Reveal(x): Network Traffic Analysis for the Enterprise
Analytics and Investigation for IT Operations
Security and Performance for the Hybrid Enterprise
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Bold Vision. Huge Effect.
Change Agents Welcome
Get the Latest
What's the difference between TCP and HTTP? How do they both work, and how do they work together? Read the blog for definitions of both protocols as well as a breakdown of what makes them different.
Cyber security experts are in high demand but many so-called threat hunters begin as network engineers, admins, or analysts who are thrown into the deep end without much security training or experience. If that's you, read this step-by-step case study to learn the basics of confirming and investigating a breach using wire data.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer.
Watch this 3-minute video to see how the unique Signal Metrics feature in Reveal(x) highlights behaviors that could be impacting your security posture and reducing your hygiene and compliance so you can quickly act on these potential vulnerabilities.
A new 'DemonBot' is exploiting remote code execution in Hadoop YARN to build a huge botnet, but the possibility of data theft via this exploit also looms large. Here's how to detect it quickly.
Watch this 3-minute video to see how you can use ExtraHop Reveal(x), network traffic analysis for the enterprise, to quickly investigate suspicious communications identified by third party threat intelligence feeds using STIX files.
Why is decryption crucial for SecOps analysis, especially for the growing enterprise security category of Network Traffic Analysis (NTA)? Watch the video or read the deep dive blog to learn about specific attack behaviors that cannot be detected without full decryption capabilities.
Watch this 3-minute video to see the full Reveal(x) investigation workflow and learn how SecOps can use network traffic analysis to go from high level threat intelligence to the actual contents of suspicious packets in a matter of minutes.
Watch this 6 minute video to prep for Gartner's upcoming Network Traffic Analysis Market Guide by learning exactly what NTA for the enterprise means and which capabilities are required to be a truly best-of-breed product in this category.
Learn why Perfect Forward Secrecy is more important than ever, and how IT Ops and SecOps must work together to improve cyber security without losing visibility.
What are containers? What are microservices? What major benefit do many companies fail to take advantage of when they use microservices? Watch the video to find out!
Get to know the latest about DDoS attacks by learning about attack types, mitigation strategies, and how to protect your website.
What is AIOps, why is Gartner talking about it, and why should you care?
What is TCP windowing, and how can you scale effectively and solve congestion problems and other issues? Read the blog to find out, updated for 2018!
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
In an effort to rid the world of needless application and network performance slowdowns, we turn to retransmission timeouts (RTOs). What are they and what can you do about them?
What Is TCP…
Next gen security programs will be measured by dwell time more than any other metric. Here's why.
How to use TCP_NODELAY, Nagle's Algorithm, QUICKACK, and more settings and algorithms to get better TCP performance on your network.
How to defend against WPAD exploit aPAColypse now
Learn about doxware, including why it's becoming more and more popular to cyber criminals, and how to protect against a doxware attack.