• The Platform

    ExtraHop Reveal(x)

    Cloud-native visibility, detection, and
    response for the hybrid enterprise.

    Reveal(x) 360

    SaaS-based network detection
    and response.

    Learn More

    How It Works

    Reveal(x) Enterprise

    Self-managed network detection
    and response.

    Learn More

    How It Works

  • For Security

    For Security

    Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

    Use Cases

    • Comprehensive Inventory of All Devices
    • Detect Lateral Movement
    • Monitor Sensitive Data Movements
    • Respond to Alerts That Matter
    • Simple, Streamlined Threat Hunting
    • Next Generation Intrusion Detection System
    • See All Use Cases

    Security Resources

    • 2020 Gartner Market Guide for Network Detection and Response
    • 2020 SANS Network Visibility and Threat Detection Survey
    • Beginners' Guide to Network Detection and Response

    See All Resources

    Enterprise-Ready Integrations

    Crowdstrike Logo

    Detect network threats and automatically quarantine impacted devices.

    Read More...

    See All Integrations

    Featured Customer Story

    Ulta Beauty Logo

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    See All Customer Stories

  • For Cloud

    For Cloud

    Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

    Use Cases

    • Monitor Critical Cloud Workloads
    • Detect Supply Chain Attacks
    • Cloud Detection and Response
    • Respond to Alerts That Matter
    • Security for AWS
    • Security for Azure
    • Security for Google Cloud
    • See All Use Cases

    Cloud Resources

    • Using MITRE ATT&CK In Cloud and Hybrid Environments
    • Multi-Cloud Security: Removing Friction from the Development Process

    See All Resources

    Enterprise-Ready Integrations

    Amazon Web Services Logo

    Unified cloud security and monitoring with AWS and ExtraHop.

    Read More...

    See All Integrations

    Featured Customer Story

    Wizards of the Coast Logo

    Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop

    Read More...

    See All Customer Stories

  • For IT Ops

    For IT Ops

    Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

    Use Cases

    • Resolve Performance Issues
    • Support Distributed Workers
    • Reliably Scale to the Cloud
    • NetOps and SecOps Collaboration
    • See All Use Cases

    IT Ops Resources

    • 451: Digital Experiences Are Front and Center In Coping with Coronavirus
    • Office Shutdown: Securing an Increased Remote Workforce

    See All Resources

    Enterprise-Ready Integrations

    ServiceNow Logo

    Know and do more, faster. ExtraHop + ServiceNow makes IT service management even more seamless.

    Read More...

    See All Integrations

    Featured Customer Story

    The Home Depot Logo

    The Home Depot Builds Unified Customer Experience with Visibility from ExtraHop

    Read More...

    See All Customer Stories

  • Blog
  • More
    • Customers
    • Partners
    • Resources
    • About Us
    • Support
    • Support Overview
    • Documentation
    • Hardware Policies
    • Services
    • Services Overview
    • ExtraHop Reveal(x) Advisor
    • Deployment
    • Training
    • Training Overview
    • Training Sessions
    • Community
    • Customer Portal Login
    • Solution Bundles Gallery
    • Community Forums
    • Customer Stories

    Partners

    • Panorama Partner Program
    • Overwatch Managed NDR
    • Technology Integration Partners
    • Partner Portal Login
    • Become a Partner

    Resources

    • Customer Stories
    • Remote Access Resource Hub
    • All Resources
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Network Attack Library
    • Protocol Library
    • Documentation
    • Firmware
    • Training Videos
    • About ExtraHop
    • About Us
    • The ExtraHop Difference
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Careers
    • Careers Overview
    • Search Openings
    • News
    • Newsroom
    • Press Releases
    • ExtraHop in the News
    • Engage with Us
    • Contact Us
    • Upcoming Webinars and Events
    • Take the Live Demo

    Ulta Beauty

    ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop

    Read More...

