Category: ExtraHop Analysis

The Four Data Sets Essential for IT Operations Analytics (ITOA)

February 19, 2015 | By Erik Giesa | Add a Comment

[This is the second post in a four-part series. Read the first post: The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data] In my previous article, I explained that IT Operations Analytics (ITOA) borrows from Big Data principles and that, in order to enable effective insights and data-driven decisions, you must first design [...]

0

Continue Reading

FTP Dashboard: Detect and Mitigate FTP Data Leaks

February 5, 2015 | By Steve Smith | Add a Comment

My name is Steve Smith, and I recently joined ExtraHop as an engineer on the technical marketing team. After spending a week playing with the ExtraHop platform, I decided it was time to take the training wheels off. From past experience, I was interested in the depth the ExtraHop platform could provide in tracking rogue [...]

0

Continue Reading

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

February 5, 2015 | By Erik Giesa | Add a Comment

Gartner estimates that by 2017, approximately 15% of enterprises will actively use ITOA (IT Operations Analytics) technologies to provide insight into both business execution and IT operations, up from fewer than 5% today.[1] What’s driving this growth, and what do you need to know now in order to make sense of ITOA? Over the next [...]

0

Continue Reading

Community: The Icing on Your ExtraHop & Why I’m Here

December 17, 2014 | By Colin Walker | 8 Comments

Some days I just frackin’ love what I do. Taking a figurative hammer to the metaphorical tough nut in the form of a complex problem and cracking that baby wide open is just plain fun. Getting to use wickedly cool technology to do so is just icing on the cake. Tasty, decadent icing. Whether it’s [...]

0

Continue Reading

Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP

December 8, 2014 | By Chris Abella | Add a Comment

Visibility gets you many things: high-performing applications, faster remediation and, perhaps most importantly, peace of mind. That’s why we’re super excited to show off our recently announced partnership with the FireEye Threat Analytics Platform (TAP). Taking advantage of the ExtraHop Open Data Stream, we combine industry-leading security expertise from FireEye with the ExtraHop platform’s unprecedented [...]

0

Continue Reading

Detect and Track HTTP-based C&C Traffic for Backoff Malware

December 3, 2014 | By Mitchell Schwartz | Add a Comment

Roughly 1,000 retail companies have been impacted by the Backoff point-of-sale malware with costs related to data breaches totaling more than $150 million, according to a recent eWEEK article. If your organization relies on point-of-sale terminals, the best approach is to assume that your systems are already compromised and to look for malicious activity within [...]

0

Continue Reading

The Big Data Opportunity for Healthcare with HL7 Analytics

November 5, 2014 | By Tyson Supasatit | Add a Comment

If there’s any industry that stands to benefit from IT-enabled insights, it’s healthcare. However, traditional methods of analyzing healthcare operations data are costly, rigid, and complex. Clinical and operations data must first be logged in applications such as Cerner, Epic, PeopleSoft, LabMed, and Allscripts, and then cleansed and fit into a standard data model. When [...]

0

Continue Reading

Neuter the POODLE: Detect All SSLv3 Clients and Servers with ExtraHop

October 15, 2014 | By Tyson Supasatit | Add a Comment

Following on the heels of the Heartbleed and Shellshock exploits, the new POODLE vulnerability in SSL version 3.0 (SSLv3) is the latest to require IT teams to identify and patch vulnerable systems. Published by Google’s security team today (Tuesday, October 14), the POODLE vulnerability targets a version of SSL that is 15 years old but still [...]

0

Continue Reading

Monitor Shellshock Attempts with ExtraHop

September 27, 2014 | By Ryan Corder | Add a Comment

On Wednesday, NIST released information about a vulnerability in the GNU Bash shell that enables remote attackers to execute arbitrary code on the target system. For details, I recommend this excellent post from Troy Hunt: Everything you need to know about the Shellshock Bash Bug. One of the especially worrisome aspects of this vulnerability is [...]

0

Continue Reading

IT Is Drowning in Data, But Thirsty for Insight

September 12, 2014 | By Tyson Supasatit | Add a Comment

Water, water, every where, Nor any drop to drink. – The Rime of the Ancient Mariner IT teams have plenty of data. What they lack is visibility and insight. Over the past several weeks, ExtraHop has introduced two new capabilities that help IT organizations extract more value out of the data that they already have. [...]

0

Continue Reading