ExtraHop Reveal(x): NTA for the Enterprise
The ExtraHop Performance Platform
The ExtraHop Cloud Platform
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Chase writes about data center analytics, health IT, virtualization, and big data for ExtraHop. So 1337.
What is cross-site scripting (XSS), and how can you best protect your network? Read the blog for definitions, examples, and strategies.
Watch this 5-minute video to see how ExtraHop Reveal(x) network traffic analysis makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
The MITRE ATT&CK Framework gives security teams a way to evaluate threat detection tools against real-world adversary tactics, techniques, and procedures (TTPs). Learn how network traffic analysis tools like Reveal(x) detect more TTPs, faster, than other security solutions.
ExtraHop answers five of Gartner's recommended questions that CISOs should ask before adopting AI or, more accurately, machine learning.
Learn how the latest release of ExtraHop Reveal(x), network traffic analysis for the enterprise, accelerates security investigations, incorporates MITRE & OWASP links, and more!
Watch this recorded ISC2 Security Briefing to learn how SecOps frameworks enable the proactive SOC. (CISSPs, earn a CPE credit while you're at it!)
Watch the recorded ISC2 Security Briefing to learn how a small, agile security team built a proactive security operations practice using network traffic analysis. (CISSP certificate holders, watch to earn one CPE credit!)
Network Traffic Analysis (NTA) vs. SIEM: What are the key differences, and how can these two types of security solution work together for a proactive, cost-effective, and scalable SOC? Dive into our blog series for the answers.
Dive into our blog series comparing network traffic analysis products to traditional security solutions with this bakeoff between NTA and Intrusion Prevention Systems (IPS).
Watch this 3-minute video to learn how ExtraHop Reveal(x) uses network traffic analysis to help you quickly and easily audit your network for expired certifications, weak ciphers, and more.
Are you interested in the benefits of network traffic analysis but want to understand exactly how network detection and response solutions compare to the enterprise security technology you already know? This blog series will give you the answers in detail. Let's start by comparing network traffic analysis to intrusion detection systems.
Learn why the latest release of ExtraHop Reveal(x), network traffic analysis for the enterprise, has once again raised the bar for inclusion in the increasingly critical category of security solutions based on network detection and response.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Why is decryption crucial for SecOps analysis, especially for the growing enterprise security category of Network Traffic Analysis (NTA)? Watch the video or read the deep dive blog to learn about specific attack behaviors that cannot be detected without full decryption capabilities.
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
Get to know the latest about DDoS attacks by learning about attack types, mitigation strategies, and how to protect your website.
Get the top three takeaways from the 2018 SANS Security Operations Center Survey, and learn how to improve your SOC efficiency based on advice from the experts!
With Black Hat right around the corner, we're running an InfoSec quiz game via our Twitter. Learn more about how you can win cool prizes; no need to be attending Black Hat to participate!
Learn about Network Traffic Analysis (an emerging category of cybersecurity product for threat detection and response) including Gartner's definition and the benefits of network traffic analysis for security operations, especially in the enterprise.
Learn about the new features and capabilities of Reveal(x) Summer 2018, the network traffic analyzer that helps SecOps teams act with confidence and resolve threats faster than any other security analytics solution.
See the difference between what ExtraHop Reveal(x) network traffic analysis (NTA) sees and what Darktrace sees—or doesn't see—during a brute force attack and sensitive database compromise.
How can your SOC resolve security issues up to 77% faster than anyone else? Check out the visual comparison of automated investigation vs. a multi-tool workflow to find out!
In part two of this info-packed blog series on how increased encryption is reshaping enterprise security, learn how SecOps can decrypt and analyze encrypted information safely and effectively.
Learn about the serious consequences increasingly encrypted network data has for SecOps teams that rely on analytics—and why most network security vendors aren't helping—in this first blog in a two-part series.
From the truth about machine learning to how scary encryption can be, here are the top 3 takeaways from RSA 2018!
Next gen security programs will be measured by dwell time more than any other metric. Here's why.
Most networks are incredibly easy to breach. The NSA doesn't need zero-day exploits, they've said so themselves. So what do they need? Turns out, not much...
We just added a slick new capability to our anti-ransomware utility belt, courtesy of Wire Data Wizard John Smith.
How one CIO gets a reliable snapshot of his entire IT environment and a sense of comfort from knowing everything that's happening in real time.
View our webinar on ransomware prevention, detection, and recovery.
Listen in on a great conversation between virtualization legends Brian Madden and John Smith.
How one children's hospital CIO gets a reliable snapshot of his entire IT environment from a single monitoring platform.
Survey results from 113 IT directors and professionals on how they use Big Data, and whether the value lives up to the hype.
How ExtraHop helped Veterans Affairs keep paying people on time after a software failure had them manually entering paycards every Friday.
BrightTalk sought out ExtraHop co-founder Raja Mukerji for an interview at Infosecurity Europe 2016 last week, and they covered a lot of ground.
One mobile service provider's fleet management division replaced a mishmash of 20 troubleshooting tools with a single platform: ExtraHop.
How microservices and containerized applications put a tax on application performance monitoring, and how to avoid paying it.
Expert in vCloud? Pushing vRealize Log Insight & vRealize Orchestrator to the limit? Got a visibility gap? We want to meet you at a VMUG
An NSA honcho spoke out about how to stop the NSA from breaching your network. Here's what he said.
Join us for a wildly speculative jaunt into the Big Data behind the Big Game.
Listen in on a great conversation between IT thought leaders Eric Kavanagh, Mark Madsen, and Erik Giesa as they discuss the power of stream analytics.
Learn how wire data has become the linchpin of successful big data analytics at Phoenix Children's Hospital.
Required reading now that the new ICD-10 medical coding standard is required across the U.S.
Take a minute and a half to learn what wire data is, and why it is the linchpin of successful IT operations analytics (ITOA).
Learn what FHIR is, how it relates to the HL7 protocol, and standards you should know about this new way of exchanging healthcare information electronically.
Citrix administrators can take their days back and stop troubleshooting other teams' problems with John Smith's advice.
"What started as a back-end IT tool is helping turn the IT department into a profit center for the company." That's how service-level engineer Todd Williams of MEDHOST describes ExtraHop in a recent…
Since the early days of the Internet, site owners and admins have craved deeper, more meaningful insight into user experience. Knowing what happens when someone visits your site is strategically…