• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • Shields Up
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • U.S. Public Sector
    • Education
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Hardware Policies
    Wizards of the Coast Logo

    Featured Customer Story

    Wizards of the Coast

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    Detect network attacks. Correlate threat intelligence and forensics. Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

Good Reads Blog

  • All Posts
  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

12.14.20

Designing a Color System: Intuitive UX and Happy Developers

Learn how the ExtraHop UX team redesigned our color system.

Creighton Chamberlain

Read On

12.20.19

ExtraHop Website Migration Part 4: Deep Cleaning

In the 4th installment of our website migration series, learn about the process of cleaning up years' worth of old and confusing file templates before we could move forward.

Zoltan Talaber

Read On

12.16.19

ExtraHop Website Migration Part 3: The Great Stall

Learn about the process of choosing a new website platform (Hugo) and which pitfalls—expected and unexpected—caused the migration project to stall.

Zach Balter

Read On

3.21.19

ExtraHop Website Migration Part 2: Backup Arrives

If you're in charge of a marketing website or just curious about the development process, learn from our pitfalls and successes as we document the migration of our website to a different tool. In this post, Zoltan is hired on to join Zach in web production and discusses the problems with the site he encounters.

Zoltan Talaber

Read On

3.15.19

ExtraHop Website Migration Part 1: The State of the Site

If you're in charge of a marketing website or just curious about the development process, learn from our pitfalls and successes as we document the migration of our website to a different tool. In this post, I'll describe our existing toolset and how it came together—and then I'll tell you why it no longer works.

Zach Balter

Read On

8.25.16

Backup on the Wire: Recover Ransomware-Encrypted Files from Packet Capture

Instead of ransoming your encrypted files, recover the originals from a packet capture.

Kanen Clement

Read On

8.11.16

The Human Impact of Hyperscale IT Failure

How do you reap the benefits of hyperscale IT while minimizing the risk of complex system failures that hurt your business, and, worst of all, hurt your customers?

Isaac Roybal

Read On

7.13.16

How to Automatically Detect and Block Ransomware

Cybercriminals upped their game, so we are upping ours (and yours.) Learn how to detect and stop ransomware automatically.

Tom Roeh

Read On

5.11.16

For Ransomware Detection, Behavior Beats Signatures

We use four detection methods to provide early warning so IT teams can stop ransomware attacks in progress before the damage is done. The methods are...

Tom Roeh

Read On

5.9.16

Stream Processing vs. Continuous PCAP: The Big Shift in Monitoring Architectures

Enterprise IT monitoring is undergoing a major shift, and stream processing architectures are going to come out on top.

Raja Mukerji

Read On

4.25.16

What Is LDAP, and Who Needs It Anyway?

Get an up-to-date definition of LDAP and quickly understand the impact - both positive and potentially negative - this protocol brings to an organization.

Colin Walker

Read On

4.22.16

TCP Analysis: Where the Network Meets the Application, Part 2

Learn how you can analyze and visualize TCP metrics (such as Zero Windows, aborts and throttling) to gain full visibility of your applications.

Eric Thomas

Read On

4.22.16

TCP Analysis: Where the Network Meets the Application, Part 2

Learn how you can analyze and visualize TCP metrics (such as Zero Windows, aborts and throttling) to gain full visibility of your applications.

Eric Thomas

Read On

4.11.16

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

Learn the basics of ITOA and operational analytics, including why it works and how it helps grow your profits.

Erik Giesa

Read On

10.20.15

Build Custom Metrics for Any Application

How to turn raw data from any application into useful metrics with Javascript-based application inspection triggers for improved IT operations analytics.

John McGovern

Read On

10.1.15

Happy ICD-10 Day! Here's Some Required Reading for a Smooth Switch

Required reading now that the new ICD-10 medical coding standard is required across the U.S.

Chase Snyder

Read On

9.24.15

New Community Forums are Live!

Ever hear the saying "many hands make light work"? How about "Two heads are better than one"? Well how about hundreds or even thousands of heads? A community of users can do together what no single user could, and they can do it faster, better, and easier. Check out the new ExtraHop Community Forums.

Colin Walker

Read On

9.21.15

What Is a Tinygram?

What are tinygrams? When do they arise? Are they a problem? What can I do about them and how do I do it?

Matt Cauthorn

Read On

9.9.15

Don't Fly Blind in the Public Cloud

Without the ability to independently monitor the performance and availability of cloud workloads IT is often dependent on the cloud provider itself to tell them whether SLAs commitments are being met.

Rachel Van't Land

Read On

9.8.15

Learning a New Codebase? Static Code Analysis Is Your Friend

How to get oriented in a new codebase by using easy static code analysis tools.

Dave Monk

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2022
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube