How It Works
Why Decryption Matters
Integrations and Automations
Complimentary Shields Up Assessment
AWS Cloud Security
What is Network Detection & Response (NDR)?
Reveal(x) Enterprise: Self-Managed NDR
No friction.No credit card required.
With the power of machine learning, gain the insight you need to solve pressing challenges.
Stand up to threats with real-time detection and fast response.
Learn More >
Gain complete visibility for cloud, multi-cloud, or hybrid environments.
Share information, boost collaboration without sacrificing security.
Align with and implement CISA's cybersecurity guidance
Get Additional Shields Up Guidance >
Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.
Featured Customer Story
Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data
See All Customer Stories >
Our partners help extend the upper hand to more teams, across more platforms.
Featured Integration Partner
* Detect network attacks.
* Correlate threat intelligence and forensics.
* Auto-contain impacted endpoints.
* Inventory unmanaged devices and IoT.
See All Integration Partners >
Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.
Cloud-native visibility, detection, and response for the hybrid enterprise.
Customer resources, training,case studies, and more.
Partner resources and information about our channel and technology partners.
See what sets ExtraHop apart, from our innovative approach to our corporate culture.
Get the latest news and information.
We believe in what we're doing. Are you ready to join us?
Find white papers, reports, datasheets, and more by exploring our full resource archive.
Kirsten is a technical writer and content wonk at ExtraHop. If she's not around the office, you might find her rowing on Lake Union, watching soccer, or visiting one of the many splendid craft breweries around the Pacific Northwest.
Kerberos authentication protocol can be exploited in golden ticket attacks. Learn how adversaries pull off these attacks and how to detect and prevent them.
Learn from ExtraHop how ICMP tunneling attacks work and what you can do to protect against them. Examples included.
DCSync is an attack technique used to get user credentials. ExtraHop explains how it works and how to protect against DCSync.
Ransomware can cause irreparable damage. Learn how it works and how to detect it to stop attacks.
PsExec is a Windows Sysinternals utility that enables IT administrators to run commands and executable binary files on remote servers, but it can also be used for stealthy lateral movement.
Learn how DNS tunneling attacks work and what you can do to protect against them. Examples included!
Learn how SQL injection attacks work and what you can do to protect against them. Examples included!
Learn how to quickly identify recent and past device connections on a live activity map in ExtraHop.
Learn how to use group filters for ExtraHop live activity maps to quickly answer complex, multi-part questions about your network.
Learn more about one of our platform's most powerful tools and start uncovering hidden infrastructure issues in a matter of clicks.