Learn, share, and grow with us.

Blog Categories:

Take your average IT department from good to great without adding a heap of resources.

In his RSA Conference session, Ad Hoc Threat Intelligence, ExtraHop Solutions Architect John Smith describes the tools you need to engage in close-quarters combat with malware.

Last week, the White House issued an executive order restricting immigration from seven Muslim-majority countries and suspending all refugee admissions into the United States. We as an organization do not agree with this policy.

The ability to monitor Simple Mail Transfer Protocol (SMTP) performance is more powerful than you think.

As the value of IT data as a business driver continues to gain hold, wire data is poised to be the next transformative source of insight for the enterprise.

After finishing my first week at ExtraHop, it's clear there's something special going on here.

Don't get trapped in your old workflow.

Edge, IE, Chrome, and Firefox plan to stop supporting the SHA-1 algorithm. ExtraHop lets you easily see what applications in your environment use that hash function.

As many countries embrace IT innovation in healthcare, improving patient care should remain the universal goal.

If a tree falls in the woods and no one hears, does it make a sound? If a hacker steals from your database and there are no logs, did they steal data? If a table is dropped from the database, how does…

ExtraHop's Open Data Stream technology provides precision transaction streaming, which means you can correlate the wire data collected from your ExtraHop with machine data from other sources. Wanna get started?

ExtraHop enables IT teams to detect ransomware behaviors inside your perimeter. Users can do their part simply by not clicking on links from unknown sources.

Join ExtraHop!

Lots of data? Check. Cutting-edge analytics? Check. Endless opportunities to geek out? Check check.

Go to Careers