    Crowdstrike

    Detect network threats and automatically quarantine impacted devices. Inventory devices not yet protected by endpoint security.

    Read More...

    2020 Gartner Market Guide for Network Detection and Response

    ExtraHop is a representative vendor two years running. Learn why.

    Read More...

    Newsroom

    Get the latest news and information about ExtraHop, including press releases and third-party coverage.

    Read More...

X button
Login
Logout
Start Demo

The Platform

For Security

For Cloud

For IT Ops

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop Reveal(x)

Cloud-native visibility, detection, and
response for the hybrid enterprise.

Reveal(x) 360

SaaS-based network detection
and response.

Learn More

How It Workscaret-right

Reveal(x) Enterprise

Self-managed network detection
and response.

Learn More

How It Workscaret-right

caret-left Back

For Security

Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.

Learn More

Comprehensive Inventory of All Devices

Detect Lateral Movement

Monitor Sensitive Data Movements

Respond to Alerts That Matter

Simple, Streamlined Threat Hunting

Next Generation Intrusion Detection System

caret-left Back

For Cloud

Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.

Learn More

Monitor Critical Cloud Workloads

Detect Supply Chain Attacks

Cloud Detection and Response

Respond to Alerts That Matter

Security for AWS

Security for Azure

Security for Google Cloud

caret-left Back

For IT Ops

Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.

Learn More

Resolve Performance Issues

Support Distributed Workers

Reliably Scale to the Cloud

NetOps and SecOps Collaboration

caret-left Back

Blog

Learn More
caret-left Back

Customers

Partners

Resources

About Us

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Visit Customer Portal

Support

Professional Services

Training

Solution Bundles Gallery

Community Forums

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Visit Partner Portal

Panorama Partner Program

Overwatch Managed NDR

Technology Integration Partners

Become a Partner

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Network Attack Library

Protocol Library

Documentation

Firmware

Training Videos

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Difference

What Is Cloud-Native?

Careers

Newsroom

Upcoming Webinars and Events

Blog | Tips and Hacks

  • All Posts
  • Security
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

2.26.21

Talking to the Board About the New Realities of IT Security

Between the recent shifts in remote access and headlines filled with high-profile cyber attacks, getting board approval has some increasing challenges. Get tips for talking to the board of directors about security.

Sri Sundaralingam

Read On

12.19.20

How to Identify Malicious Network and Port Scanning

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to identify malicious network scanning and differentiate it from benign behavior.

Christine Shaw

Read On

12.18.20

Analyzing the SUNBURST SolarWinds Attack Campaign For Threat Intelligence

SolarWinds attack: ExtraHop is sharing 1700+ suspicious IP addresses (for threat hunters and data scientists) that were associated with the Sunburst backdoor attack.

Todd Kemmerling

Read On

12.14.20

How to Detect and Respond to the SUNBURST Attack

Sunburst attack 2020: Learn how to detect and respond to the Sunburst backdoor supply chain attack with ExtraHop's spectrum of detection approaches.

ExtraHop

Read On

11.13.20

How Ransomware Works and How to Prevent It

Ransomware can cause irreparable damage. Learn how it works and how to detect it to stop attacks.

Kirsten Gantenbein

Read On

11.5.20

What Is PsExec and How to Protect Against Lateral Movement

PsExec is a Windows Sysinternals utility that enables IT administrators to run commands and executable binary files on remote servers, but it can also be used for stealthy lateral movement.

Kirsten Gantenbein

Read On

10.21.20

The Network, Security, and Cloud Blame Game

NetOps, SecOps, and Cloud teams often operate in silos. Improving collaboration and communication can help these teams resolve incidents faster.

Karen Crowley

Read On

10.19.20

What is DNS Tunneling and How to Protect Against It

Learn how DNS tunneling attacks work and what you can do to protect against them. Examples included!

Kirsten Gantenbein

Read On

10.14.20

Security Alert: 'Bad Neighbor' Vulnerability Affects Windows 10 Systems

The Windows 10 vulnerabilities unveiled by Microsoft on October 13 include a remote DoS (CVE-2020-16899) and a remote code execution flaw (CVE-2020-16898) dubbed 'Bad Neighbor'. Get the rundown on potential exploits and what you should do.

Jeff Costlow

Read On

10.13.20

SQL Injection Attacks: What Are They and How to Detect Them (with Examples!)

Learn how SQL injection attacks work and what you can do to protect against them. Examples included!

Kirsten Gantenbein

Read On

9.17.20

Professional Services Customer Success Stories: Scaling Digital Experiences During COVID-19

Learn how ExtraHop Professional Services helped one company secure a massive increase in personal teller machine use in lieu of in-person interactions.

Michael McPherson

Read On

9.16.20

Security Alert: Detecting CVE-2020-1472 Zerologon Exploitation with NDR

The recent Zerologon vulnerability (CVE-2020-1472) could allow attackers to get control of a Windows domain without any user credentials. Learn how it works and how to protect against exploits.

Jeff Costlow

Read On

9.11.20

Alerts That Matter: Knowing When (and How) to Take Decisive Action

Sophisticated cyberattacks go undetected for weeks or months, and when discovered, security analysts struggle to contain the compromise and assess its scope. Most detection tools are able to create incident tickets, but noisy detections quickly become "ticket spam" and contribute to the security analyst's challenge of rising above the noise.

Jesse Munos

Read On

9.4.20

How to Respond to Incidents Quickly Despite Intentionally Confusing False Flags

False flags are deliberately planted details meant to distract or mislead investigators. Learn what to look out for and how to get more context.

Chase Snyder

Read On

7.24.20

Ripple20: Finding Vulnerable Devices and Detecting Attacks

The Ripple20 group of vulnerabilities affects hundreds of millions of devices across many industries. Learn how to identify devices using the vulnerable Treck software and detect Ripple20 exploits.

Jeff Costlow

Read On

7.7.20

Easy Multi-Factor Authentication: JumpCloud SSO With SAML

Learn how you can leverage JumpCloud SSO with SAML for an uncomplicated approach to multi-factor authentication that works in environments without an existing identity provider.

Thomas Smith

Read On

5.5.20

TCP Windowing: What Is It, Scaling, and Tips

Learn about TCP windowing covering perspectives of a server as the receiver and a client as the sender.

Christine Shaw

Read On

5.2.20

The OSI Model Explained - 2020 Update

Learn about the OSI Model - explained layer-by-layer in language you can understand. Recently updated!

Dale Norris

Read On

3.2.20

Watch Out for These Creative Streaming Methods

ExtraHop doesn't just detect active threats... Prep for March Madness with our favorite examples of video streaming in the workplace.

Rachel Pepple

Read On

2.18.20

Top 3 Considerations for Enterprise IoT Security

IoT discovery, behavioral profiling, and advanced threat detection and response are critical for enterprise IoT security. Learn how ExtraHop Reveal(x) secures IoT.

Tom Stitt

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • Reveal(x) Enterprise

Security

  • Comprehensive Inventory of All Devices
  • Detect Lateral Movement
  • Monitor Sensitive Data Movements
  • Respond to Alerts That Matter
  • Simple, Streamlined Threat Hunting
  • Next Generation Intrusion Detection System

Cloud

  • Monitor Critical Cloud Workloads
  • Detect Supply Chain Attacks
  • Cloud Detection and Response
  • Respond to Alerts That Matter
  • Security for AWS
  • Security for Azure
  • Security for Google Cloud

IT Ops

  • Resolve Performance Issues
  • Support Distributed Workers
  • Reliably Scale to the Cloud
  • NetOps and SecOps Collaboration

Blog

More

  • Customers
  • Partners
  • Resources
  • About Us
  • Careers
  • Newsroom
  • Contact Us
  • Copyright ExtraHop Networks 2021
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube