Network Traffic Analysis for the Enterprise
Enterprise Performance Analytics
Enterprise Cloud Analytics
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Listen to ExtraHop VP of Security Matt Cauthorn chat with CyberWire's Dave Bittner about Chrome Extension malware, our investigation into the fake Postman extension, and why attacks like these are scary despite being relatively unsophisticated.
Our online demo now features a live attack simulation where you can observe a hacker doing her job: exploiting a Drupal vulnerability, installing custom executables through PsExec, and more.
Why does Reveal(x) lead the pack on critical security use cases including asset classification and inventory, early breach detection, encrypted traffic analysis, and more? Learn why Enterprise Management Associates named Reveal(x) a Top 3 Winner in their new report, Security Analytics for Threat Detection and Breach Resolution in 2019.
After detecting and investigating a fake Postman Chrome Extension using Reveal(x) network traffic analysis, one question remained: how much damage could a more sophisticated attacker do? I made my own Chrome malware to find out. Here's what I learned.
What happens when you find a data leak in your own environment using your own network traffic analysis product? You investigate, of course, and record the whole process. Read on to learn how I used Reveal(x) to catch the fake Postman Chrome extension red-handed, complete with screenshots of the hunt.
Watch this 3-minute video to learn how ExtraHop Reveal(x) uses network traffic analysis to help you quickly and easily audit your network for expired certifications, weak ciphers, and more.
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Learn how one Reveal(x) customer uses network traffic analysis (NTA) to focus on good security hygiene and reduce their attack surface in order to proactively minimize risk.
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Learn why Perfect Forward Secrecy is more important than ever, and how IT Ops and SecOps must work together to improve cyber security without losing visibility.
What should SecOps and CISOs take away from Microsoft's new network traffic mirroring capability? Learn why the Azure Virtual Network TAP (vTAP) is a huge advance for public cloud computing, according to ExtraHop's co-founder and CTO Jesse Rothstein.
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
Microsoft's Virtual Network TAP is a gamechanger for enterprise cloud customers, especially with the release of ExtraHop Reveal(x) for Azure. Learn why the vTAP secures Azure the enterprise, and why network traffic analysis with Reveal(x) is a critical source of security intelligence in the cloud.