ExtraHop Reveal(x): NTA for the Enterprise
The ExtraHop Performance Platform
The ExtraHop Cloud Platform
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Learn how one Reveal(x) customer uses network traffic analysis (NTA) to focus on good security hygiene and reduce their attack surface in order to proactively minimize risk.
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Learn why Perfect Forward Secrecy is more important than ever, and how IT Ops and SecOps must work together to improve cyber security without losing visibility.
What should SecOps and CISOs take away from Microsoft's new network traffic mirroring capability? Learn why the Azure Virtual Network TAP (vTAP) is a huge advance for public cloud computing, according to ExtraHop's co-founder and CTO Jesse Rothstein.
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
Microsoft's Virtual Network TAP is a gamechanger for enterprise cloud customers, especially with the release of ExtraHop Reveal(x) for Azure. Learn why the vTAP secures Azure the enterprise, and why network traffic analysis with Reveal(x) is a critical source of security intelligence in the cloud.
What did Gartner predict in the 2018 Hype Cycle for Threat-Facing Technologies, and what are the most important changes from 2017? Take a look at this breakdown of the security tech to watch this year!
Learn about the new features and capabilities of Reveal(x) Summer 2018, the network traffic analyzer that helps SecOps teams act with confidence and resolve threats faster than any other security analytics solution.
ExtraHop Reveal(x) Summer 2018 sheds light on key risks and behaviors in the darkspace of enterprise security. Here's how Reveal(x) solves late-stage attack blindness.
See the difference between what ExtraHop Reveal(x) network traffic analysis (NTA) sees and what Darktrace sees—or doesn't see—during a brute force attack and sensitive database compromise.
How can your SOC resolve security issues up to 77% faster than anyone else? Check out the visual comparison of automated investigation vs. a multi-tool workflow to find out!
Opportunistic attacks are easy to block, but targeted and advanced attacks take a combo of time, skill, and an integrated security workflow. Learn how Palo Alto Networks and ExtraHop Reveal(x) work together to give you a shortcut for late stage threat hunting!
Not sure how to maintain IT and security visibility now that TLS 1.3 requires perfect forward secrecy encryption? Watch this webinar (or read the transcript!) for current encryption trends, what's next for TLS 1.3, and how ExtraHop provides an elegant and lightweight solution to the visibility challenge.
SecOps needs to cut through a lot of hype surrounding security analytics. Read the blog and become a smarter buyer.
Read on to learn how network security analytics will play a critical role in addressing the major SecOps challenges detailed in Mandiant's MTrends report.