• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

    Try It for Free

    Reveal(x) 360

    Light up your AWS
    environment.

    No friction.
    No credit card required.

    AWS Partner Network Competency
    Start Free Trial
  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • Shields Up
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • U.S. Public Sector
    • Education
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Hardware Policies
    Wizards of the Coast Logo

    Featured Customer Story

    Wizards of the Coast

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks How the Spring4Shell Zero-Day Vulnerability Works Detect Log4j Attacks Hiding in Encrypted Traffic

ExtraHop Blog

Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks

  • Mark Bowling
  • March 14, 2022

How the Spring4Shell Zero-Day Vulnerability Works

  • Edward Wu
  • Updated July 11, 2022

Detect Log4j Attacks Hiding in Encrypted Traffic

  • Jeff Costlow
  • December 17, 2021

How the Spring4Shell Zero-Day Vulnerability Works


Detect Log4j Attacks Hiding in Encrypted Traffic


Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks

  • All Posts
  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

8.4.22

Software Supply Chain Attack vs. Supply Chain Vulnerability: What's The Difference?

What's the difference between an attack and a vulnerability? Not all software supply chain security issues are the same. Learn more.

Chase Snyder

Read On

8.2.22

What Is a Cloud Workload Protection Platform (CWPP)?

Learn how enhancing your cloud workload protection platform (CWPP) with NDR increases the visibility needed to mitigate advanced cloud threats.

Dale Norris

Read On

7.29.22

ExtraHop July TL;DR

Get up to date on some interesting stories from the past month.

Paul Ditty

Read On

7.28.22

Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage

This blog outlines how network detection and response (NDR) and endpoint detection and response (EDR) complement each other's capabilities to provide broad, deep coverage of the MITRE ATT&CK Framework.

Chase Snyder

Read On

7.20.22

Our New VP of Product & Technical Marketing Explains His Customer-First Approach

Meet Pete Lavache, VP of Product & Technical Marketing at ExtraHop, to learn his take on innovation, execution, and how today's companies should approach marketing.

ExtraHop

Read On

7.7.22

Meet Rafal Los, Head of Services GTM at ExtraHop

Rafal Los explains why he decided to join ExtraHop and discusses the factors that create security solutions with a lasting impact.

Rafal Los

Read On

6.30.22

How Attackers are Leveraging the Log4j Vulnerability Six Months Later

Discover what ExtraHop data tells us about how attackers are leveraging the Log4j vulnerability six months after it was first disclosed.

Jamie Moles

Read On

6.30.22

ExtraHop June TL;DR

Get up to date on some interesting stories from the past month.

Paul Ditty

Read On

6.21.22

Gain PCAP and Forensics in Google Cloud

Friction traditionally associated with PCAP in the cloud slows incident response and makes forensics difficult. Discover how Reveal(x) 360 Ultra for Google Cloud solves the PCAP problem.

Dale Norris

Read On

6.16.22

What's New in 8.9 and Reveal(x)

Read a preview of our most exciting new features, then check the release notes for a comprehensive view of our 8.9 release updates.

Jeena Khan

Read On

6.13.22

Meet the ExtraHop Team Members Honored as 2022 CRN Women of the Channel

ExtraHop is honored to have so many talented and inspirational women who share their drive and passion. Learn more about their achievements in the channel.

Paul Ditty

Read On

6.9.22

2022 Edison Awards Honors Advancements in Strategic Decryption

Discover why ExtraHop strategic decryption features were recognized for innovation by the 2022 Edison Awards.

Kelsey Milligan

Read On

6.2.22

Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities

Learn the top five undersecured software supply chain attack vectors, and how to gain the visibility you need to reduce supply chain risk.

Chase Snyder

Read On

5.27.22

ExtraHop May TL;DR

Get up to date on some interesting stories from the past month.

Paul Ditty

Read On

5.27.22

New Complimentary Gartner® Report: How to Respond to the 2022 Cyberthreat Landscape

A new Gartner Report, How to Respond to the 2022 Cyberthreat Landscape offers guidance for CISOs looking to clearly communicate risk to executive leadership. Read ExtraHop's take on security as a business strategy.

Rachel Pepple

Read On

5.22.22

Bodycams and Firewalls: The Internet is Watching, Are You?

A city discovered that sensitive data was exposed to the internet. Learn how they used ExtraHop Reveal(x) to investigate the problem and avoid becoming a target.

Cal Jewell

Read On

5.20.22

Why Conventional Wisdom Hasn't Stopped or Even Slowed Ransomware

The trends show that modern ransomware tactics have changed, leaving IT in the crosshairs—but by knowing the attacker's playbook, IT teams can regain the advantage.

Don Shin

Read On

5.19.22

Assessing Network Analysis and Visibility Solutions For Zero Trust

Network visibility is a necessity for zero-trust security, but there is more than one way to collect and analyze network data. An October 2021 Forrester report helps organizations assess the value of visibility solutions.

Kelsey Milligan

Read On

5.12.22

What Pragmatism Among Asia-Pacific Security Leaders Means for Cyber Risk

IT leaders in Australia, Japan, and Singapore report more caution than confidence when it comes to defending against cyberthreats. Learn more.

Ashley Stewart

Read On

5.4.22

SANS SOC Survey Trends Over the Past Four Years

ExtraHop analyzes security operations center (SOC) trends and challenges that surfaced in SANS SOC Survey results over four years.

Kelsey Milligan

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2022
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube