Reveal(x): Network Traffic Analysis for the Enterprise
Analytics and Investigation for IT Operations
Security and Performance for the Hybrid Enterprise
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Bold Vision. Huge Effect.
Change Agents Welcome
Get the Latest
Cyber Monday sales grew 16.8 percent in 2017.
While Black Friday diehards continue to fight over television sets and parking spots, droves of other shoppers prefer the comfort and safety of their…
Instead of ransoming your encrypted files, recover the originals from a packet capture.
How do you reap the benefits of hyperscale IT while minimizing the risk of complex system failures that hurt your business, and, worst of all, hurt your customers?
Cybercriminals upped their game, so we're upping ours (and yours.) Learn how to detect and stop ransomware automatically.
Active Directory is at the center of so many corporate IT systems. Here's how and why you should be monitoring it.
We use four detection methods to provide early warning so IT teams can stop ransomware attacks in progress before the damage is done. The methods are...
Enterprise IT monitoring is undergoing a major shift, and stream processing architectures are going to come out on top.
Get an up-to-date definition of LDAP and quickly understand the impact - both positive and potentially negative - this protocol brings to an organization.
A diagram of the OSI Model.
In Part 1 of this two-part series, we imagined the perfect framework for no-impact monitoring of an application stack and found it was right in front of us all along in…
Learn what's driving the growth of IT operations analytics and how ITOA is data-driven, borrowing a lot from from Big Data principles.
Required reading now that the new ICD-10 medical coding standard is required across the U.S.
Community interactions, often via forums, social media, etc., are a thing. They're a thing that most of us rely on, to varying degrees, every day. Whether you're choosing the appropriate solution to…
What are tinygrams? When do they arise? Are they a problem? What can I do about them and how do I do it?
Without the ability to independently monitor the performance and availability of cloud workloads IT is often dependent on the cloud provider itself to tell them whether SLAs commitments are being met.
Rachel Van't Land
How to get oriented in a new codebase by using easy static code analysis tools.
The October 1, 2015 ICD-10 conversion date is nearly upon us.Get a deeper understanding of how ExtraHop is able to reduce ICD-10 conversion risk here.
Learn what FHIR is, how it relates to the HL7 protocol, and standards you should know about this new way of exchanging healthcare information electronically.
Industry-research firm TechValidate surveyed IT professionals to find out what IT organizations' plans were for IT Operations Analytics.
Eric Sharpsten, CTO of Lockheed Martin's Federal Health practice, discusses how his organization gains visibility in large, dynamic IT environments.