Network Detection & Response
Detection & Response for AWS
Application & Network Performance
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Secure your hybrid attack surface with complete visibility, real-time detection, and intelligent response.
Manage risk and drive growth in AWS with an agile, cloud-native approach to cybersecurity.
Ensure the availability and performance of your enterprise from the cloud, to the data center, to the customer.
Take control of SDN, the cloud, and more with complete visibility, real-time detection, and intelligent response.
Learn about the innovative ways our customers are succeeding with ExtraHop, plus the latest news from R&D.
Explore the Panorama Partner Program, meet our channel partners, or search for a technology partner.
Compare support packages, check out our Professional Services offerings, or log into the Customer Portal.
Watch free training videos and courses, or schedule a visit from an ExtraHop expert for specialized training.
In the 4th installment of our website migration series, learn about the process of cleaning up years' worth of old and confusing file templates before we could move forward.
Learn about the process of choosing a new website platform (Hugo) and which pitfalls—expected and unexpected—caused the migration project to stall.
If you're in charge of a marketing website or just curious about the development process, learn from our pitfalls and successes as we document the migration of our website to a different tool. In this post, Zoltan is hired on to join Zach in web production and discusses the problems with the site he encounters.
If you're in charge of a marketing website or just curious about the development process, learn from our pitfalls and successes as we document the migration of our website to a different tool. In this post, I'll describe our existing toolset and how it came together—and then I'll tell you why it no longer works.
Learn how you can analyze and visualize TCP metrics (such as Zero Windows, aborts and throttling) to gain full visibility of your applications.
Ever hear the saying "many hands make light work"? How about "Two heads are better than one"? Well how about hundreds or even thousands of heads? A community of users can do together what no single user could, and they can do it faster, better, and easier. Check out the new ExtraHop Community Forums.
The War Room Chronicles is our TME podcast. We ship one every couple weeks (usually every second Friday, barring major incident), and it is your portal into our world.
If a malicious user set up an FTP server and sent sensitive data outside, would you know? We show you how sysadmins can understand real-time FTP traffic.
It turns out that not even a "stealthy" Linux trojan can hide from ExtraHop. Colin explains how to detect this Turla component's command-and-control traffic.
Sr. Technical Marketing Engineer Colin Walker explains why he joined ExtraHop and his vision for a wire data analytics community.
Looking for an easy way to identify systems using SSL version 3.0 (SSLv3)? The free ExtraHop Discovery Edition makes the process extremely simple!
When troubleshooting network issues, you need to not only see which users and applications are using the network, but also how efficiently they are using it.
Are you an IT architect or network engineer who is tired of out-of-date diagrams? Now you can start your diagrams with Activity Maps exported to Visio.
You may have heard of the tongue-in-cheek term mean-time-to-innocence (MTTI). The ExtraHop platform helps IT organizations abolish MTTI.
ExtraHop auto-discovers and classifies every device transacting on a network. Auto-discovery makes it easy to identify and decommission legacy DNS, web, and other servers.
John Smith explains how SDN, the growth of APIs, and 10/40/100Gbit networking are forcing IT professionals to diversify their skill sets.
Citrix login time matters at Seattle Children's: A nurse might access his or her virtual desktop at 40 different devices during a 12-hour shift.
After we posted on the Target data breach, we received 52 responses from IT professionals in what turned out to be a really insightful discussion.
Heartbleed has been in the wild since 2012, so how could I be sure that we had not been hacked? I don't have psychic powers, but something better: ExtraHop.
Vihar shares his conversation with CISO who was scanning his network for signs of the Heartbleed bug. ExtraHop reveals OpenSSL heartbeats in two clicks.