Technical Specifications
FVDR Sensor Platform
Purpose-built hardware for continuous packet capture and forensic validation
Core Capabilities
Continuous PCAP
100% packet capture with no sampling or filtering
Forensic Validation
Patented technology for court-admissible evidence
Real-Time Analysis
Stream processing with sub-second threat detection
Sensor Models
Entry Level
FVDR-SM
Throughput:1 Gbps
Storage:8 TB
Retention:30 days
Ports:4x 1GbE
Form Factor:1U Rackmount
Ideal For:
- •Small offices
- •Branch locations
- •SMB deployments
Technical Specs:
- CPU: Intel Xeon E-2288G
- RAM: 32 GB ECC DDR4
- Capture: Hardware timestamping
- Storage: RAID 10
Mid-Range
FVDR-MD
Throughput:10 Gbps
Storage:48 TB
Retention:60 days
Ports:2x 10GbE + 8x 1GbE
Form Factor:2U Rackmount
Ideal For:
- •Medium enterprises
- •Data centers
- •Regional offices
Technical Specs:
- CPU: Dual Intel Xeon Gold 6248R
- RAM: 128 GB ECC DDR4
- Capture: FPGA acceleration
- Storage: RAID 60
Enterprise
FVDR-LG
Throughput:40 Gbps
Storage:192 TB
Retention:90+ days
Ports:4x 40GbE + 8x 10GbE
Form Factor:4U Rackmount
Ideal For:
- •Large enterprises
- •Core networks
- •Service providers
Technical Specs:
- CPU: Dual Intel Xeon Platinum 8380
- RAM: 512 GB ECC DDR4
- Capture: Dedicated ASIC
- Storage: RAID 60 + Hot Spare
Technical Requirements
Network TAP Requirements
- ✓Passive optical TAPs for fiber networks
- ✓Active TAPs with link fault propagation
- ✓Zero packet loss guarantee
- ✓Out-of-band management
Power & Environmental
- ✓Redundant power supplies (N+1)
- ✓Operating temp: 10°C to 35°C
- ✓Humidity: 20% to 80% non-condensing
- ✓NEBS Level 3 compliant options
Security Features
- ✓Hardware root of trust
- ✓Encrypted storage at rest
- ✓Secure boot verification
- ✓FIPS 140-2 Level 2 validated
Performance Metrics
- ✓Line-rate packet capture
- ✓< 1μs timestamp accuracy
- ✓Zero packet reordering
- ✓Real-time compression
SmartPCAP™ Technology
Intelligent packet capture that maintains 100% visibility while optimizing storage
Always Captured
- •All packet headers (Layer 2-4)
- •Complete TCP handshakes
- •DNS queries and responses
- •Authentication attempts
- •Suspicious or anomalous traffic
Intelligently Filtered
- •Redundant encrypted payloads
- •Known benign streaming content
- •Duplicate retransmissions
- •Large file transfers (after sampling)
- •Whitelisted backup traffic
Deployment Options
On-Premises
Deploy sensors in your data center with full control over data
Hybrid Cloud
Local capture with cloud-based analysis and storage
Managed Service
Fully managed FVDR with 24/7 monitoring by Vigilant SOC