• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

    Try It for Free

    Reveal(x) 360

    Light up your AWS
    environment.

    No friction.
    No credit card required.

    AWS Partner Network Competency
    Start Free Trial
  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • XDR
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • Education
    • U.S. Public Sector
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Bundle Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Appliance Policies
    • Knowledge Base
    Seattle Children's Hospital Logo

    Featured Customer Story

    Seattle Children's Hospital

    Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Splunk
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

Tips & Hacks Blog

  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

8.8.22

How to Identify Malicious Network and Port Scanning

Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn port scan detection methods to stop malicious behavior.

Christine Shaw

Read On

6.30.22

ExtraHop June TL;DR

This June, learn how CrowdStrike and ExtraHop make XDR a reality, get Reveal(x) 360 for AWS, understand CISA's guidance for Shields Up, DoS attacks, and more.

Paul Ditty

Read On

5.27.22

ExtraHop May TL;DR

This May, TL;DR is talking about the future of cyberwarfare, how to respond to the 2022 cyberthreat landscape, closing the network visibility gap, April Patch Tuesday, and more.

Paul Ditty

Read On

4.29.22

ExtraHop April TL;DR

This April, get an ExtraHop Shields Up assessment, cloud threat defense for AWS, detect and stop the Spring4Shell exploit, a Wakefield report on cyber confidence, and more.

Paul Ditty

Read On

3.31.22

ExtraHop March 2022 TL;DR

This March, learn about CISA's Shields Up, advanced threat detection for cloud, gain insight into two complementary MITRE frameworks, C2 beaconing, and more.

Paul Ditty

Read On

2.28.22

ExtraHop February 2022 TL;DR

This February, we introduce ExtraHop CEO Patrick Dennis, a 2021 ransomware retrospective, the near extinction of Maersk, a SOC survey, and more.

Paul Ditty

Read On

2.22.22

SANS Survey 2021: Your Security May Ride on SecOps Happiness

A SANS survey of modern SecOps can help CISOs understand what is adding stress for security teams, and what they can do about it.

Kelsey Milligan

Read On

2.18.22

What You Need to Know about BlackByte Ransomware as a Service

BlackByte is the latest ransomware group making headlines. Learn their playbook and how you can build an effective defense strategy.

Jesse Munos

Read On

1.28.22

ExtraHop January 2022 TL;DR

This January TL;DR blog includes a KuppingerCole report, a SANS 2021 SOC survey, a ransomware special report, cryptomining malware, and much more.

Paul Ditty

Read On

1.27.22

Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings

Use correlated, contextualized data to simplify response times, helping you regain the advantage.

Chase Snyder

Read On

12.17.21

ExtraHop December TL;DR

For December's TL;DR, we're talking about the Log4j exploit, SolarWinds SUNBURST attack one year later, cloud monitoring, decrypting traffic, and more.

Paul Ditty

Read On

11.19.21

ExtraHop November TL;DR

This November, TL;DR is showcasing breakthrough decryption for Microsoft environments, defending containerized environments, supply chain compromise, and more.

Paul Ditty

Read On

10.22.21

ExtraHop October TL;DR

This October, learn how to secure Microsoft 365 with Reveal(x) 360, accelerate zero trust adoption, SANS 2021 top threats, ransomware, and more.

Paul Ditty

Read On

10.14.21

Detecting Attacks Using Microsoft Protocol Decryption

Microsoft Active Directory is a favorite target for attackers, and traditional threat detection techniques are falling short. Learn why and what you can do.

Jesse Munos

Read On

9.28.21

Detect Malware in Encrypted Traffic for Improved Security Visibility

Encryption gives attackers dark places to hide. Learn which common solutions for network visibility fall short, and which can accurately detect advanced threats.

Jesse Munos

Read On

9.24.21

ExtraHop September TL;DR

In the first edition of TL;DR, we're talking about supply chain attacks, Reveal(x) for the education sector, how ExtraHop shut down a C2 beaconing attack, and more.

Paul Ditty

Read On

9.13.21

What Are Supply Chain Attacks?

A quick-read executive summary on what supply chain attacks are and what you can do about them.

Kelsey Milligan

Read On

9.9.21

Slow EDR Rollout Needs a NG-IDS Compensating Control

We pitted Reveal(x) against signature-based IDS to see which technology had the most comprehensive detections against advanced threats. Spoiler alert: Reveal(x) won by leaps and bounds.

Don Shin

Read On

8.27.21

The Threat Inside Your Network

Financial services institutions are a common target of supply chain attacks. Learn how to prevent, detect, and respond to this persistent threat.

Tom Clavel

Read On

7.26.21

SANS on Defining and Measuring Cybersecurity Visibility

Visibility is necessary for security but the concept isn't exactly clear-cut. Hear from SANS on defining visibility to help you confidently identify blind spots, strengthen security, and measure success on this cybersecurity KPI.

Carol Caley

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2023
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube