Reveal(x): Network Traffic Analysis for the Enterprise
Analytics and Investigation for IT Operations
Security and Performance for the Hybrid Enterprise
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Bold Vision. Huge Effect.
Change Agents Welcome
Get the Latest
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Splunk and ExtraHop weigh in on the benefits of adding wire data to logs to fill critical visibility gaps. Learn why wire data is the ultimate source of truth for security and IT!
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
ExtraHop 7.4 gives you powerful detection grouping and filtering capabilities as well as even easier access to the records you need. Let's talk about all the new features of this release!
Cyber Monday sales grew 16.8 percent in 2017.
While Black Friday diehards continue to fight over television sets and parking spots, droves of other shoppers prefer the comfort and safety of their…
Learn how to quickly identify recent and past device connections on a live activity map in ExtraHop.
What is TCP windowing, and how can you scale effectively and solve congestion problems and other issues? Read the blog to find out, updated for 2018!
ExtraHop users, there's a nasty new Android worm that spreads via remote debugging services, but don't worry—install this remote ADP connections dashboard to quickly find and shut down at-risk devices.
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
In an effort to rid the world of needless application and network performance slowdowns, we turn to retransmission timeouts (RTOs). What are they and what can you do about them?
What Is TCP…
Opportunistic attacks are easy to block, but targeted and advanced attacks take a combo of time, skill, and an integrated security workflow. Learn how Palo Alto Networks and ExtraHop Reveal(x) work together to give you a shortcut for late stage threat hunting!
Now that PFS is required by TLS 1.3, what happens if ExtraHop customers can't install session forwarding software? Don't worry! Check this guide to learn how to forward session keys from F5 Local Traffic Managers (LTM) to ExtraHop.
Not sure how to maintain IT and security visibility now that TLS 1.3 requires perfect forward secrecy encryption? Watch this webinar (or read the transcript!) for current encryption trends, what's next for TLS 1.3, and how ExtraHop provides an elegant and lightweight solution to the visibility challenge.
Learn how to use group filters for ExtraHop live activity maps to quickly answer complex, multi-part questions about your network.
From the truth about machine learning to how scary encryption can be, here are the top 3 takeaways from RSA 2018!
If you can't scale your analytics platform to match cloud adoption and unprecedented data growth, you'll be making IT and security decisions based on guesswork. Learn how ExtraHop analyzes over 1 PB of data per day, and why that scalability matters.
As a CIO, I'm aware that the cloud is helping redefine what's possible. But we all know what happens when fools rush in.
This update to ExtraHop's Active Directory bundle makes it easier to monitor and troubleshoot performance and security issues.
How to use TCP_NODELAY, Nagle's Algorithm, QUICKACK, and more settings and algorithms to get better TCP performance on your network.
Real-time network analytics with ExtraHop can detect Russian cyber attacks in real time. Find out how it works.