• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • Shields Up
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • U.S. Public Sector
    • Education
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Hardware Policies
    Wizards of the Coast Logo

    Featured Customer Story

    Wizards of the Coast

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    Detect network attacks. Correlate threat intelligence and forensics. Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

NDR Blog

Read the ExtraHop NDR blog to learn about this critical network security solution, how it works, and how it complements other tools.

What Is NDR?
  • All Posts
  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

12.3.21

IT in the Crosshairs of Modern Ransomware

The trends show that modern ransomware behavior has changed, leaving IT in the crosshairs—but by knowing the attacker's playbook, IT teams can regain the advantage.

Don Shin

Read On

11.19.21

ExtraHop November TL;DR

Get up to date on some interesting stories and content you may have missed this month.

Paul Ditty

Read On

11.17.21

When They're Already Inside the Walls: How to Detect and Stop Lateral Movement

Attackers spend a lot of time moving laterally within your environment, trying to reach their targets. Detecting lateral movement can be a challenge, especially if they're using living-off-the-land techniques. Here's what you can do.

Chase Snyder

Read On

11.10.21

Rethinking IDS: The Math behind the Intruder's Dilemma

It may sound scary, but focusing on a post-compromise defense strategy can give you a higher probability of success. Test out our calculators to see how you can get the math on your side.

Don Shin

Read On

11.9.21

DoublePulsar Detected

Learn how one organization steps into action when DoublePulsar—a backdoor implant that was used in the infamous WannaCry attack—is detected.

Cal Jewell

Read On

10.22.21

ExtraHop October TL;DR

Get up to date on some interesting stories and content you may have missed this month.

Paul Ditty

Read On

10.18.21

Bridging Data Retention Gaps En Route to Zero Trust

Federal agencies have been directed to retain log data for forensics, but there may be an easier way.

Tom Roeh

Read On

10.15.21

Things That Go Bump in the Network: Part II

An army of robots attempted to travel the globe, prompting fears of global domination. Learn how humans prevailed.

Cy Borg

Read On

10.14.21

Detecting Attacks Using Microsoft Protocol Decryption

Microsoft Active Directory is a favorite target for attackers, and traditional threat detection techniques are falling short. Learn why and what you can do.

Jesse Munos

Read On

10.13.21

Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response

Microsoft 365 integration is here, helping you detect and investigate threats to your Microsoft SaaS tools using ExtraHop Reveal(x) 360 network detection and response.

Chase Snyder

Read On

10.12.21

Uncovering Google DNS Activity with ExtraHop Reveal(x) Advisor Threat Hunting

When ExtraHop Reveal(x) detected suspicious DNS queries, ExtraHop analysts went to work to help investigate a breach and shut out the intruder.

Michael McPherson

Read On

10.7.21

Things That Go Bump in the Network: Part I

Josh Snow had a good scare after he spotted something hiding in plain sight.

Josh Snow

Read On

9.30.21

Weak Cryptography Search Leads to Unexpected Discoveries with Reveal(x)

When an enterprise discovers the easy way to search for weak cryptography, they find something a little more sinister.

Cal Jewell

Read On

9.28.21

Detect Malware in Encrypted Traffic for Improved Security Visibility

Encryption gives attackers dark places to hide. Learn which common solutions for network visibility fall short, and which can accurately detect advanced threats.

Jesse Munos

Read On

9.27.21

Reveal(x) 360 + AWS Control Tower

Learn how this new integration helps organizations eliminate much of the friction associated with deploying and managing ExtraHop cloud sensors across multiple AWS accounts.

Jeff Deininger

Read On

9.24.21

ExtraHop September TL;DR

Get up to date on some interesting stories and content you may have missed this month.

Paul Ditty

Read On

9.23.21

Understand and Detect vCenter Vulnerability Exploitation

The vulnerability to vCenter Server presents serious risk to organizations. Learn how to detect malicious activity surrounding this vulnerability.

Jeff Costlow

Read On

9.23.21

What's New in 8.6 and Reveal(x)

Read a preview of our most exciting new features, then check the release notes for a comprehensive view of our 8.6 release updates.

Jeena Khan

Read On

9.14.21

Why Decryption Is Necessary for Security

Encryption is central to modern security architecture, but it also allows attackers to conceal their activity. Learn why secure decryption is also the key to effective cyberdefense.

Jesse Munos

Read On

9.13.21

What Are Supply Chain Attacks?

A quick-read executive summary on what supply chain attacks are and what you can do about them.

Kelsey Milligan

Read On
Previous
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2022
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube