All Pages
- ExtraHop Blog: Cybersecurity News, Alerts & Industry Trends
- Securing the World’s Most Notorious Hacker Conference
- Kurt Skowronek
- Healthcare Provider and ExtraHop: A True, Strategic Partnership
- Detect data leaks from employee use of ChatGPT
- How Reveal(x) stops sophisticated attacks, before they do real damage
- Myth vs Reality: 7 Common NDR Misconceptions
- Securing the gaps left by SIEM and EDR
- Why the Cloud Security market is so confusing, and how ExtraHop can help
- Performance Monitoring with ExtraHop Reveal(x) NPM
- Retire That Noisy ‘90s IDS, Upgrade to the Next Generation of IDS
- Reveal(x) Network Detection and Response Datasheet
- Detect Data Leaks from Employee Use of Generative AI Tools
- Reduce Time-to-Value, Increase the Return on Your ExtraHop Investment
- Federal Cybersecurity Mandate Solution Brief | ExtraHop
- Myths vs Reality: Breaking the 7 Most Common Myths About Network Detection and Response
- Olivia Schouboe Elzinga
- Reveal(x) Demo: Detect Data Leaks from ChatGPT
- How Financial Services Firms Gain the Visibility to Earn Customer Trust in the Digital Era
- Webinar: How to Accelerate XDR Outcomes
- Tech and Talent - Challenges Operationalizing Effective Security Teams
- SANS 2021 Top New Attacks and Threat Report
- Wire Data Analytics & ITOA Newsletter
- Tony Gomez
- John Matthews
- Rachel Van't Land
- Adam Sinnett
- Anna Brown
- Bri Hatch
- Chris Blessington
- ExtraHop
- Jesse Rothstein
- John Smith
- Jon Garrison
- Nojan Moshiri
- Stacey Stovall
- Tom Roeh
- (ISC)² Webinar Series: Cloud-Native NDR: Shared Responsibility's Missing Link
- Top Threats to Cloud Computing: Egregious Eleven Deep Dive
- Walter Phillips
- Meet the Advanced Threats
- Accelerate 0-Trust Adoption W/ End2End Visibility & Increased Collaboration
- New Trends in Ransomware Response
- Improving Incident Response Time by 84%: A Forrester TEI Survey
- Selection Guide for Network Visibility Tools
- Leading Manufacturer
- Justin Carter
- Putting the "R" in the NDR
- 2020 SANS Enterprise Cloud Incident Response Survey
- ViaSat SANS What Works
- ExtraHop + CrowdStrike: ExtraHop Reveal(x) 360: Full-Coverage NDR and EDR, Built for When Seconds Matter
- Alexis Robbins
- 2020 SANS Enterprise Cloud Incident Response Survey: A Panel Discussion
- How CrowdStrike and ExtraHop Help to Augment Security for AWS Deployments
- Addressing Cloud Shared Security Responsibility with Packets and NDR
- The New Realities of Healthcare IT
- Unlocking the Ultimate Source of Truth in the Cloud — Network Data
- The Ripple Effect: Latent Vulnerabilities to Be Felt for Years to Come
- Aaron Paxson
- Kurt Shubert
- Brian Kaufman
- White paper: Stop Ransomware with a New Approach - ExtraHop
- Legal Documents and Policies
- Myles Grindon
- Justin Baker
- Kerry Bosworth
- Matt Weaver
- SC Media eBook on IoT Vulnerabilities
- Rob Bell
- Extending the Enterprise Network for Remote Workers
- Security Advisory: Ripple20 Vulnerabilities
- Black Hat Webcast Series - GCP Lateral Movement and Privileged Escalation Spill
- Forrester Total Economic Impact Study
- Unifying Security Across Multicloud, Hybrid, & Remote Deployment
- Enterprise IoT: Exploring the Threat of Unknown Devices on Your Network
- Mitchell Schwartz
- Matt Schurr
- NetOps and SecOps: Better Together
- Sonal Shetkar
- Contact Us
- Dark Reading Panel: The Next-Generation Security Operations Center
- 3 Ways to Use Your Network as a Force Multiplier for Incident Response
- Adam Hebert
- How to Get More Out of Your Splunk Deployment with ExtraHop
- You Can't Outsource Risk: Shared Responsibility in the Cloud
- ExtraHop Helps DDI Build a Leading IT Operation
- The Network: Cerebro for the Growing IT Enterprise
- Isaac Roybal
- Rachel Pepple
- Ryan Corder
- Ryan Kosai
- Tom Claeys
- Tony Grosinger
- Tyson Supasatit
- Vihar Chokshi
- Vincent Yesue
- Amanda Tillman
- Colin Walker
- Erik Giesa
- Terry Shaver
- Monitor Database Performance with ExtraHop Reveal(x)
- Mike Sheward
- Brittany Iwata
- Dave Monk
- Brent Blood
- John McGovern
- Robin Bloor
- Ken Pickles
- Nick Brackney
- Jeff Fry
- Voice Over IP (VoIP) Call Quality Monitoring with ExtraHop Reveal(x)
- Brian Barr
- Jeena Khan
- Kanen Clement
- How to Get More Signal, Less Noise for Your SIEM: Just Add Wire Data
- Arif Kareem
- Kira Helm
- Clint Hatton
- Carol Caley
- Building a Scalable Budget for Security Analytics with Network Detection and Response
- Vince Stross
- 2020 SANS Network Visibility and Threat Detection Survey
- Cybersecurity Insiders 2020 Threat Hunting Report
- ExtraHop + Splunk Integration - Supercharge SOAR with NDR
- Technology Partner: CrowdStrike
- Factoring IoT Devices into Detection and Response: A SANS Whitepaper
- Connected Device Security Report in the Time of COVID-19
- Less Time to Identify and Detect with Retrospective Coverage
- Automated Retrospective Detection with ExtraHop Reveal(x) 360
- The Next Evolution of IDS
- Instilling Cyber Hygiene Among Users and Creating a Culture of Cyber Safety
- A Cloud Carol: Visiting the Ghosts of Cloud Security, Past, Present, and Future
- What's in the Box?
- Cloud Security Fails of 2019 and Where to Focus in 2020
- What Works in SOC/NOC Integration: Improving Time to Detect, Respond and Contain
- Protect Your Hospital, Protect Your Patients
- Daren Presbitero
- Case Studies for Network Detection & Response
- Kshama Datar
- Raja Mukerji
- Tom Estep
- Eric Thomas
- Dissecting the NSA's 6 Phase Playbook for Hacking Networks
- Take Control of Your data center Migration & Consolidation Efforts with ExtraHop
- Jackie Haggerty
- Protecting Your SaaS Investment: Monitoring Office 365 Performance
- Anna Mowry
- EMA Research on ExtraHop Reveal(x)
- Enhance Your Application Performance Management Strategy with Wire Data
- Behind Every Ticket Is a Patient
- eBook: Healthcare IT's Top 3 Pain Points & How to Fix Them
- Bryce Hein
- ExtraHop Introduces Addy: Cloud-Based Machine Learning for Data-Driven IT
- Bhushan Khanal
- Jeff Costlow
- Shellie St.Louis
- Sam Richman
- The Business Case for Network Segmentation
- Kevin Tatum
- Christine Shaw
- Jenn Briden
- Joshua Goldfarb
- Inverting the Investigation Workflow
- GDPR Compliance for IT Operations with ExtraHop Reveal(x)
- ExtraHop Training
- Kirsten Gantenbein
- Ben Higgins
- Jaq Evans
- Zoltan Talaber
- Accolade Cuts Annual SIEM Spend by 60% with ExtraHop
- Remote Site Monitoring for a Cloud-Focused Future
- TCP Optimization Guide: Nagle Delays and Beyond
- Technology Partner: Big Switch
- Malcolm Fitzgerald
- Customer Story: Hospital Detects Ransomware with ExtraHop
- Customer Case Study: Fortune 500 Retailer
- Customer Case Study: Global Financial Institution
- Customer Case Study: Global Telecommunications Provider
- An East Coast University Gains Deep Insights with ExtraHop
- Brokerage Enhances Performance of Online Trading Application
- Gas Retailer Fuels Faster Networks and Applications with ExtraHop
- Technology Partner: Phantom
- Reveal(x) Enterprise: Network Detection and Response
- Financial Cybersecurity: Supply Chain Attacks | ExtraHop
- MongoDB NoSQL Database - Definition & How it Works - ExtraHop
- MSRPC Protocol - Definition & How it Works - ExtraHop
- Cybersecurity & Healthcare: How prepared are You?
- Molly Thompson
- Patrick Kreuch
- Reveal(x) NDR Solution for Security Operations
- TLS 1.3 and What It Means for Data Center Visibility
- Mike Campfield
- How ExtraHop Supports Your GDPR Initiative
- Stephen DeSanto
- ExtraHop Reveal(x) Deep Dive: The Critical Assets Filter for the SOC
- SANS 2019 Threat Hunting Survey
- NDR: Cloud Security's Missing Link
- SANS Institute: Threat Hunting for New and Experienced Hunters Panel Discussion
- Integrate IBM Security QRadar SIEM with ExtraHop to Automate Security
- Citrix ICA Protocol - Definition & How it Works - ExtraHop
- DHCP Protocol - Definition & How it Works - ExtraHop
- MySQL Protocol - Definition & How it Works - ExtraHop
- RADIUS Protocol - Definition & How it Works - ExtraHop
- SIP Protocol - Definition & How it Works - ExtraHop
- FIX Protocol: Definition & How It Works | Protocol Support Library
- HTTP Protocol - Definition & How it Works - ExtraHop
- RTP Protocol - Definition & How it Works - ExtraHop
- "The Five Ls" for Troubleshooting Citrix Performance Issues
- Mentha Benek
- Chris Witeck
- Ryan Davis
- Active Directory Monitoring
- Top Health System Gains Real-Time Application, Security, and Clinical Data with ExtraHop
- Application Lifecycle Management with ExtraHop
- SANS Institute NDR Product Review of Reveal(x) | ExtraHop
- CURO Delivers Customer Experience and Security with ExtraHop
- Application-Aware Network Performance Monitoring - ExtraHop
- Explore ExtraHop Products for Security, Cloud & Performance
- How Real-time Network Analytics Works - ExtraHop Performance
- ExtraHop NDR Solutions for Security, Cloud, & IT Ops
- The Threat Inside Your Network: Supply Chain Global Risk and Financial Services
- Exabeam and ExtraHop Integration
- Secure and Accelerate Healthcare Experiences
- Curbing the Flow of Ransomware: Real or Pipe Dream?
- Packet Forensics Readiness | ExtraHop
- Cyber Hat Trick: How Ransomware Gangs Exfiltrate, Encrypt & Exploit
- Detect and Investigate Advanced Threats
- InformationWeek: Monitoring Critical Cloud Workloads
- MeriTalk: Colonial Pipeline Hack Rockets Ransomware to Top of U.S. Security Agenda
- Reduce Time to Detect at Scale Using Network Detection and Response Tools
- Accelerate Zero Trust Adoption Through Complete Visibility
- Covert Security in the Cloud
- Detecting and Stopping Ransomware
- Gaining Complete Coverage in Cloud Environments
- Taking Back Control in the Cloud
- InformationWeek Monitoring Critical Cloud Workloads
- The Cloud Security Trifecta: AWS + CrowdStrike + ExtraHop
- Implement Zero Trust - ExtraHop Solutions
- Integrate NDR and SIEM - ExtraHop Solutions
- IDC Technology Spotlight: How Network Intelligence Tools Find an Adversary and Defend Against Advanced Threats
- How A Healthcare Org Boosted Their Security with Network Detection & Response
- SANS 2021 Report: Making Visibility Definable and Measurable
- Download PDF: integrated NDR + SIEM - ExtraHop
- APTs, Zero Days, and Supply Chain Attacks: Know the Difference and Prepare Accordingly
- Making Visibility Definable and Measurable - A SANS Panel Discussion
- National Finance Institution Transforms Security Operations and Gains Visibility with Extrahop Reveal(x)
- Breaking AD Trust Boundaries through Kerberos Vulnerabilities
- 4 Steps to Secure Cloud Migration
- It Is Always DNS, SUNBURST Confirms
- 3 Ways SecOps and NetOps Collaboration Saves Money & Stops Attackers Faster
- Incident Response Against Advanced Threats: What Changes After SUNBURST?
- CrowdStrike & ExtraHop Partner to Stop Breaches with Cloud-Native EDR and NDR
- Tarrant Regional Water District Mitigates Risk and Enhances Cybersecurity with ExtraHop
- How the Network Is Used to Unmask the Adversary
- Securing Cloud Assets: How IT Security Pros Grade Their Own Progress
- Stacie Corcoran
- IDC Market Share Report
- MSP Partner Program
- Cloud Security: Are You Doing It Wrong?
- ExtraHop Security Report: Lessons Learned Investigating the SUNBURST Software Supply Chain Attack
- ExtraHop Security Report: Lessons Learned Investigating the SUNBURST Software Supply Chain Attack
- Healthscare – An Insider's Biopsy of Healthcare Application
- Post Mortem: The First 72 Hours of SUNBURST Threat Intelligence Research
- Confiez La Sécurité de Vos Appareils Non Gérés et de Vos IoT
- SANS: A New Take on Cloud Responsibility
- Girard Ordway
- ExtraHop Case Study - IG Group Gains Complete Network Visibility and Reduces MTTR with ExtraHop
- 2023 Global Cyber Confidence Index
- Master Purchasing Agreement
- Supplier Anti-Bribery and Anti-Corruption Policy
- Supplier Code of Conduct
- Supplier Data Processing Addendum
- Supplier Information Security Addendum
- Driving a Stake in Advanced Threats (SUNBURST) with the Network
- Ransomware Attacks in 2021: A Retrospective
- SANS 2020 Cloud Security Solutions Report | Extrahop
- Doing XDR Right: What It Is and What it Can Do for Your Organization
- Cloud
- IT Operations
- Security
- How Reveal(x) Enterprise Detects Threats in Real Time
- Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review
- Beyond the Breach: Recommendations for Effective Response
- Integrate Microsoft Azure with ExtraHop for Cloud-Native NDR
- Encryption vs. Visibility: Why SecOps Must Decrypt Traffic for Analysis
- How Network Traffic Analytics Eliminates Darkspace for the SOC
- SOC Capabilities & Usefulness: SANS 2018 SOC Survey Results Pt 2
- No Single Definition of a SOC: Sans 2018 SOC Survey Results Part 1
- EMA: Network-based Security Analytics Market Takes Off
- Chetan Shah
- Technology Partner: Cerner Health
- Customer Story: bet365 | Wire Data: A Safe Bet for Optimisation and Security
- Ovum: ExtraHop Enters Network Detection and Response with Reveal(x)
- Technology Partner: ServiceNow IT Service Management
- Mark Fitzmaurice
- National Ignition Facility Protects U.S. Nuclear Arsenal and Explores Clean Energy with ExtraHop
- Digital Experience Monitoring & Analytics (DEM) | ExtraHop
- Application Analytics Solution for IT - ExtraHop Reveal(x)
- ExtraHop 2021 Cloud and Hybrid Security Tooling Report
- Consolidate Data Centers with ExtraHop Reveal(x)
- Cloud Network Detection and Response - ExtraHop Reveal (x) 360
- Cybersecurity for Remote Employees - ExtraHop Reveal(x)
- Detect Lateral Movement with ExtraHop Reveal(x)
- Detect Unusual Network Activity & Behavior with Reveal(x)
- Enhance Security Hygiene with ExtraHop Reveal(x)
- Identify Network Performance Issues with ExtraHop Reveal(x)
- Improve Mean Time to Respond (MTTR) with ExtraHop Reveal(x)
- NetOps and SecOps Collaboration with ExtraHop Reveal(x)
- Secure Sensitive Data with ExtraHop Reveal(x)
- Securely Migrate Workloads to Cloud with ExtraHop Reveal(x)
- Simplified Threat Hunting with ExtraHop Reveal(x)
- Use Cases - ExtraHop Reveal(x)
- Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
- SANS Product Review: Analyzing Malicious Behavior Effectively with ExtraHop Reveal(x)
- Reveal(x) - Next Gen Intrusion Detection System (NG-IDS)
- Customer Cloud Security: A SANS Survey
- Todd Kemmerling
- Customer Story: VERBUND
- NetSecOps E-Book: Now is the Time for Network & Security Collaboration
- Why the Time is Right for Network and Security Collaboration
- Zero Trust in the Modern Security Landscape
- Kelsey Milligan
- Tom Clavel
- Beyond DarkSide: How to Catch & Stop Next-Gen Ransomware
- 3 Ways to Improve Your Cloud Security
- Jamie Moles
- Mario Perozo
- Preston Crowe
- Network Detection and Response (NDR): Definition and ROI - ExtraHop
- SANS 2021 Cloud Security Survey
- Security Advisory: Insecure Protocol Usage Exposes Organizations to Cybersecurity Risk
- ExtraHop at RSA® Conference 2021
- Mark Bowling
- ExtraHop Periodic Table
- Stealing the Silver Lining from your Cloud
- Cloud Security Is Much More Than Prevention and Compliance
- Common Insecure Protocols: Infographic
- It's Time to Think More Broadly about Cloud Workload Security
- (ISC)² Webinar Series: Defending Against Advanced Threats in a Post-Compromise World
- Defining an XDR strategy: What does it mean for your organization?
- Part 2: Why Detection-First Posture Beats Prevention Every Time
- Part 1: Defending Against Advanced Threats with Integrated EDR & NDR
- Accelerate Detection and Response in Financial Services
- Central Oregon Radiology Safeguards Sensitive Medical Images and Data with ExtraHop Reveal(x)
- Network Security: Protecting Your Organization Against Supply Chain Attacks
- Reveal(x) 360 eBook
- SANS 2021 Cloud Security Survey Panel Discussion
- How Cloud Defenders Thwart Attacks Against Resilient Services
- Mike Goodwin
- Taxonomy of SUNBURST DNS Tactics
- Hybrid Security: Protecting Your Supply Chain
- Business Justification Calculator
- Secure Your Cloud Against Advanced Attacks with Network Detection and Response
- ExtraHop Reveal(x) Presents Hands-On Network Detection & Response
- Why the Network Matters in Cloud Security
- Don Shin
- 5 Need-to-Know Lessons From SANS to Stop a Breach Post Compromise
- Analyzing Malicious Behavior Effectively
- Cloud Shared Responsibility: A SANS White Paper
- Resources: Datasheets, White Papers, Analyst Reports, and More
- Network Protocols Glossary - ExtraHop
- ExtraHop Privacy Notice
- Chris Abella
- Matt Cauthorn
- Technology Partner: AppDynamics
- Technology Partner: Citrix Systems
- City of Geel dramatically improves application performance with ExtraHop
- Customer Case Study: Health Services Provider
- American Transportation Manufacturer Fast Tracks IT and Business Operations with ExtraHop
- Creighton Chamberlain
- ExtraHop Performance - Cloud Network Performance Solution
- ExtraHop Reveal(x) - Cyber Hygiene & Compliance Solution
- ExtraHop Reveal(x) - Threat Detection & Response 50% Faster
- Monitor Remote Site Performance & Security with ExtraHop
- Stop Advanced Threats - ExtraHop Reveal(x)
- Cyberattack Glossary - Definitions, Defense Tips, & Examples - ExtraHop
- FEDTalks Ep. #1: A Killer Combination - Proactive Threat Hunting and Modern NDR
- NFS Protocol - Definition & How it Works - ExtraHop
- Memcache Protocol - Definition & How it Works - ExtraHop
- TCP Protocol - Definition & How it Works - ExtraHop
- DNS Protocol - Definition & How it Works - ExtraHop
- Assure the Network. Assure the Patient.
- Lynda Allen
- Jeanie Gong
- 451: "Reveal(x) is clearly differentiated" in the Network Security Space
- Barbara Kay
- Cal Jewell
- Braiden Ludtka
- Leading Salesforce Application Partner Improves AWS Visibility with ExtraHop
- Internship Opportunities at ExtraHop | Seattle, San Francisco, New York
- Technology Partner: APCON
- Artificial Intelligence: A Relative Reality
- Jeff Deininger
- Karen Crowley
- The Role Frameworks and Privacy Regulations Play in Healthcare Cybersecurity
- Grant Gross
- Build Trust, Find Truth - Reveal(x) Customer Stories
- Migrate to the Cloud with Confidence
- ExtraHop for Performance IT
- Technology Partner: Gigamon
- ExtraHop Terms of Use
- In the News
- SANS Report: Factoring Enterprise IoT into Detection and Response
- Easily Integrate Reveal(x) with Splunk SOAR | ExtraHop
- ExtraHop Networks, Inc.
- Network Performance Management Demo
- Myths vs. Reality: Debunking 3 Common Misconceptions about NDR, EDR, and XDR
- Logging Mandate Should Put Data to Work
- See you there?
- Kevin McKenzie
- ExtraHop Professional Services Integrations Overview
- Strengthen Security Hygiene and Compliance
- Dan MacKenzie
- ExtraHop Integration with Amazon Security Lake
- The True Cost of a Security Breach
- Sarah Cleveland
- 5 Ways Financial Institutions Use ExtraHop Network Intelligence
- Accelerate Time-to-Value and Enhance Expertise with ExtraHop Professional Services
- ExtraHop Reveal(x): Reveal the Unknown and Unmask the Attack
- ExtraHop's IDS Network
- The Forrester Wave™: Network Analysis and Visibility, Q2 2023
- Extract Value From Your SOAR Faster with NDR
- Seamlessly Integrate Reveal(x) with Splunk SOAR | ExtraHop
- ExtraHop Case Study - Online Travel Agency Finds the Ticket to Ensuring Digital Experience in ExtraHop
- Encryption Weaponized
- 10 Critical Elements for Better Network Insight at Financial Institutions
- ExtraHop: Cloud-Native Network Detection and Response
- Demonstrating the Value of Cybersecurity: Lessons from a Global CSO
- The Role of NDR in Public Sector Security Strategies
- Avoiding Ransomware Checkmate
- 2023 Gartner Peer Insights™ Voice of the Customer for Network Detection and Response
- 5 Reasons Why Customers Use CrowdStrike and ExtraHop Together
- Federal Cybersecurity Law Solution Brief | ExtraHop
- ExtraHop Reveal(x) 360
- ExtraHop Reveal(x) 360 for Google Cloud
- Detecting, Analyzing, and Mitigating Targeted Attacks
- What's in the Black Box? | ExtraHop at Black Hat 2023
- The Role of NDR in Your Security Strategy
- XDR Report: Achieve the Promise of XDR Security | ExtraHop
- XDR Report: Achieve the Promise of XDR Security | ExtraHop
- Building Resiliency at Scale: Securely Accelerating Digital Transformation
- Technology Sprawl: The Hidden Disease of IT and What to Do About It
- Ransomware Attack - Definition, Examples, & Risk Factors - ExtraHop
- Cryptomining Malware - Definition, Examples, & Detection - ExtraHop
- DoS & DDoS Attacks - Definition, Examples, & Detection - ExtraHop
- Port Scanning Attack - Definition, Examples, & Detection - ExtraHop
- Brute Force Attack - Definition, Examples, & Detection - ExtraHop
- C2 Beaconing - Definition, Examples, & Detection - ExtraHop
- Cross-Site Scripting (XSS) Attack - Definition, Examples, & Detection - ExtraHop
- New IT Realities: A Panel Discussion on Rapidly Scaling Remote Access
- Network Visibility and Threat Detection: A SANS Survey
- Katie Lockett
- Security Report: Connected Devices in the Time of COVID-19
- DCSync Attacks - Definition, Examples, & Detection - ExtraHop
- HTTP Request Smuggling - Definition, Examples, & Detection - ExtraHop
- Malware Obfuscation: Techniques, Definition & Detection - ExtraHop
- Remote Services Exploitation: Definition, Examples, and Detection
- SQL Injection (SQLi) Attacks - Definition, Examples, & Detection - ExtraHop
- Supply Chain Attacks - Definition, Types, & Examples - ExtraHop
- Monitor Cloud Workloads - ExtraHop Reveal(x) 360
- Reduce MTTR with Cloud Forensics - ExtraHop Reveal(x) 360
- ExtraHop Case Study - U.S Xpress
- Rafal Los
- Serverless Application Security for AWS - ExtraHop
- Eradicate Active Software Supply Chain Threats
- Cybersecurity Solution for Educational Institutions - ExtraHop
- ExtraHop Personalized Demo
- ExtraHop Case Study - Brewin Dolphin Improves Security Visibility and Control
- Asante Health with ExtraHop
- ExtraHop Reveal(x) 360 for AWS
- Cyber: The Fifth Domain of War
- Dark Reading: The State of IT Operations and Cybersecurity Operations
- Multi-Cloud Security: Removing Friction from the Development Process
- How Reveal(x) 360 Detects & Responds to Threats in Real Time
- Detect Software Supply Chain Attacks
- ExtraHop 2022 Cyber Confidence Index - Asia Pacific
- ExtraHop Self-Guided Ransomware Attack Simulation
- IDC Global Security Products Analysis: From Power Point to Power Product, Where Is XDR Right Now?
- Catherine Segar
- The CIO-CISO Balancing Act in the Cloud
- Enabling Detection & Response Across Data Center and Cloud Apps
- How ExtraHop & AWS Power Frictionless Security in the Cloud
- On-Demand Webinar - How to Address Ransomware, an Unrelenting Threat
- Cybersecurity for the Healthcare Industry - ExtraHop
- DNS Tunneling - Definition, Examples, & Detection - ExtraHop
- Strategic XDR for Complete Enterprise Intelligence - ExtraHop
- State and Local Government Cybersecurity Solution - ExtraHop
- Federal Civilian Cybersecurity Solution - ExtraHop
- ExtraHop Self-Guided Cloud Attack Simulation
- 2022 Cloud Security Friction Survey
- Cybersecurity for Defense & Intelligence Agencies - ExtraHop
- ExtraHop Case Study - Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data
- ExtraHop Case Study - BAC Credomatic Meets Compliance Standards, Safeguards Against Ransomware with ExtraHop
- Ferris Anwar
- Meridith Levinson
- Michael Clark
- Forrester®: The Total Economic Impact™ of ExtraHop Reveal(x) 360
- Financial Services Cybersecurity Solution - ExtraHop
- 2022 Gartner® Market Guide for Network Detection & Response
- Volume & Visibility: Solving Two of Security's Biggest Challenges
- Accelerate Compliance and Modernize Network Visibility
- How XDR Gets Real: Stop Advanced Threats with CrowdStrike and ExtraHop
- Benchmarking Cyber Risk and Readiness Report
- ExtraHop Self-Guided Supply Chain Attack Simulation
- Pete Lavache
- Webinar: Extract Value From Your SOAR Faster with NDR
- Secure Your Cloud Migrations with Reveal(x) 360 - ExtraHop
- Stopping the New Breed of Advanced Encrypted Threats
- Stop Ransomware and Protect Vital Public Sector Services
- Securing Containers in the Cloud
- Cloud Threat Defense for AWS
- Reveal(x) 360 Cloud Threat Defense for AWS
- Diversify Defense — Improving Cybersecurity Through Smart Consolidation
- Shared Responsibility Quiz
- City of Dallas Customer Solution Video Page
- NDR for AWS Cloud Security - ExtraHop Reveal(x) 360
- The Machine-Assisted SOC: Fantasy or Reality?
- Guide for Extracting Value from SOAR Faster with NDR
- Solving the Security Paradox
- Zero Trust in the Public Sector
- Cyber Confidence Index 2022
- SC Media: Why Decryption Matters
- Patrick Dennis
- SANS 2022 ATT&CK® and D3FEND™ Report: Incorporating Frameworks in Your Analysis and Intelligence
- Ransomware Retrospective 2021: Mastering the Cyber Hat Trick
- SANS 2022 ATT&CK and D3FEND Report: Incorporating Frameworks into your Analysis and Intelligence
- SANS: Modernizing Security Operations Survey
- The Last Line of Defense Against Breaches
- SANS: Modernizing Security Operations
- Log4Shell: Impact & Lessons Learned
- Targeting Microsoft: Ransomware Techniques and How to Spot Them
- KuppingerCole Report NDR Leadership Compass
- SANS 2021 SOC Survey
- ExtraHop Media Kit and Brand Guidelines
- InformationWeek: Closing the Visibility Gap
- SANS 2021 Network Visibility and Threat Detection Survey
- A Network-Based Approach to Cloud Workload Security
- ESG and ExtraHop - Cloud Security: Eliminate Coverage Gaps & Friction with a Network-based Approach
- SANS 2021 Survey: Impacts on Cloud and the Remote Workforce
- Beginner's Guide to Network Detection and Response for Hybrid Security
- Nice to Have or Have to Have? The Case for Cyber Insurance
- ExtraHop Reveal(x) Expands Attack Investigations to Cover All Vectors
- Press Releases
- Detect Encrypted Attacks with Strategic Decryption - ExtraHop
- Part 2: Take the Fight Against Ransomware to the Cloud
- Part 3: Slamming the Door on IT Ransomware: Why 80% of Victims See Repeat Attacks
- Scalable Long-Term PCAP Repository
- Part 1: Five Ways Attackers Leave Themselves Vulnerable to Detection
- Corey Bodzin
- Application Analytics eBook
- MITRE Att&ck Framework - Network Detection & Response with Reveal(x)
- MITRE Att&ck Framework: Network Detection & Response White Paper
- Cy Borg
- Microsoft 365 Integration
- Network Detection & Response: How Reveal(x) Detects Threats
- Cloud Container Security - ExtraHop Reveal(x) 360
- ExtraHop Reveal(x) Cloud-Native Network Detection & Response
- Forensics Readiness Speeds Root Cause Analysis, Impact Scoping, & Recovery
- Monitoring Microsoft 365 with Reveal(x) 360 NDR
- ExtraHop in the News
- Get a Free Trial of ExtraHop Reveal(x) 360
- Encryption is Eating The Enterprise: Learn How To Thrive In The Age Of TLS 1.3
- Sheryl Loeffler
- Zach Balter
- International Cruise and Excursions gets complete visibility with
- The Home Depot Builds Unified Customer Experience with Visibility from ExtraHop
- How Network Detection & Response Makes the CIS Controls Easier
- ExtraHop Reveal(x) - SSL/TLS Decryption
- Integrate SecOps and NetOps to Secure Customers' Experience
- 72-Hours-to-Disclose Survival Guide
- EMA Report: TLS 1.3 Adoption in the Enterprise
- Rise Above Complex Workflows: Practical Ways to Accelerate Incident Response
- EMA: Top 3 Report and Decision Guide for Security Analytics in 2019
- Reveal(x) 360: Defense Designed for Advanced Threats
- Decrypt As If Your Security Depends On It
- Amélie Darchicourt
- SANS Institute NDR Product Review of Reveal(x) | ExtraHop
- NetSecOps — Scaling Your Security Talent
- ISSA International Series: New Trends in Security — Outsourcing and Other Tech
- Black Hat Webcast Series: Ransomware Network Behavior and Defense
- IDC Workbook: Cloud Security Roadmap
- Dan Frey
- Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop
- Security Report: Connected Devices in the Time of COVID-19
- Security Report: Connected Devices in the Time of COVID-19 (Direct)
- Dark Reading: The State of IT Operations & Cybersecurity Operations 2020
- ExtraHop Partners
- Patrick Park
- Top Cloud Threats: Understanding and Responding to the Egregious Eleven
- Black Hat: How Attackers Confuse Investigators with Cyber False Flag Attacks
- IoT Network Device Monitoring & Security for Unmanaged Devices
- Understanding and Leveraging the MITRE ATT&CK Framework
- SANS Report: Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs)
- Closing the Critical Skills Gap for Modern Security Operations Center
- SANS Report: Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
- Completing the Triad, The Case For Leading With NDR
- Technology Partner: Check Point
- A Real Conversation About Post-Compromise, with Cyberwire's Dave Bittner
- Reveal(x) 360 - Multicloud & Hybrid Cloud Security Solution
- Migrating to the Cloud while Maintaining Security and Network Performance
- Celine Rosak
- Remote Access Resource Hub
- ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop
