• Products
    Security

    Network Traffic Analysis for the Enterprise

    Performance

    Enterprise Performance Analytics

    Cloud

    Enterprise Cloud Analytics

    • The ExtraHop Difference
    • Machine Learning
    • Competitive Comparison
    • Professional Services
    • Integration and Automation
  • Solutions
    Security Operations
    • Threat Detection and Response
    • SOC Modernization
    • Cloud Security
    • Hygiene and Compliance
    IT Modernization
    • Data Center Consolidation
    • Cloud Migration
    • Edge Devices & IoT
    • SDN & Virtualization
    Application Analytics
    • Commercial Application Visibility
    • Customer Experience Monitoring
    • Application Upgrade & Cloud Migration
    Network Performance
    • Remote Site Visibility
    • Infrastructure Refresh
    • Triage & Troubleshooting
  • Customers
    Community
    • Customer Stories
    • Solution Bundles Gallery
    • Community Forums
    • Customer Portal
    Partners
    • Partner Portal
    • Channel Partners
    • Technology Partners
    Support
    • Support Overview
    • Professional Services
    • Documentation
    • Policies
    Training
    • Training Overview
    • Training Sessions
  • Resources
    Customer Stories

    Digital Business, Accelerated

    Resources

    White Papers, Data Sheets, and More

    Integrations

    Analytics Extended, Workflows Automated

    • Protocol Library
    • Documentation
    • Firmware
    • Training Videos
  • Company
    About Us

    Rise Above the Noise.

    Careers

    Rise to the Opportunity.

    Newsroom

    Get the Latest.

    • Events
    • Leadership
    • Board
    • Investors
    • Partners
    • Contact Us
  • Blog
Login
Logout
Start Demo

Products

  • Security

  • Performance

  • Cloud

  • Differentiation

    • The ExtraHop Difference

    • Machine Learning

    • Competitive Comparison

    • Professional Services

    • Integration and Automation

Solutions

  • Security Operations

    • Threat Detection and Response

    • SOC Modernization

    • Cloud Security

    • Hygiene and Compliance

  • IT Modernization

    • Data Center Consolidation

    • Cloud Migration

    • Edge Devices & IoT

    • SDN & Virtualization

  • Application Analytics

    • Commercial Application Visibility

    • Customer Experience Monitoring

    • Application Upgrade & Cloud Migration

  • Network Performance

    • Remote Site Visibility

    • Infrastructure Refresh

    • Triage & Troubleshooting

Customers

  • Community

    • Customer Stories

    • Solution Bundles Gallery

    • Community Forums

    • Customer Portal

  • Partners

    • Partner Portal

    • Channel Partners

    • Technology Partners

  • Support

    • Support Overview

    • Professional Services

    • Documentation

    • Policies

  • Training

    • Training Overview

    • Training Sessions

Resources

  • Customer Stories

  • Resources

  • Integrations

  • More Resources

    • Protocol Library

    • Documentation

    • Firmware

    • Training Videos

Company

  • About Us

  • Careers

  • Newsroom

  • Events and Information

    • Events

    • Leadership

    • Board

    • Investors

    • Partners

    • Contact Us

Blog

ExtraHop is a Leader in the 2019 Gartner Magic Quadrant for NPMD | ExtraHop EMA Names Reveal(x) Top Vendor for Top Security Use Cases | ExtraHop Investigating a Data Leak with Reveal(x) | ExtraHop

Blog

There's a New Leader in the Gartner NPMD MQ

  • Bryce Hein
  • February 13, 2019

EMA Names Reveal(x) a Top 3 Winner

  • Barbara Kay
  • February 5, 2019

Hacker, Interrupted

  • Matt Schurr
  • January 31, 2019

EMA Names Reveal(x) a Top 3 Winner


Hacker, Interrupted


There's a New Leader in the Gartner NPMD MQ

  • All Posts
  • Security
  • Performance
  • Cloud
  • Tech
  • Community
  • Trending
  • Reveal(x)
  • Industry Trends
  • TCP Tuning
  • Tips and Hacks
  • NTA

1.15.19

Rise Above the Noise in Enterprise Security

The tech industry is a hype machine, from consumer devices to enterprise technology—and B2B security vendors are some of the worst offenders. Here's how ExtraHop is answering the call for authenticity in a world of hype.

Bryce Hein

Read On

1.8.19

Meet Aron Digumarthi, Our New VP of Customer Success

Putting our customers first has always been a core value for ExtraHop, and now we're taking this conviction to the next level. Read on to meet Aron Digumarthi, our new VP of Customer Success!

Jaq Evans

Read On

1.7.19

Honeypots & Wire Data

Honeypots are a popular method of learning how attackers think so you can better defend your enterprise against them but they also pose a risk if deployed in production environments. Read the case study for a play-by-play of how Reveal(x) uses network traffic analysis to help security teams detect honeypots!

Sonal Shetkar

Read On

1.4.19

Incident Response Under GDPR

Incident Response teams are under the gun with new data breach reporting requirements thanks to regulations like GDPR. Hear from EMA Research about how to use network traffic analysis as a force multiplier for IR.

Tyson Supasatit

Read On

12.18.18

Here's the Deal With AWS Outposts

At re:Invent 2018, Amazon Web Services' annual user conference, AWS announced AWS Outposts—both its answer to Microsoft Azure Stack and its first entry into the enterprise data center. This post will tell you why Outposts is such a major step for AWS and its ability to win over enterprise customers.

Eric Thomas

Read On

12.12.18

TCP vs. HTTP

What's the difference between TCP and HTTP? How do they both work, and how do they work together? Read the blog for definitions of both protocols as well as a breakdown of what makes them different.

Zoltan Talaber

Read On

12.11.18

Clarity in the Fog of War: The Value of Red-Blue Exercises

It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!

Tyson Supasatit

Read On

12.7.18

ZDNet: Industrial espionage fears arise over Chrome extension caught stealing browsing history

Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.

Mentha Benek

Read On

12.6.18

We Busted A Fake Chrome Extension That Was Trying to Steal Data

A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.

Jeff Costlow

Read On

12.4.18

Customer Spotlight: Mitchell International

How does Mitchell International maintain their place at the top of the automotive industry by delivering secure, high performance software for their Fortune 500 customers? Read the case study to learn why Mitchell relies on ExtraHop for NetOps and Security!

Brittany Iwata

Read On

12.3.18

Partnering with Customers for IT Transformation

This year, Credit Suisse announced their inaugural Disruptive Technology Recognition Program, celebrating vendors that are driving IT innovation with disruptive approaches. ExtraHop is proud to announce our inclusion in this exciting new program.

Arif Kareem

Read On

12.3.18

ExtraHop CTO Jesse Rothstein on theCUBE

Watch ExtraHop CTO Jesse Rothstein's 10-minute interview with theCUBE at AWS re:Invent 2018 for the latest trends in security and IT analytics for the cloud, with specific examples of how ExtraHop Reveal(x) helps cloud security teams detect and respond to late-stage cyber attacks.

Jaq Evans

Read On

11.30.18

'Tis the Season to be... Breached?

The last week of November 2018 was a busy week for data breaches, with several major consumer-facing organizations all reporting major security incidents. What can we learn from these disclosures, and why does one stand so far apart from the rest?

Barbara Kay

Read On

11.30.18

Top 2018 Risk Management Stats for Security Leaders

In their 2018 study on managing risk and stopping insider or external attackers, the Ponemon Institute revealed some sobering statistics about the state of risk management today. Get the full scoop to help you evaluate and improve your 2019 security posture.

Tyson Supasatit

Read On

11.28.18

A Case Study for Modern Threat Hunting

Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.

Adam Hebert

Read On

11.27.18

The Trouble with Going Native

Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer.

Eric Thomas

Read On

11.15.18

Decrypt Perfect Forward Secrecy with F5 BIG-IP and ExtraHop

Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.

Tyson Supasatit

Read On

11.11.18

The Big Idea Behind IT Operations Analytics (ITOA): IT Big Data

Learn the basics of ITOA and operational analytics, including why it works and how it helps grow your profits.

Erik Giesa

Read On

11.7.18

Reveal(x) Feature Short: Signal Metrics

Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.

Chase Snyder

Read On

11.5.18

How To Detect That Hadoop/YARN DemonBot Exploit That's Going Around

A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.

Matt Cauthorn

Read On
Previous
Next

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 34-42A
Singapore 039190

Products

  • Security
  • Performance
  • Cloud
  • The ExtraHop Difference
  • Machine Learning
  • Competitive Comparison
  • Professional Services
  • Integration and Automation

Solutions

  • Security Operations
  • IT Modernization
  • Application Analytics
  • Network Performance

Customers

  • Community
  • Partners
  • Support
  • Training

Resources

  • Customer Stories
  • Resources
  • Integrations
  • More Resources

Company

  • About Us
  • Careers
  • Newsroom
  • Events and Information

Blog

  • Copyright ExtraHop Networks 2019
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn