Category: ExtraHop Blog

The Four Data Sets Essential for IT Operations Analytics (ITOA)

February 19, 2015 | By Erik Giesa | Add a Comment

[This is the second post in a four-part series. Read the first post: The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data] In my previous article, I explained that IT Operations Analytics (ITOA) borrows from Big Data principles and that, in order to enable effective insights and data-driven decisions, you must first design [...]

0

Continue Reading

FTP Dashboard: Detect and Mitigate FTP Data Leaks

February 5, 2015 | By Steve Smith | Add a Comment

My name is Steve Smith, and I recently joined ExtraHop as an engineer on the technical marketing team. After spending a week playing with the ExtraHop platform, I decided it was time to take the training wheels off. From past experience, I was interested in the depth the ExtraHop platform could provide in tracking rogue [...]

0

Continue Reading

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

February 5, 2015 | By Erik Giesa | Add a Comment

Gartner estimates that by 2017, approximately 15% of enterprises will actively use ITOA (IT Operations Analytics) technologies to provide insight into both business execution and IT operations, up from fewer than 5% today.[1] What’s driving this growth, and what do you need to know now in order to make sense of ITOA? Over the next [...]

0

Continue Reading

ExtraHop Is the Proud Home of the Binary 12th Man!

January 12, 2015 | By Tyson Supasatit | Add a Comment

The 00001100th Man is ExtraHop’s geeky salute to a beloved Seahawks tradition. It’s our way of showing our love for the amazing Seattle technology community that is cheering for the Seahawks alongside us. Want to join ExtraHop’s Legion of Geek? We’re looking for exceptional people who love technology, appreciate elegant solutions to hard problems, and [...]

0

Continue Reading

Turla Trojan Tactics Trounced

January 7, 2015 | By Colin Walker | Add a Comment

About a month or so back, just before the holiday stretch set in for many of us here in North America, Ars Technica put out an article depicting a new vector for Turla, namely a “Powerful, highly stealthy Linux trojan” that “may have infected victims for years.” I don’t know about you, but to me [...]

0

Continue Reading

Community: The Icing on Your ExtraHop & Why I’m Here

December 17, 2014 | By Colin Walker | 8 Comments

Some days I just frackin’ love what I do. Taking a figurative hammer to the metaphorical tough nut in the form of a complex problem and cracking that baby wide open is just plain fun. Getting to use wickedly cool technology to do so is just icing on the cake. Tasty, decadent icing. Whether it’s [...]

0

Continue Reading

Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP

December 8, 2014 | By Chris Abella | Add a Comment

Visibility gets you many things: high-performing applications, faster remediation and, perhaps most importantly, peace of mind. That’s why we’re super excited to show off our recently announced partnership with the FireEye Threat Analytics Platform (TAP). Taking advantage of the ExtraHop Open Data Stream, we combine industry-leading security expertise from FireEye with the ExtraHop platform’s unprecedented [...]

0

Continue Reading

Detect and Track HTTP-based C&C Traffic for Backoff Malware

December 3, 2014 | By Mitchell Schwartz | Add a Comment

Roughly 1,000 retail companies have been impacted by the Backoff point-of-sale malware with costs related to data breaches totaling more than $150 million, according to a recent eWEEK article. If your organization relies on point-of-sale terminals, the best approach is to assume that your systems are already compromised and to look for malicious activity within [...]

0

Continue Reading

The Big Data Opportunity for Healthcare with HL7 Analytics

November 5, 2014 | By Tyson Supasatit | Add a Comment

If there’s any industry that stands to benefit from IT-enabled insights, it’s healthcare. However, traditional methods of analyzing healthcare operations data are costly, rigid, and complex. Clinical and operations data must first be logged in applications such as Cerner, Epic, PeopleSoft, LabMed, and Allscripts, and then cleansed and fit into a standard data model. When [...]

0

Continue Reading

Programming by Voice: Staying Productive without Harming Yourself

October 20, 2014 | By Tony Grosinger | Add a Comment

One of the reasons I love working at ExtraHop is the lack of meetings and abundance of uninterrupted development time. However, I quickly found after starting that I was unaccustomed to coding for such long periods. A few weeks after I started at ExtraHop, I began to develop discomfort in my wrists and forearms. I [...]

0

Continue Reading