Network Traffic Analysis for the Enterprise
Enterprise Performance Analytics
Enterprise Cloud Analytics
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
The tech industry is a hype machine, from consumer devices to enterprise technology—and B2B security vendors are some of the worst offenders. Here's how ExtraHop is answering the call for authenticity in a world of hype.
Putting our customers first has always been a core value for ExtraHop, and now we're taking this conviction to the next level. Read on to meet Aron Digumarthi, our new VP of Customer Success!
Honeypots are a popular method of learning how attackers think so you can better defend your enterprise against them but they also pose a risk if deployed in production environments. Read the case study for a play-by-play of how Reveal(x) uses network traffic analysis to help security teams detect honeypots!
Incident Response teams are under the gun with new data breach reporting requirements thanks to regulations like GDPR. Hear from EMA Research about how to use network traffic analysis as a force multiplier for IR.
At re:Invent 2018, Amazon Web Services' annual user conference, AWS announced AWS Outposts—both its answer to Microsoft Azure Stack and its first entry into the enterprise data center. This post will tell you why Outposts is such a major step for AWS and its ability to win over enterprise customers.
What's the difference between TCP and HTTP? How do they both work, and how do they work together? Read the blog for definitions of both protocols as well as a breakdown of what makes them different.
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
How does Mitchell International maintain their place at the top of the automotive industry by delivering secure, high performance software for their Fortune 500 customers? Read the case study to learn why Mitchell relies on ExtraHop for NetOps and Security!
This year, Credit Suisse announced their inaugural Disruptive Technology Recognition Program, celebrating vendors that are driving IT innovation with disruptive approaches. ExtraHop is proud to announce our inclusion in this exciting new program.
Watch ExtraHop CTO Jesse Rothstein's 10-minute interview with theCUBE at AWS re:Invent 2018 for the latest trends in security and IT analytics for the cloud, with specific examples of how ExtraHop Reveal(x) helps cloud security teams detect and respond to late-stage cyber attacks.
The last week of November 2018 was a busy week for data breaches, with several major consumer-facing organizations all reporting major security incidents. What can we learn from these disclosures, and why does one stand so far apart from the rest?
In their 2018 study on managing risk and stopping insider or external attackers, the Ponemon Institute revealed some sobering statistics about the state of risk management today. Get the full scoop to help you evaluate and improve your 2019 security posture.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer.
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Learn the basics of ITOA and operational analytics, including why it works and how it helps grow your profits.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.