Reveal(x): Network Traffic Analysis for the Enterprise
Analytics and Investigation for IT Operations
Security and Performance for the Hybrid Enterprise
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Bold Vision. Huge Effect.
Change Agents Welcome
Get the Latest
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts who are thrown into the deep end without much security training or experience. If that's you, read this step-by-step case study to learn the basics of confirming and investigating a breach using wire data.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer.
Learn how to use F5 BIG-IP to capture perfect forward secrecy session keys and forward them to ExtraHop in order to passively analyze PFS-encrypted network traffic.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Network monitoring tools aren't keeping up with today's environments. Real-time analytics with ExtraHop delivers the unprecedented visibility and immediate answers you need to act quickly and with confidence.
Splunk and ExtraHop weigh in on the benefits of adding wire data to logs to fill critical visibility gaps. Learn why wire data is the ultimate source of truth for security and IT!
Imagine you're a security analyst just beginning an investigation. How do you know which data will be most relevant? Here's how ExtraHop Reveal(x) signal metrics help you quickly understand all the information you need to respond to a potential threat.
ExtraHop 7.4 gives you powerful detection grouping and filtering capabilities as well as even easier access to the records you need. Let's talk about all the new features of this release!
Cyber Monday sales grew 16.8 percent in 2017.
While Black Friday diehards continue to fight over television sets and parking spots, droves of other shoppers prefer the comfort and safety of their…
Learn how to quickly identify recent and past device connections on a live activity map in ExtraHop.
What is TCP windowing, and how can you scale effectively and solve congestion problems and other issues? Read the blog to find out, updated for 2018!
ExtraHop users, there's a nasty new Android worm that spreads via remote debugging services, but don't worry—install this remote ADP connections dashboard to quickly find and shut down at-risk devices.
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
In an effort to rid the world of needless application and network performance slowdowns, we turn to retransmission timeouts (RTOs). What are they and what can you do about them?
What Is TCP…