Security

Blog Categories:

ExtraHop's latest solution bundle allows you to quickly identify potential threats and initiate targeted investigations.

At the season finale of AFCEA Washington DC Chapter's Monthly Breakfast Program, the message was clear: the most advanced threats are operating under the surface.

We sat down with our new Senior Vice President of Sales to learn more about his background in technology sales, his leadership style, and what made ExtraHop so attractive to this industry veteran.

The public cloud is a natural place to perform machine learning and deep analytics, but your IT data is on-premises. What's needed to bridge the gap securely?

ExtraHop systems engineering manager Tom Roeh explains what happened, what we learned, and how customers tapped the power of ExtraHop to respond.

As 2016 comes to a close, we caught up with our in-house ransomware expert to get his thoughts on what went down this year, and what organizations and consumers should prepare for in 2017 and beyond.

ExtraHop's ransomware solution has been named a finalist for the 2016 Tech Innovator Awards.

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.

Cybercriminals upped their game, so we're upping ours (and yours.) Learn how to detect and stop ransomware automatically.

The DoD needed an innovative approach to address chronic issues in their Electronic Health Records systems. ExtraHop got the call.

We use four detection methods to provide early warning so IT teams can stop ransomware attacks in progress before the damage is done. The methods are...

For intelligence, surveillance, and reconnaissance, we need open, modular cybersecurity systems and platforms.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.