-defined security proxy that lives within PacketViper, representing everything known about a protected asset. Each Virtual Agent includes protocol-aware parsing, CVE signature matching (290+ signatures), anomaly detection, and access control enforcement – all without installing anything on the protected device.

What OT protocols does Asset Management support?

PacketViper supports 42+ OT protocols including Modbus/TCP, DNP3, EtherNet/IP, S7comm, BACnet, OPC-UA, Profinet, MQTT, IEC 61850, IEC 104, MELSEC, HART, and more. Each protocol is parsed at the command and register level for deep inspection.

What is the Trust Map?

The Trust Map is a visual representation of all authorized communication relationships between trusted partners, asset groups, and protected assets. It shows who is allowed to talk to what, where unauthorized paths exist, and how your trust relationships are structured across the network.

Can PacketViper protect devices that can’t be patched?

Yes. This is a core use case. Virtual Agents provide network-layer protection for devices that cannot accept patches, agents, or firmware updates – including legacy PLCs, RTUs, and controllers where vendor restrictions, certification requirements, or uptime constraints prevent direct modification.

What is the Discovery Portal?

The Discovery Portal provides agentless device fingerprinting via browser-based campaign URLs. Create a campaign, share the link or QR code, and any device that visits is automatically cataloged without installing software. Submissions land in a staging queue for review before being added to the asset inventory.