• The Platform

    ExtraHop Reveal(x)

    Cloud-native visibility, detection, and
    response for the hybrid enterprise.

    Reveal(x) 360

    SaaS-based network detection
    and response.

    Learn More

    How It Works

    Reveal(x) Enterprise

    Self-managed network detection
    and response.

    Learn More

    How It Works

  • For Security

    For Security

    Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

    Use Cases

    • Comprehensive Inventory of All Devices
    • Detect Lateral Movement
    • Monitor Sensitive Data Movements
    • Respond to Alerts That Matter
    • Simple, Streamlined Threat Hunting
    • Next Generation Intrusion Detection System
    • See All Use Cases

    Security Resources

    • 2020 Gartner Market Guide for Network Detection and Response
    • 2020 SANS Network Visibility and Threat Detection Survey
    • Beginners' Guide to Network Detection and Response

    See All Resources

    Enterprise-Ready Integrations

    Crowdstrike Logo

    Detect network threats and automatically quarantine impacted devices.

    Read More...

    See All Integrations

    Featured Customer Story

    Ulta Beauty Logo

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    See All Customer Stories

  • For Cloud

    For Cloud

    Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

    Use Cases

    • Monitor Critical Cloud Workloads
    • Detect Supply Chain Attacks
    • Cloud Detection and Response
    • Respond to Alerts That Matter
    • Security for AWS
    • Security for Azure
    • Security for Google Cloud
    • See All Use Cases

    Cloud Resources

    • Using MITRE ATT&CK In Cloud and Hybrid Environments
    • Multi-Cloud Security: Removing Friction from the Development Process

    See All Resources

    Enterprise-Ready Integrations

    Amazon Web Services Logo

    Unified cloud security and monitoring with AWS and ExtraHop.

    Read More...

    See All Integrations

    Featured Customer Story

    Wizards of the Coast Logo

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More...

    See All Customer Stories

  • For IT Ops

    For IT Ops

    Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

    Use Cases

    • Resolve Performance Issues
    • Support Distributed Workers
    • Reliably Scale to the Cloud
    • NetOps and SecOps Collaboration
    • See All Use Cases

    IT Ops Resources

    • 451: Digital Experiences Are Front and Center In Coping with Coronavirus
    • Office Shutdown: Securing an Increased Remote Workforce

    See All Resources

    Enterprise-Ready Integrations

    ServiceNow Logo

    Know and do more, faster. ExtraHop + ServiceNow makes IT service management even more seamless.

    Read More...

    See All Integrations

    Featured Customer Story

    The Home Depot Logo

    The Home Depot Builds Unified Customer Experience with Visibility from ExtraHop

    Read More...

    See All Customer Stories

  • More
    • Blog
    • Customers
    • Partners
    • Resources
    • About Us

    How to Detect and Respond to the SUNBURST Attack

    Sunburst attack 2020: Learn how to detect and respond to the Sunburst backdoor …

    Read More...

    All Blog Posts

    Security Alert: Detecting CVE-2020-1472 Zerologon Exploitation with NDR

    The recent Zerologon vulnerability (CVE-2020-1472) could allow attackers to get …

    Read More...

    • Support
    • Support Overview
    • Documentation
    • Hardware Policies
    • Services
    • Services Overview
    • ExtraHop Reveal(x) Advisor
    • Deployment
    • Training
    • Training Overview
    • Training Sessions
    • Community
    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Partners

    • Partner Portal Login
    • Channel Partner Program
    • Find a Technology Partner
    • Become a Partner

    Resources

    • Customer Stories
    • Remote Access Resource Hub
    • All Resources
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Network Attack Library
    • Protocol Library
    • Documentation
    • Firmware
    • Training Videos
    • About ExtraHop
    • About Us
    • The ExtraHop Difference
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Careers
    • Careers Overview
    • Search Openings
    • News
    • Newsroom
    • Press Releases
    • ExtraHop in the News
    • Engage with Us
    • Contact Us
    • Upcoming Webinars and Events
    • Take the Live Demo

    Network Detection and Response (NDR) Vs. Extended Detection & Response (XDR)

    Get some clarity on the alphabet soup of security vendor acronyms by reading …

    Read More...

    Ulta Beauty

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    Crowdstrike

    Detect network threats and automatically quarantine impacted devices. Inventory devices not yet protected by endpoint security.

    Read More...

    2020 Gartner Market Guide for Network Detection and Response

    ExtraHop is a representative vendor two years running. Learn why.

    Read More...

    Newsroom

    Get the latest news and information about ExtraHop, including press releases and third-party coverage.

    Read More...

X button
Login
Logout
Start Demo

The Platform

For Security

For Cloud

For IT Ops

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop Reveal(x)

Cloud-native visibility, detection, and
response for the hybrid enterprise.

Reveal(x) 360

SaaS-based network detection
and response.

Learn More

How It Workscaret-right

Reveal(x) Enterprise

Self-managed network detection
and response.

Learn More

How It Workscaret-right

caret-left Back

For Security

Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

Learn More

Agentless, Comprehensive Inventory of All Devices

Detect Post-Compromise Recon and Lateral Movement

Monitor Sensitive Data Movements

Respond to Alerts That Matter

Simple, Streamlined Threat Hunting

Next Generation Intrusion Detection System

caret-left Back

For Cloud

Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

Learn More

Monitor Critical Cloud Workloads

Monitor Unexpected Upstream Dependencies in Cloud Workloads

Detect Post-Compromise Recon and Lateral Movement

Respond to Alerts That Matter

Security for AWS

Security for Azure

Security for Google Cloud

caret-left Back

For IT Ops

Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

Learn More

Resolve Performance Issues

Support Distributed Workers

Reliably Scale to the Cloud

NetOps and SecOps Collaboration

caret-left Back

Customers

Partners

Resources

About Us

Blogcaret-right

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Visit Customer Portal

Support

Professional Services

Training

Solution Bundles Gallery

Community Forums

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Visit Partner Portal

Channel Partner Program

Find a Technology Partner

Become a Partner

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Network Attack Library

Protocol Library

Documentation

Firmware

Training Videos

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Difference

What Is Cloud-Native?

Careers

Newsroom

Upcoming Webinars and Events

Ask the Expert Series: What Are SPANs and Taps? Remote Access Considerations: How to Ensure Availability and Security for Remote Workers ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments

Blog | Tech

Ask the Expert Series: What Are SPANs and Taps?

  • Ryan Davis
  • April 20, 2020

Remote Access Considerations: How to Ensure Availability and Security for Remote Workers

  • Tyson Supasatit
  • March 20, 2020

ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments

  • Chase Snyder
  • March 18, 2020

Remote Access Considerations: How to Ensure Availability and Security for Remote Workers


ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments


Ask the Expert Series: What Are SPANs and Taps?

  • All Posts
  • Security
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

12.19.20

How to Identify Malicious Network and Port Scanning

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to identify malicious network scanning and differentiate it from benign behavior.

Christine Shaw

Read On

12.14.20

Designing a Color System: Intuitive UX and Happy Developers

Learn how the ExtraHop UX team redesigned our color system.

Creighton Chamberlain

Read On

11.20.20

The Tricks of Our Trade: How Reveal(x) Uses Machine Learning

Machine learning is not magic, and not all machine learning is created equal. ExtraHop Reveal(x) makes life easier for security teams with ML subsystems for Perception, Detection, and Investigation.

Edward Wu

Read On

9.4.20

How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags

False flags are deliberately planted details meant to distract or mislead investigators. Learn what to look out for and how to get more context.

Chase Snyder

Read On

9.1.20

Strange Behavior: The Case for Machine Learning in Cybersecurity

Many people are justifiably skeptical of machine learning's value. The strongest case for ML in cybersecurity lies in detecting unusual behavior that other approaches miss.

Chase Snyder

Read On

8.28.20

How To Monitor Sensitive Data & Stop Exfiltration via The Network

Monitoring sensitive data movement in the enterprise network can stop breaches by catching insider threats or adversaries before they can exfiltrate valuable data. This post outlines why the status quo isn't enough, and how network detection and response tools can help.

Chase Snyder

Read On

8.27.20

Uncovering the Unknown: Proactive, Covert Identification of Evasive Threats

Attackers are constantly evolving their tactics and techniques to avoid detection. But attackers can't eliminate all traces of their activities. Here is how ExtraHop Reveal(x) streamlines the threat hunting process.

Jesse Munos

Read On

8.27.20

Ready for Federal: Reveal(x) in Continuous Diagnostics & Mitigation (CDM) Program

With ExtraHop Reveal(x) now available under the CDM APL, U.S. federal agencies have new ways to add industry-leading network detection and response capabilities.

Patrick Park

Read On

8.26.20

SANS on Building Effective SOC Teams Despite the Skills Gap

A recent SANS survey found that, because of budget limitations, more companies are reconsidering their security staff hiring. Given that necessary skills are still in demand, Security Operations Managers will need to take a different approach to bridge the gap.

Carol Caley

Read On

7.7.20

Easy Multi-Factor Authentication: JumpCloud SSO With SAML

Learn how you can leverage JumpCloud SSO with SAML for an uncomplicated approach to multi-factor authentication that works in environments without an existing identity provider.

Thomas Smith

Read On

6.3.20

Putting Machine Learning to Work for Enterprise IoT Security

Learn why network segmentation isn't feasible for IoT security, and how to detect cyberattacks in IoT service layers with machine learning from ExtraHop Reveal(x).

Edward Wu

Read On

5.29.20

What's Worse? RDP Open to the Internet or Closing Up Shop? RDP Best Practices to Follow in 2020

Enabling remote desktop protocol has been a popular choice for IT teams in the mad dash of WFH access in 2020. Read five best practices to follow.

Chase Snyder

Read On

5.19.20

Reveal(x) 360 Technical Innovations

See how ExtraHop makes SaaS-based NDR security easily attainable, scalable, and cost-efficient for hybrid enterprises to discover, monitor, and protect all digital assets.

Ted Driggs

Read On

5.18.20

With Cybersecurity Budgets Under Scrutiny, It's Time to Get Into Shape

IT leaders need to make the most of their existing resources. By consolidating their toolset, they can maximize the impact of their budget and staff. Read the blog to learn how.

Tyson Supasatit

Read On

5.15.20

Longread: Should You Use Zoom?

Now that business (and your social life) runs on Zoom, what are the security issues that have plagued the video conferencing giant—and how serious are they, really? Read the blog for a breakdown.

Carol Caley

Read On

5.6.20

Security Report: Connected Devices During COVID-19

Read new research from ExtraHop showing the impact of COVID-19 on IoT and device connectivity, and see what these surprising data points tell us about the future of IT security.

Celine Rosak

Read On

5.5.20

TCP Windowing: What Is It, Scaling, and Tips

Learn about TCP windowing covering perspectives of a server as the receiver and a client as the sender.

Christine Shaw

Read On

4.20.20

Ask the Expert Series: What Are SPANs and Taps?

Watch the video to get the basics about SPANs and TAPs and how they could affect physical connections and data feed from ExtraHop's Josh Snow and Ixia's Hans Hohenner.

Ryan Davis

Read On

4.16.20

Exposing Citrix Latency Caused by VPN Overload

Learn how to quickly detect and investigate Citrix latency due to increased VPN usage with network detection and response.

Celine Rosak

Read On

3.25.20

What's New in ExtraHop 8.0 and Reveal(x)

Learn about the new features and capabilities included in our 8.0 release of ExtraHop and Reveal(x), including more powerful investigation tools, device model set filtering, and more.

Jeena Khan

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • Reveal(x) Enterprise

Security

  • Comprehensive Inventory of All Devices
  • Detect Lateral Movement
  • Monitor Sensitive Data Movements
  • Respond to Alerts That Matter
  • Simple, Streamlined Threat Hunting
  • Next Generation Intrusion Detection System

Cloud

  • Monitor Critical Cloud Workloads
  • Detect Supply Chain Attacks
  • Cloud Detection and Response
  • Respond to Alerts That Matter
  • Security for AWS
  • Security for Azure
  • Security for Google Cloud

IT Ops

  • Resolve Performance Issues
  • Support Distributed Workers
  • Reliably Scale to the Cloud
  • NetOps and SecOps Collaboration

More

  • Blog
  • Customers
  • Partners
  • Resources
  • About Us
  • Careers
  • Newsroom
  • Contact Us
  • Copyright ExtraHop Networks 2021
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube