Security

Blog Categories:

We sat down with our new Senior Vice President of Sales to learn more about his background in technology sales, his leadership style, and what made ExtraHop so attractive to this industry veteran.

The public cloud is a natural place to perform machine learning and deep analytics, but your IT data is on-premises. What's needed to bridge the gap securely?

ExtraHop systems engineering manager Tom Roeh explains what happened, what we learned, and how customers tapped the power of ExtraHop to respond.

As 2016 comes to a close, we caught up with our in-house ransomware expert to get his thoughts on what went down this year, and what organizations and consumers should prepare for in 2017 and beyond.

ExtraHop's ransomware solution has been named a finalist for the 2016 Tech Innovator Awards.

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.

Cybercriminals upped their game, so we're upping ours (and yours.) Learn how to detect and stop ransomware automatically.

The DoD needed an innovative approach to address chronic issues in their Electronic Health Records systems. ExtraHop got the call.

We use four detection methods to provide early warning so IT teams can stop ransomware attacks in progress before the damage is done. The methods are...

For intelligence, surveillance, and reconnaissance, we need open, modular cybersecurity systems and platforms.

Why the fundamental building blocks of future security systems will involve platforms.

Forcing a customer to prove their eligibility for support before helping them is wrong. The first question a support engineer asks you on the phone should be...

Join ExtraHop!

Lots of data? Check. Cutting-edge analytics? Check. Endless opportunities to geek out? Check check.

Go to Careers