ExtraHop Adds Application-Level Visibility to Cisco Tetration

New Integration Brings ExtraHop Real-Time Network Traffic Analytics to Cisco Tetration Analytics to Rapidly Detect Advanced Security Threats Like Ransomware

LAS VEGAS & SEATTLE - June 26, 2017 – Today at CiscoLive, ExtraHop announced it has completed integration efforts with Cisco Tetration Analytics™, adding essential threat detection and security policy enforcement from the data center to the cloud to the edge.

Through this integration, ExtraHop and Cisco customers can now realize the benefits of network traffic analysis for security. By combining industry-leading behavioral analytics, machine learning, and application layer visibility, Cisco and ExtraHop now deliver the industry's most targeted, accurate, and rapid security policy enforcement, helping customers thwart major threats. Cisco and ExtraHop will demo the new integration during CiscoLive, June 25-29, 2017 in Las Vegas. Visit ExtraHop Booth 329 or the Cisco Solutions showcase to learn more.


Cisco Tetration provides security policy enforcement for zero-trust implementations, detecting anomalous network behavior and automatically triggering enforcement policies. ExtraHop adds a new layer of valuable context through real-time application-level visibility, revealing the specific activity behind abnormal traffic patterns. This integration delivers both powerful insight, as well as the ability to detect incidents including:

  • Brute Force Logins: With this new ExtraHop integration, Tetration users can now detect a spike in database traffic and determine whether the traffic spike is due to brute-force login attempts, along with the specific tables that are being queried. ExtraHop applies Tetration annotations to identify the clients and servers involved. Tetration then executes security policies to isolate at-risk clients and servers.
  • Ransomware: Tetration customers can now detect Ransomware attacks in real-time with the ExtraHop platform's deep analysis of CIFS traffic and then take action to stop it. When ExtraHop detects a Ransomware attack, Tetration annotations are applied to identify the compromised hosts, which are then instantly quarantined with the application of security policies.
  • Certificate and Cipher Audits: ExtraHop audits the network to identify rogue and expired certificates and weak ciphers, and applies Tetration annotations to identify affected servers so that users can take remedial action.

"The powerful combination of Cisco Tetration and ExtraHop provides customers with a high degree of network security and manageability," said Raja Mukerji, co-founder and Chief Customer Officer at ExtraHop. "IT and security operations teams now have the visibility they need to understand the who, the what, and the where, and automatically enforce crucial security policies based on that real-time insight."

To learn more about the power of ExtraHop and Cisco, visit our technology partner page: https://www.extrahop.com/partners/tech-partners/.

For more details on the integration, check out the datasheet.

About ExtraHop

ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the attack. The company’s Reveal(x) 360 platform is the only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. When organizations have full network transparency with ExtraHop, they see more, know more, and stop more cyberattacks. Learn more at www.extrahop.com

© 2023 ExtraHop Networks, Inc. Reveal(x), Reveal(x) 360, Reveal(x) Enterprise, and ExtraHop are trademarks of ExtraHop Networks, Inc.

Press Contact