ExtraHop Blog

Tips, tricks, and peeks behind the scenes.

Blog Categories:

ExtraHop's latest solution bundle allows you to quickly identify potential threats and initiate targeted investigations.

What is SMBv1 and why should you shut it down before it can be used against you?

More analytics leaders recognize the need for wire data to provide unbiased and definitive data to fill the gaps left by logs.

At the season finale of AFCEA Washington DC Chapter's Monthly Breakfast Program, the message was clear: the most advanced threats are operating under the surface.

Learn how to secure your systems against new ransomware like Petya and SOREBRECT.

New ransomware campaign utilizes the EternalBlue exploit to infect systems across the globe.

Supercharge Your Cisco Tetration Security Policy Enforcement with ExtraHop's Real-Time Analytics

Heard of the 5 stages of grief? Learn how security pros cope with breaches.

A trigger is a powerful tool that expands the insights you can get from your wire data. Here are some recommendations for planning, scripting, and assessing your triggers for maximum value.

What if a new technique came along that not only performed better, but was easier for people to do? ExtraHop is the new technique IT folks need to know about.

We sat down with our new Senior Vice President of Sales to learn more about his background in technology sales, his leadership style, and what made ExtraHop so attractive to this industry veteran.

The public cloud is a natural place to perform machine learning and deep analytics, but your IT data is on-premises. What's needed to bridge the gap securely?

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.