ExtraHop Reveal(x): NDR for the Cloud-First Enterprise
Reveal(x) Cloud: SaaS-based Threat Detection & Response
ExtraHop for Application and Network Performance
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Gain an understanding of AIOps by learning about its definition, specific use cases, and Gartner's take on this important need for enterprise businesses.
See four real-world examples of vendors 'phoning home' data without authorization, plus get data security best practices and questions you should ask vendors.
If your enterprises is rushing to adopt TLS 1.3, read this infographic for the most important tips and cautions from Enterprise Management Association's latest research.
Some people might think it's enough to know there IS a box—but in cyber security (as in hunting serial killers), it's important to know what's inside...
Learn why east-west visibility and automated asset discovery from network detection and response products is critical for hybrid security in the internet-of-things era.
A thirty-minute briefing on how incident response teams can use the network as their most valuable data source for accelerated IR workflows.
A technical briefing on how network detection and response complements endpoint security and log analysis for achieving greater coverage of MITRE ATT&CK for Enterprise
How to use TCP optimization, Nagle's Algorithm, QUICKACK, and more settings and algorithms to get better TCP performance on your network.
Reveal(x) Now Detects Evidence of BlueKeep (CVE-2019-0708)
Learn how dwell time in security can hurt your programs and learn how to be proactive to reduce dwell time.
Get the skinny on LDAP encryption, including whether LDAP traffic is encrypted automatically and how you can best secure traffic using this protocol.
Learn what the OSI model is, why it still matters for security and IT, and what you're missing if you can't analyze one layer in particular.
Watch this 5-minute video to see how ExtraHop Reveal(x) network traffic analysis makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
Public cloud vendors have no choice but to take security seriously - but even the Big Two (AWS and Azure) are still cloud vendors, not security vendors. Here's a breakdown of what cloud-native security really means for the consumer according to the Shared Responsibility Model.
Explained in detail: Silly window syndrome, how it degrades network performance, and how to avoid it.
Watch this 6 minute video to learn exactly what sets enterprise-class network traffic analysis products apart from the basic definition of the category and which capabilities are required to be truly best-of-breed.
Learn what SMBv1 is and why should you shut it down immediately before this exploit can be used against you.
Network Traffic Analysis (NTA) vs. SIEM: What are the key differences, and how can these two types of security solution work together for a proactive, cost-effective, and scalable SOC? Dive into our blog series for the answers.
Dive into our blog series comparing network traffic analysis products to traditional security solutions with this bakeoff between NTA and Intrusion Prevention Systems (IPS).
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.