• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

    Try It for Free

    Reveal(x) 360

    Light up your AWS
    environment.

    No friction.
    No credit card required.

    AWS Partner Network Competency
    Start Free Trial
  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • Shields Up
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • U.S. Public Sector
    • Education
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Hardware Policies
    Wizards of the Coast Logo

    Featured Customer Story

    Wizards of the Coast

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

NDR Blog

Read the ExtraHop NDR blog to learn about this critical network security solution, how it works, and how it complements other tools.

What Is NDR?
  • All Posts
  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

9.23.21

Understand and Detect vCenter Vulnerability Exploitation

The vulnerability to vCenter Server presents serious risk to organizations. Learn how to detect malicious activity surrounding this vulnerability.

Jeff Costlow

Read On

9.23.21

What's New in 8.6 and Reveal(x)

Read a preview of our most exciting new features, then check the release notes for a comprehensive view of our 8.6 release updates.

Jeena Khan

Read On

9.14.21

Why Decryption Is Necessary for Security

Encryption is central to modern security architecture, but it also allows attackers to conceal their activity. Learn why secure decryption is also the key to effective cyberdefense.

Jesse Munos

Read On

9.13.21

What Are Supply Chain Attacks?

A quick-read executive summary on what supply chain attacks are and what you can do about them.

Kelsey Milligan

Read On

9.9.21

Slow EDR Rollout Needs a NG-IDS Compensating Control

We pitted Reveal(x) against signature-based IDS to see which technology had the most comprehensive detections against advanced threats. Spoiler alert: Reveal(x) won by leaps and bounds.

Don Shin

Read On

8.31.21

What are Kerberos Golden Ticket Attacks and How to Detect Them

Kerberos authentication protocol can be exploited in golden ticket attacks. Learn how adversaries pull off these attacks and how to detect and prevent them.

Kirsten Gantenbein

Read On

8.30.21

SANS WhatWorks: ExtraHop Reveal(x) for Reducing Detection Time

Learn about the security challenges Viasat faces, what they look for in security technologies, and how ExtraHop Reveal(x) helped them stop ransomware in its tracks.

Katie Lockett

Read On

8.25.21

How ExtraHop Shut Down a C&C Beaconing Attack

A compromised VPN client infects a print server and accesses a critical networking admin tool, ExtraHop Reveal(x) detectors fire.

Daniel Chu

Read On

8.24.21

Gas South Finds a Security Partner with ExtraHop

When one company needed network visibility and packet-level forensics, they sought out a vendor. They found a security partner instead.

Kelsey Milligan

Read On

8.19.21

Security Alert: New Vulnerability Grants IoT Camera Remote Access

A critical vulnerability affects an estimated 83 million recording devices, allowing attackers access to live feed and enabling remote code execution.

Jeff Costlow

Read On

8.11.21

PetitPotam: Expanding NTLM Relay Attacks

Learn how the PetitPotam exploit enables a new variant of NTLM relay attack targeting Active Directory—and how to detect and stop it.

Preston Crowe

Read On

8.10.21

On the Lookout for Credential-Sharing Gaps

Sharing credentials over outdated protocols puts your organization at risk of cyberattack. Learn what to do about it.

Cal Jewell

Read On

8.9.21

Monitoring Critical Cloud Workloads

Get tips for taking a phased approach to securing your cloud environment in this new report from InformationWeek.

Dale Norris

Read On

8.3.21

ExtraHop is the Founding NDR Provider in the XDR Alliance

Exabeam has announced the XDR Alliance, a partnership of cybersecurity innovators, with ExtraHop as the alliance's founding member in the NDR category.

Chase Snyder

Read On

7.29.21

SIEM Alone Won't Stop Advanced Threats. Integrated NDR & SIEM Can. Here's Why.

Learn about the benefits of integrating NDR and SIEM to defend your organization against advanced threats.

Chase Snyder

Read On

7.16.21

The Elements of Cyberdefense

Security requires a multifaceted approach. Learn how one company uses our machine learning-based solution to solve multiple challenges, then view the Periodic Table of NDR Use Cases to learn how Reveal(x) supports each element of cyberdefense.

Kelsey Milligan

Read On

7.15.21

SonicWall Ransomware Warning: Attacks via SRA & SMA Devices

ExtraHop overviews the the SonicWall ransomware warning for SRA & SMA devices and how to detect attacks.

Jeff Costlow

Read On

7.13.21

Cryptography Training Reveals a Security Surprise

A journey into cryptography revealed security exposure from an unlikely on-campus vendor.

Cal Jewell

Read On

7.12.21

See How Network Intelligence Tools Find Adversaries & Advanced Threats

IDC says network intelligence tools with visibility over an enterprise's entire cloud and hybrid surface provide insight that a slew of discrete tools cannot.

Dale Norris

Read On

7.6.21

REvil Ransomware Attack and Supply Chain Risk

The latest REvil ransomware attack is a sophisticated supply chain-based attack on software provider Kaseya that has put up to 1,500 customers at risk.

Jeff Costlow

Read On
Previous
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2022
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube