ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

New in RevealX – From Blind Spots to Breakthroughs: Fulfilling on the Vision of the Modern SOC.

Share blog icon

Back to top

Back to top

November 5, 2025

New in RevealX – From Blind Spots to Breakthroughs: Fulfilling on the Vision of the Modern SOC.

One of the biggest challenges enterprises face is seeing and understanding what’s happening across their complex, encrypted, and hybrid networks.

Our latest release helps customers by exposing threat actors who move laterally without being detected, impersonate authorized users to gain access, and exploit privileges to target more critical assets.

With these new features, ExtraHop gives SOC teams unprecedented visibility across SASE, lateral movement, and identity attacks.

Zscaler Integration for Expanded Zero Trust Visibility

Together, Zscaler and ExtraHop are providing end-to-end visibility into communication that traverses the Zscaler cloud and beyond. By correlating Zscaler Private Access (ZPA) logs with network telemetry from ExtraHop, SOC teams get a complete view of events for faster response.

Zscaler Log Streaming Service (LSS) forwards ZPA user activity logs into ExtraHop RevealX packet sensors, automatically enriching ExtraHop detections to deliver end-to-end L2-L7 visibility for all user-to-application communication. ExtraHop creates records that can be stored for analysis for up to 365 days.

This expanded visibility provides security teams with a holistic understanding of threat context and user attributes, allowing them to quickly triage and respond to attacks. While ZPA offers secure, zero trust network access, RevealX NDR enables deeper visibility and accelerated investigation. By analyzing traffic patterns and behavioral insights from RevealX, security teams can also create more granular and effective Zscaler policies and ensure policies are working as intended.

Enhanced Visibility into Lateral Movement

We’ve also enhanced our ability to detect adversaries utilizing living off the land binaries and scripts (LOLBAS) techniques like PowerShell to move laterally across environments. These latest capabilities improve command line arguments analyses used for Powershell over MS-RPC and WSMAN protocols.

Leveraging ExtraHop’s unique decryption and protocol decode capabilities, customers can detect malicious activity from threat actors who try to evade detection by misusing legitimate tools. Too many security controls lack awareness of the contents of these communications (either because they lack the ability to decode the protocols used, or cannot decrypt encrypted communications, or both) and as result ignore PowerShell activity.

Visibility into Anomalous Privileged User Activity

Privileged or influential users, such as admins and executives, are often the first ones targeted by threat actors due to their extensive access to sensitive data and systems. We’ve added the ability to automatically raise detections involving privileged or influential users to a higher priority level, ensuring SOC analysts can quickly investigate and triage the most critical identity-driven threats.

Easier Analysis in Record Search

Now you can do a records search and “group by” for up to three fields, then export to a table so you can add it to your report, investigation, etc. Also, we’ve increased the max number of records returned from 50, up to 1000. This will make it much easier to analyze multiple records to find what you’re looking for during your investigations.

Current customers can always reach out to their account managers for personalized walk-throughs of the latest release, check out release notes for more granular details, or join the customer community to discuss with peers.

Get a demo today to discover how these new capabilities can transform your network and security operations.

blog image

ExtraHop is on a mission to arm security teams to confront active threats and stop breaches. Our RevealX™ 360 platform, powered by cloud-scale AI, covertly decrypts and analyzes all cloud and network traffic in real time to eliminate blind spots and detect threats that other tools miss. Sophisticated machine learning models are applied to petabytes of telemetry collected continuously, helping ExtraHop customers to identify suspicious behavior and secure over 15 million IT assets, 2 million POS systems, and 50 million patient records. ExtraHop is a market share leader in network detection and response with 30 recent industry awards including Forbes AI 50, Cybercrime Ransomware 25, and SC Media Security Innovator.

Learn more at our About Us page.

Share
LinkedIn logoX logoFacebook logo

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo