Network Detection & Response
Detection & Response for AWS
Application & Network Performance
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Secure your hybrid attack surface with complete visibility, real-time detection, and intelligent response.
Manage risk and drive growth in AWS with an agile, cloud-native approach to cybersecurity.
Ensure the availability and performance of your enterprise from the cloud, to the data center, to the customer.
Take control of SDN, the cloud, and more with complete visibility, real-time detection, and intelligent response.
Learn about the innovative ways our customers are succeeding with ExtraHop, plus the latest news from R&D.
Explore the Panorama Partner Program, meet our channel partners, or search for a technology partner.
Compare support packages, check out our Professional Services offerings, or log into the Customer Portal.
Watch free training videos and courses, or schedule a visit from an ExtraHop expert for specialized training.
Matt Schurr is a software engineer at ExtraHop focusing on improving real-time analysis capabilities for security and IT operations professionals.
After detecting and investigating a fake Postman Chrome Extension using Reveal(x) network traffic analysis, one question remained: how much damage could a more sophisticated attacker do? I made my own Chrome malware to find out. Here's what I learned.
What happens when you find a data leak in your own environment using your own network traffic analysis product? You investigate, of course, and record the whole process. Read on to learn how I used Reveal(x) to catch the fake Postman Chrome extension red-handed, complete with screenshots of the hunt.