• The Platform

    ExtraHop Reveal(x)

    Cloud-native visibility, detection, and
    response for the hybrid enterprise.

    Reveal(x) 360

    SaaS-based network detection
    and response.

    Learn More

    How It Works

    Reveal(x) Enterprise

    Self-managed network detection
    and response.

    Learn More

    How It Works

  • For Security

    For Security

    Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

    Use Cases

    • Threat Detection and Response
    • Secure Decryption
    • Enterprise IoT Security
    • Secure Remote Access & Availability
    • Hygiene and Compliance
    • SecOps and NetOps Integration
    • See All Use Cases

    Security Resources

    • 2020 Gartner Market Guide for Network Detection and Response
    • 2020 SANS Network Visibility and Threat Detection Survey
    • Beginners' Guide to Network Detection and Response

    See All Resources

    Enterprise-Ready Integrations

    Crowdstrike Logo

    Detect network threats and automatically quarantine impacted devices.

    Read More...

    See All Integrations

    Featured Customer Story

    Ulta Beauty Logo

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    See All Customer Stories

  • For Cloud

    For Cloud

    Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

    Use Cases

    • Security for AWS
    • Security for Azure
    • Security for Google Cloud
    • Hybrid Security
    • Secure Remote Access & Availability
    • Shared Responsibility Assurance
    • See All Use Cases

    Cloud Resources

    • Using MITRE ATT&CK In Cloud and Hybrid Environments
    • Multi-Cloud Security: Removing Friction from the Development Process

    See All Resources

    Enterprise-Ready Integrations

    Amazon Web Services Logo

    Unified cloud security and monitoring with AWS and ExtraHop.

    Read More...

    See All Integrations

    Featured Customer Story

    Wizards of the Coast Logo

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More...

    See All Customer Stories

  • For IT Ops

    For IT Ops

    Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

    Use Cases

    • Secure Remote Access & Availability
    • SecOps and NetOps Integration
    • Triage and Troubleshooting
    • Customer Experience Monitoring
    • Commercial Application Visibility
    • Monitoring Virtualization and SDN
    • See All Use Cases

    IT Ops Resources

    • 451: Digital Experiences Are Front and Center In Coping with Coronavirus
    • Office Shutdown: Securing an Increased Remote Workforce

    See All Resources

    Enterprise-Ready Integrations

    ServiceNow Logo

    Know and do more, faster. ExtraHop + ServiceNow makes IT service management even more seamless.

    Read More...

    See All Integrations

    Featured Customer Story

    The Home Depot Logo

    The Home Depot Builds Unified Customer Experience with Visibility from ExtraHop

    Read More...

    See All Customer Stories

  • More
    • Blog
    • Customers
    • Partners
    • Resources
    • About Us

    How to Hunt for, Detect, and Respond to SUNBURST

    The SUNBURST backdoor, disclosed on December 13th, is a supply-chain attack …

    Read More...

    All Blog Posts

    Security Alert: Detecting CVE-2020-1472 Zerologon Exploitation with NDR

    The recent Zerologon vulnerability (CVE-2020-1472) could allow attackers to get …

    Read More...

    • Support
    • Support Overview
    • Documentation
    • Hardware Policies
    • Services
    • Services Overview
    • ExtraHop Reveal(x) Advisor
    • Deployment
    • Training
    • Training Overview
    • Training Sessions
    • Community
    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Partners

    • Partner Portal Login
    • Channel Partner Program
    • Find a Technology Partner
    • Become a Partner

    Resources

    • Customer Stories
    • Remote Access Resource Hub
    • All Resources
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Network Attack Library
    • Protocol Library
    • Documentation
    • Firmware
    • Training Videos
    • About ExtraHop
    • About Us
    • The ExtraHop Difference
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Careers
    • Careers Overview
    • Search Openings
    • News
    • Newsroom
    • Press Releases
    • ExtraHop in the News
    • Engage with Us
    • Contact Us
    • Upcoming Webinars and Events
    • Take the Live Demo

    Network Detection and Response (NDR) Vs. Extended Detection & Response (XDR)

    Get some clarity on the alphabet soup of security vendor acronyms by reading …

    Read More...

    Ulta Beauty

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    Crowdstrike

    Detect network threats and automatically quarantine impacted devices. Inventory devices not yet protected by endpoint security.

    Read More...

    2020 Gartner Market Guide for Network Detection and Response

    ExtraHop is a representative vendor two years running. Learn why.

    Read More...

    Newsroom

    Get the latest news and information about ExtraHop, including press releases and third-party coverage.

    Read More...

X button
Login
Logout
Start Demo

The Platform

For Security

For Cloud

For IT Ops

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop Reveal(x)

Cloud-native visibility, detection, and
response for the hybrid enterprise.

Reveal(x) 360

SaaS-based network detection
and response.

Learn More

How It Workscaret-right

Reveal(x) Enterprise

Self-managed network detection
and response.

Learn More

How It Workscaret-right

caret-left Back

For Security

Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

Learn More

Threat Detection and Response

Secure Decryption

Enterprise IoT Security

Secure Remote Access & Availability

Hygiene and Compliance

SecOps and NetOps Integration

caret-left Back

For Cloud

Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

Learn More

Security for AWS

Security for Azure

Security for Google Cloud

Hybrid Security

Secure Remote Access & Availability

Shared Responsibility Assurance

caret-left Back

For IT Ops

Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

Learn More

Secure Remote Access & Availability

SecOps and NetOps Integration

Triage and Troubleshooting

Customer Experience Monitoring

Commercial Application Visibility

Monitoring Virtualization and SDN

caret-left Back

Customers

Partners

Resources

About Us

Blogcaret-right

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Visit Customer Portal

Support

Professional Services

Training

Solution Bundles Gallery

Community Forums

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Visit Partner Portal

Channel Partner Program

Find a Technology Partner

Become a Partner

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Network Attack Library

Protocol Library

Documentation

Firmware

Training Videos

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Difference

What Is Cloud-Native?

