Reveal(x): Network Traffic Analysis for the Enterprise
Analytics and Investigation for IT Operations
Security and Performance for the Hybrid Enterprise
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Bold Vision. Huge Effect.
Change Agents Welcome
Get the Latest
See the difference between what ExtraHop Reveal(x) network traffic analysis (NTA) sees and what Darktrace sees—or doesn't see—during a brute force attack and sensitive database compromise.
Instead of viewing the added networking overhead of microservices as a tax, learn how to make it pay off for your business!
How can your SOC resolve security issues up to 77% faster than anyone else? Check out the visual comparison of automated investigation vs. a multi-tool workflow to find out!
What's the real, unsung value of microservices, and how can you take full advantage of this newly popular architecture? Read the blog to find out!
ExtraHop users, there's a nasty new Android worm that spreads via remote debugging services, but don't worry—install this remote ADP connections dashboard to quickly find and shut down at-risk devices.
In part two of this info-packed blog series on how increased encryption is reshaping enterprise security, learn how SecOps can decrypt and analyze encrypted information safely and effectively.
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
In an effort to rid the world of needless application and network performance slowdowns, we turn to retransmission timeouts (RTOs). What are they and what can you do about them?
What Is TCP…
Learn how Reveal(x) and Phantom enable you to automatically investigate potential data exfiltration, vet newly added DNS servers, and block unauthorized database access.
Learn about the serious consequences increasingly encrypted network data has for SecOps teams that rely on analytics—and why most network security vendors aren't helping—in this first blog in a two-part series.
Opportunistic attacks are easy to block, but targeted and advanced attacks take a combo of time, skill, and an integrated security workflow. Learn how Palo Alto Networks and ExtraHop Reveal(x) work together to give you a shortcut for late stage threat hunting!
Learn how Intent Based Networking (IBN) and SD-Branch environments can help NetOps teams support cloud adoption and hybrid networks at massive scale.
Next gen security programs will be measured by dwell time more than any other metric. Here's why.
Now that PFS is required by TLS 1.3, what happens if ExtraHop customers can't install session forwarding software? Don't worry! Check this guide to learn how to forward session keys from F5 Local Traffic Managers (LTM) to ExtraHop.
If you're in charge of application performance and security, you might be used to thinking of the network as a completely separate animal—but this self-described 'app guy' uses the network to diagnose app problems faster and stop bigger issues. Here's how!
In May 2017, WannaCry shook the world in a massively effective ransomware attack affecting 150 countries. One year later, has the tech industry learned its lesson? Check out this CIO Dive interview with ExtraHop's VP of Security and 3 other security experts about what made WannaCry so successful, how the industry has evolved since, and what's next for cyber security and ransomware defense.
Learn how to use group filters for ExtraHop live activity maps to quickly answer complex, multi-part questions about your network.
Not sure how to maintain IT and security visibility now that TLS 1.3 requires perfect forward secrecy encryption? Watch this webinar (or read the transcript!) for current encryption trends, what's next for TLS 1.3, and how ExtraHop provides an elegant and lightweight solution to the visibility challenge.
This week on Clouded Judgment, Eric talks about the state of public cloud adoption in the enterprise, how organizations can best take advantage of next-generation infrastructure, and the capabilities and shortcomings of cloud provider tooling.
From the truth about machine learning to how scary encryption can be, here are the top 3 takeaways from RSA 2018!