ExtraHop Reveal(x): NTA for the Cloud-First Enterprise
Reveal(x) Cloud: SaaS-based Threat Detection & Response
ExtraHop for Application and Network Performance
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Reveal(x) Now Detects Evidence of BlueKeep (CVE-2019-0708)
Get the skinny on LDAP encryption, including whether LDAP traffic is encrypted automatically and how you can best secure traffic using this protocol.
Learn what the OSI model is, why it still matters for security and IT, and what you're missing if you can't analyze one layer in particular.
Watch this 5-minute video to see how ExtraHop Reveal(x) network traffic analysis makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer according to the Shared Responsibility Model.
Explained in detail: Silly window syndrome, how it degrades network performance, and how to avoid it.
Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.
How to use TCP_NODELAY, Nagle's Algorithm, QUICKACK, and more settings and algorithms to get better TCP performance on your network.
Learn what SMBv1 is and why should you shut it down immediately before this exploit can be used against you.
Network Traffic Analysis (NTA) vs. SIEM: What are the key differences, and how can these two types of security solution work together for a proactive, cost-effective, and scalable SOC? Dive into our blog series for the answers.
Dive into our blog series comparing network traffic analysis products to traditional security solutions with this bakeoff between NTA and Intrusion Prevention Systems (IPS).
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
In an effort to rid the world of needless application and network performance slowdowns, we turn to retransmission timeouts (RTOs). What are they and what can you do about them?
What Is TCP…
Watch this 3-minute video to learn how ExtraHop Reveal(x) uses network traffic analysis to help you quickly and easily audit your network for expired certifications, weak ciphers, and more.
Are you interested in the benefits of network traffic analysis but want to understand exactly how network detection and response solutions compare to the enterprise security technology you already know? This blog series will give you the answers in detail. Let's start by comparing network traffic analysis to intrusion detection systems.
What's the difference between TCP and HTTP? How do they both work, and how do they work together? Read the blog for definitions of both protocols as well as a breakdown of what makes them different.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts. Read this step-by-step case study to learn the basics of confirming and investigating a breach using ExtraHop Reveal(x), network traffic analysis for the enterprise.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.