Network Traffic Analysis for the Enterprise
Enterprise Performance Analytics
Enterprise Cloud Analytics
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Change Agents Welcome
Get the Latest
Learn about the new features and capabilities included in our 7.5 release and Reveal(x) Winter 2019, from simplified detection drill-down to certificate-free SSL decryption.
After plunging into the network security market nearly two years ago, Extrahop's bookings have topped the $100 million mark, and now CEO Arif Kareem thinks the company is primed for the public market.
The Winter 2019 release of ExtraHop Reveal(x) network traffic analysis for the enterprise is here, and with it, the bar for inclusion in the increasingly critical NTA category has been raised once again.
The tech industry is a hype machine, from consumer devices to enterprise technology—and B2B security vendors are some of the worst offenders. Here's how ExtraHop is answering the call for authenticity in a world of hype.
All too often, bet-the-company decisions are made based on excitement and ambition. They confuse brashness for boldness. Last year ExtraHop bet hard on security, and here's why today I can proudly say we're winning.
Are you jaded by the overuse of Artificial Intelligence (AI) – with vendors instilling either fear or faith? In the cybersecurity domain, we see CISOs investing in Machine Learning (ML), but remaining justifiably skeptical of AI. Here's why.
Putting our customers first has always been a core value for ExtraHop, and now we're taking this conviction to the next level. Read on to meet Aron Digumarthi, our new VP of Customer Success!
Honeypots are a popular method of learning how attackers think so you can better defend your enterprise against them but they also pose a risk if deployed in production environments. Read the case study for a play-by-play of how Reveal(x) uses network traffic analysis to help security teams detect honeypots!
Incident Response teams are under the gun with new data breach reporting requirements thanks to regulations like GDPR. Hear from EMA Research about how to use network traffic analysis as a force multiplier for IR.
At re:Invent 2018, Amazon Web Services' annual user conference, AWS announced AWS Outposts—both its answer to Microsoft Azure Stack and its first entry into the enterprise data center. This post will tell you why Outposts is such a major step for AWS and its ability to win over enterprise customers.
What's the difference between TCP and HTTP? How do they both work, and how do they work together? Read the blog for definitions of both protocols as well as a breakdown of what makes them different.
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
How does Mitchell International maintain their place at the top of the automotive industry by delivering secure, high performance software for their Fortune 500 customers? Read the case study to learn why Mitchell relies on ExtraHop for NetOps and Security!
Watch ExtraHop CTO Jesse Rothstein's 10-minute interview with theCUBE at AWS re:Invent 2018 for the latest trends in security and IT analytics for the cloud, with specific examples of how ExtraHop Reveal(x) helps cloud security teams detect and respond to late-stage cyber attacks.
This year, Credit Suisse announced their inaugural Disruptive Technology Recognition Program, celebrating vendors that are driving IT innovation with disruptive approaches. ExtraHop is proud to announce our inclusion in this exciting new program.
In their 2018 study on managing risk and stopping insider or external attackers, the Ponemon Institute revealed some sobering statistics about the state of risk management today. Get the full scoop to help you evaluate and improve your 2019 security posture.
The last week of November 2018 was a busy week for data breaches, with several major consumer-facing organizations all reporting major security incidents. What can we learn from these disclosures, and why does one stand so far apart from the rest?
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.