• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

    Try It for Free

    Reveal(x) 360

    Light up your AWS
    environment.

    No friction.
    No credit card required.

    AWS Partner Network Competency
    Start Free Trial
  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • XDR
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • U.S. Public Sector
    • Education
    • State and Local Government
    • Federal Civilian Agencies
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Hardware Policies
    Wizards of the Coast Logo

    Featured Customer Story

    Wizards of the Coast

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

Decryption Blog

  • All Posts
  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

6.9.22

2022 Edison Awards Honors Advancements in Strategic Decryption

Discover why ExtraHop strategic decryption features were recognized for innovation by the 2022 Edison Awards.

Kelsey Milligan

Read On

3.31.22

Detect and Stop Spring4Shell Exploitation

Get recommendations for how to detect Spring4Shell exploitation and learn how you can use ExtraHop to stop attacks that leverage this vulnerability.

Jeff Costlow

Read On

2.18.22

What You Need to Know about BlackByte Ransomware as a Service

BlackByte is the latest ransomware group making headlines. Learn their playbook and how you can build an effective defense strategy.

Jesse Munos

Read On

1.13.22

How Reveal(x) Accelerates OMB M-21-31 Maturity

Learn how wire data from network detection and response (NDR) helps accelerate M-21-31 compliance for federal agencies.

Tom Roeh

Read On

10.14.21

Detecting Attacks Using Microsoft Protocol Decryption

Microsoft Active Directory is a favorite target for attackers, and traditional threat detection techniques are falling short. Learn why and what you can do.

Jesse Munos

Read On

9.28.21

Detect Malware in Encrypted Traffic for Improved Security Visibility

Encryption gives attackers dark places to hide. Learn which common solutions for network visibility fall short, and which can accurately detect advanced threats.

Jesse Munos

Read On

9.14.21

Why Decryption Is Necessary for Security

Encryption is central to modern security architecture, but it also allows attackers to conceal their activity. Learn why secure decryption is also the key to effective cyberdefense.

Jesse Munos

Read On

9.13.21

What Are Supply Chain Attacks?

A quick-read executive summary on what supply chain attacks are and what you can do about them.

Kelsey Milligan

Read On

2.12.21

Behavior-Based Detection and Rule-Based Detection: Why Not Both?

Learn how ExtraHop Reveal(x) combines behavior-based detection and rule-based detection to provide a covert defense against advanced threats.

Chase Snyder

Read On

1.7.21

Free Learning Path: The Keys to Cryptography

We've unlocked our cryptography learning path, making it free and available to everyone. Learn the basics of encryption, decryption, secure connections, and how to interpret key security data.

Kurt Shubert

Read On

1.1.21

LDAP Encryption: What You Need to Know in 2021

Get the skinny on LDAP encryption, including whether LDAP traffic is encrypted automatically and how you can best secure traffic using this protocol.

Carol Caley

Read On

3.16.20

The Network Is Going Dark: TLS 1.3 and Security Operations Visibility

Like it or not, TLS 1.3 is coming and will make network traffic opaque to inspection. ExtraHop co-founder and CTO Jesse Rothstein shares his presentation on this topic given at RSA 2020.

Jesse Rothstein

Read On

10.30.19

Decryption Matters: Part 2

Why does decryption matter to security? Isn't telemetry enough? Our brave volunteers went on camera to show you why it's critical to know what's in the box.

Tiffany Lieu

Read On

10.11.19

Have Questions About Network Detection & Response?

Learn how NDR solutions complete Gartner's SOC Visibility Triad, plus key NDR product capabilities and essential questions to ask NDR vendors!

Dale Norris

Read On

10.8.19

Network Detection & Response (NDR) for NIST

Learn how to use the NIST Cybersecurity Framework, and how network detection and response (NDR) with ExtraHop Reveal(x) can help.

Chase Snyder

Read On

9.26.19

How Decryption Helped Beat the Nazis

Learn about one of the key infosec lessons from WWII: message content matters. Here's why.

Chase Snyder

Read On

9.11.19

NDR and the SOC Visibility Triad

Learn how network detection and response (NDR) completes the SOC Visibility Triad and complements EDR and SIEM tools.

Dale Norris

Read On

7.29.19

Why Are Enterprises Enabling TLS 1.3 Encryption?

If your enterprises is rushing to adopt TLS 1.3, read this infographic for the most important tips and cautions from Enterprise Management Association's latest research.

Chase Snyder

Read On

7.25.19

What's In the Box?!

Some people might think it's enough to know there IS a box—but in cyber security (as in hunting serial killers), it's important to know what's inside...

Tiffany Lieu

Read On

7.1.19

SANS Webinar - Network Detection & Response (NDR) Meets MITRE ATT&CK

A technical briefing on how network detection and response complements endpoint security and log analysis for achieving greater coverage of MITRE ATT&CK for Enterprise

Chase Snyder

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2022
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube