By allowing our people, products, and services into your environment, we recognize the trust you have placed in our organization. ExtraHop is committed to protecting our customers. Your security and privacy are considered in everything we do.
Secure Development Practices
ExtraHop believes in a secure development process that starts with a Secure Development Lifecycle.
- Design: ExtraHop starts with secure designs, using threat modeling and secure design techniques to build secure software.
- Construction: ExtraHop uses modern tools with security functions enabled to build secure software.
- Test: ExtraHop performs security testing on all components.
- Vulnerability response: ExtraHop believes that once software is shipped, we still have an obligation to keep our customers secure. If issues are found, we issue updates.
It should come as little surprise that our internal teams use ExtraHop to get great visibility into our own networks, allowing our IT and security teams to identify potentially malicious activity, just as our customers do.
You Own Your Data
ExtraHop believes your data belongs to you, and you should be able to store it, move it around, and analyze it in the ways that work best for you. For more information on how we enable you to use your data however you choose, read about our Open Data Stream technology.
Contact us About Security
If you have found a security issue in our product or want to speak with us about security, feel free to contact us at firstname.lastname@example.org.