Network Traffic Analysis for the Enterprise
Enterprise Performance Analytics
Enterprise Cloud Analytics
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Change Agents Welcome
Get the Latest
The Winter 2019 release of ExtraHop Reveal(x) network traffic analysis for the enterprise is here, and with it, the bar for inclusion in the increasingly critical NTA category has been raised once again.
Learn about the new features and capabilities included in our 7.5 release and Reveal(x) Winter 2019, from simplified detection drill-down to certificate-free SSL decryption.
Are you jaded by the overuse of Artificial Intelligence (AI) – with vendors instilling either fear or faith? In the cybersecurity domain, we see CISOs investing in Machine Learning (ML), but remaining justifiably skeptical of AI. Here's why.
The tech industry is a hype machine, from consumer devices to enterprise technology—and B2B security vendors are some of the worst offenders. Here's how ExtraHop is answering the call for authenticity in a world of hype.
All too often, bet-the-company decisions are made based on excitement and ambition. They confuse brashness for boldness. Last year ExtraHop bet hard on security, and here's why today I can proudly say we're winning.
Honeypots are a popular method of learning how attackers think so you can better defend your enterprise against them but they also pose a risk if deployed in production environments. Read the case study for a play-by-play of how Reveal(x) uses network traffic analysis to help security teams detect honeypots!
Incident Response teams are under the gun with new data breach reporting requirements thanks to regulations like GDPR. Hear from EMA Research about how to use network traffic analysis as a force multiplier for IR.
At re:Invent 2018, Amazon Web Services' annual user conference, AWS announced AWS Outposts—both its answer to Microsoft Azure Stack and its first entry into the enterprise data center. This post will tell you why Outposts is such a major step for AWS and its ability to win over enterprise customers.
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
How does Mitchell International maintain their place at the top of the automotive industry by delivering secure, high performance software for their Fortune 500 customers? Read the case study to learn why Mitchell relies on ExtraHop for NetOps and Security!
Watch ExtraHop CTO Jesse Rothstein's 10-minute interview with theCUBE at AWS re:Invent 2018 for the latest trends in security and IT analytics for the cloud, with specific examples of how ExtraHop Reveal(x) helps cloud security teams detect and respond to late-stage cyber attacks.
In their 2018 study on managing risk and stopping insider or external attackers, the Ponemon Institute revealed some sobering statistics about the state of risk management today. Get the full scoop to help you evaluate and improve your 2019 security posture.
The last week of November 2018 was a busy week for data breaches, with several major consumer-facing organizations all reporting major security incidents. What can we learn from these disclosures, and why does one stand so far apart from the rest?
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer.
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.