Careers

Newsroom

Upcoming Webinars and Events

Blog | Analysis

  • All Posts
  • Security
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

11.11.18

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

Learn the basics of ITOA and operational analytics, including why it works and how it helps grow your profits.

Erik Giesa

Read On

4.22.16

TCP Analysis: Where the Network Meets the Application, Part 2

Learn how you can analyze and visualize TCP metrics (such as Zero Windows, aborts and throttling) to gain full visibility of your applications.

Eric Thomas

Read On

5.4.15

Real-User Monitoring's Next Frontier: Context, Context, Context!

Data derived from traditional RUM solutions lacks context. ExtraHop merges RUM metrics from Boomerang.js with wire data insights for more relevant results.

Chase Snyder

Read On

4.27.15

Guide to Building Stellar ExtraHop Dashboards, Part II: Chart Types

Learn how to choose the right chart types to surface the most valuable data in your ExtraHop Dashboards.

Nojan Moshiri

Read On

4.22.15

Step-by-Step Guide: HL7 Analytics with ExtraHop

Interested in extracting valuable insight from your HL7 data in real time? Check out our step by step guide to using and customizing ExtraHop's HL7 analytics.

Terry Shaver

Read On

4.17.15

Outranging HTTP.sys Range-Based Attacks, Trigger Style

Collect metrics to see who is scanning your systems for HTTP.sys range-based attacks, which systems are scanned, and overall HTTP request rates.

Colin Walker

Read On

4.9.15

ExtraHop Top5: April 8, 2015

Nojan provides a practical methodology for creating well-designed and useful ExtraHop dashboards to visualize your wire data.

Colin Walker

Read On

3.3.15

Healthcare's Y2K: The Dreaded ICD-10 Conversion

ExtraHop gives you the visibility needed to ensure you're in good shape for the impending ICD-10 conversion. Don't wonder if you're compliant. Know you are!

Terry Shaver

Read On

2.19.15

The Four Data Sets Essential for IT Operations Analytics (ITOA)

Learn about wire, machine, agent, and synthetic data, the four data sets that are essential for any ITOA practice.

Erik Giesa

Read On

2.5.15

FTP Dashboard: Detect and Mitigate FTP Data Leaks

If a malicious user set up an FTP server and sent sensitive data outside, would you know? We show you how sysadmins can understand real-time FTP traffic.

Ken Pickles

Read On

12.17.14

Community: The Icing on Your ExtraHop & Why I'm Here

Sr. Technical Marketing Engineer Colin Walker explains why he joined ExtraHop and his vision for a wire data analytics community.

Colin Walker

Read On

12.8.14

Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP

This scenario shows how the ExtraHop-FireEye integration enables you to track the attack from the initial compromise to the final data exfiltration.

Chris Abella

Read On

12.3.14

Detect and Track HTTP-based C&C Traffic for Backoff Malware

The ExtraHop solution for detecting Backoff malware can be implemented in minutes, requires no agents, and will not affect production systems.

Mitchell Schwartz

Read On

11.5.14

The Big Data Opportunity for Healthcare with HL7 Analytics

By analyzing HL7 transactions on the wire, healthcare organizations can gain insight into a wealth of clinical and operations data.

Tyson Supasatit

Read On

10.15.14

Neuter the POODLE: Detect All SSLv3 Clients and Servers with ExtraHop

Looking for an easy way to identify systems using SSL version 3.0 (SSLv3)? The free ExtraHop Discovery Edition makes the process extremely simple!

Tyson Supasatit

Read On

9.27.14

Monitor Shellshock Attempts with ExtraHop

The Shellshock Over HTTP bundle works with the ExtraHop Enterprise Edition and the free ExtraHop Discovery Edition that you can download.

Ryan Corder

Read On

9.12.14

IT Is Drowning in Data, But Thirsty for Insight

IT teams have plenty of data. What they lack is visibility and insight. What the IT monitoring industry needs is a data liberation front.

Tyson Supasatit

Read On

9.3.14

Why IT Needs a Culture of Healthy Paranoia

To stop advanced persistent threats, IT needs to suspect users inside the perimeter, even if they are approved accounts using approved ports and private keys.

Tyson Supasatit

Read On

8.1.14

See Who's Using (or Abusing) Your Network

When troubleshooting network issues, you need to not only see which users and applications are using the network, but also how efficiently they are using it.

Anna Brown

Read On

6.23.14

ExtraHop ♥ Visio Stencils

Are you an IT architect or network engineer who is tired of out-of-date diagrams? Now you can start your diagrams with Activity Maps exported to Visio.

Jon Garrison

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • Reveal(x) Enterprise

Security

  • Threat Detection and Response
  • Secure Decryption
  • Enterprise IoT Security
  • Secure Remote Access & Availability
  • Hygiene and Compliance
  • SecOps and NetOps Integration

Cloud

  • Security for AWS
  • Security for Azure
  • Security for Google Cloud
  • Hybrid Security
  • Secure Remote Access & Availability
  • Shared Responsibility Assurance

IT Ops

  • Secure Remote Access & Availability
  • SecOps and NetOps Integration
  • Triage and Troubleshooting
  • Customer Experience Monitoring
  • Commercial Application Visibility
  • Monitoring Virtualization and SDN

More

  • Blog
  • Customers
  • Partners
  • Resources
  • About Us
  • Careers
  • Newsroom
  • Contact Us
  • Copyright ExtraHop Networks 2021
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube