Tech

Keeping up on the latest ExtraHop geekery.

Blog Categories:

How ExtraHop is setting the bar again for enterprise analytics scalability with its unique analysis-first architecture, enabling 1 PB+/day of real-time analysis.

As a CIO, I'm aware that the cloud is helping redefine what's possible. But we all know what happens when fools rush in.

How to use TCP_NODELAY, Nagle's Algorithm, QUICKACK, and more settings and algorithms to get better TCP performance on your network.

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.

Real-time network analytics with ExtraHop can detect Russian cyber attacks in real time. Find out how it works.

The best way to detect Memcrashed DDoS attacks early is through real-time network monitoring. Learn how from the leaders in real-time security analytics.

New methods prove it's possible to steal data using only SSL/TLS handshakes. Here's how you can stop it.

Answering all of your questions about TCP windowing including what it is, scaling issues, congestion, and more. Updated for 2018!

Christine Shaw started her life at ExtraHop after graduating from Rice University in Houston, Texas. After a short stint as a summer intern, Christine joined ExtraHop full-time as a Solutions Engineer.

Metcalfe's Law explains the exponential impact of network effects. For IT, this can be a curse and blessing. This lightboard video teaches how this concept can affect your IT strategy.

The reality in today's data driven IT landscape is that we all want to know basically everything. All the time. Not only do we want to see it all, we want to see it now.

For one fast-growing software company, complete visibility across multiple tiers, helped stop the finger-pointing and quickly find the root cause of the issue. Hint: It wasn't the network.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.