- Michael McPherson
- US Public Sector Cybersecurity Solutions - ExtraHop Reveal(x)
- How Attackers Confuse Investigators with Cyber False Flag Attacks
- Customer Stories: MAPCO Sets Sights on the Road Ahead with ExtraHop
- SANS 2020 Remote Workers Poll
- Thomas Smith
- How To Secure Remote Workers For The Long Haul
- Josh Snow
- Paul Ditty
- Time to Adapt – Integrating SecOps and NetOps
- Black Hat: Pragmatic DevSecOps - Cloud Edition
- Hill Physicians Medical Group with ExtraHop
- Office Shutdown: Securing an Increased Remote Workforce
- ExtraHop Deployment Services
- ExtraHop Performance - Remote Access Security Solution
- Using MITRE ATT&CK In Cloud and Hybrid Environments
- Sri Sundaralingam
- Cloud-Native Network Detection and Response
- Best Practices for Getting Better at Threat Hunting in 2020
- Mitch Roberson
- Best Practices for Network Security Threat Hunting with ExtraHop and Ixia
- From the Classroom to the Clinic, Touro College of Dental Medicine Delivers Seamless Education and Patient Care with ExtraHop
- Integrated Incident Response: A Panel Discussion about the SANS 2019 IR Survey
- Daniel Chu
- Edward Wu
- EMA: Bridging the Gap Between NetOps & SecOps
- Cloud Security Comes of Age: EMA Reviews Reveal(x) Cloud
- ExtraHop Security Advisory: Calling Home
- SANS 2019 Incident Response Survey
- EMA's Review of ExtraHop Reveal(x) Cloud
- Border Gateway Protocol - Definition & How it Works - ExtraHop
- Remote Code Execution (RCE) Attack Definition & Examples - ExtraHop
- Monitor Third-Party Security Risks with Reveal(x) 360 - ExtraHop
- How Network Detection and Response combats advanced threats
- Extending DevSecOps Security Controls into the Cloud: A SANS Survey
- Network Visibility: Detecting the Threat from Within
- Extending DevSecOps Security Controls into the Cloud
- Aufdecken und Managen von nicht verwalteten Geräten
- Anomaly Based Malware Detection via the Network Detection and Response Toolkit
- Security & IoT Device Monitoring for Unmanaged Devices
- HTTP Request Smuggling in 2020
- How To Use Network Visibility For Deeper MITRE ATT&CK Coverage
- Common and Best Practices for Security Operations Centers: Panel Discussion
- Events
- Prisma Health Delivers Better Patient Care and Experience with ExtraHop
- SANS 2019 SOC Survey
- SANS 2020 IT Cybersecurity Spending Survey
- Tom Stitt
- Reveal(x) - Rightsized Cybersecurity for Midsize Businesses
- SANS Institute: 2020 Cybersecurity Spending Survey Panel Discussion
- Jesse Munos
- Technology Partner: Garland Technology
- NDR for Azure Cloud Security - ExtraHop Reveal(x) 360
- Reveal(x) 360 - Cloud Security Policy Enforcement Solution
- Reveal(x) 360 - Cloud Shared Responsibility Model Assurance
- Cloud Security Solution - ExtraHop Reveal(x) 360
- NDR for Google Cloud Security - ExtraHop Reveal(x) 360
- How To Increase MITRE ATT&CK Coverage with Network Traffic Analysis
- Webinar: How to Speed Incident Response with Network Data
- An Executive's Guide to Integrating NetOps and SecOps
- Response Automation with Reveal(x)
- Technology Partner: Palo Alto Networks
- Become a Threat Hunter in Your Enterprise
- SANS Webinar: The State of Cloud Security - Panel Discussion
- SANS 2019 Cloud Security Survey
- The State of IT Operations & Cybersecurity Operations
- Technology Partner: Cisco Systems
- Dale Norris
- Black Hat Webinar: Securing Active Directory Administration
- Tiffany Lieu
- Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
- Blog Authors
- ExtraHop Panorama Partner Program
- How IT Security Teams Can Use Machine Learning to Improve Data Defense
- Security Visibility with Sportingbet
- Channel Partners
- ExtraHop Support
- Cloud Service Status
- IT, Engineering, Marketing & Sales Jobs at ExtraHop | Seattle, San Francisco, New York
- E-Commerce and Retail Cybersecurity Hub
- Technology Partner: Ixia
- PCI Compliance Service - ExtraHop
- Resident Solutions Architect Service - ExtraHop
- ExtraHop Services for Cybersecurity & IT Operations
- Explore ExtraHop Reveal(x) Integrations
- The ExtraHop Story - About Us
- Monitor SDN & Virtualization with ExtraHop Performance
- Reveal(x) - Cloud Infrastructure Security
- Reveal(x) 360 - Cloud Hybrid Security Solution
- Reveal(x) 360 - Cloud Migration Solution
- Triage & Troubleshoot Network Performance Issues Faster
- Reveal(x) - Modernize Your Security Operations Center
- ExtraHop Reveal(x) - Enterprise IoT Security Solution
- NTLM: Definition & How it Works | Protocol Support Library
- ActiveMQ Protocol - Definition & How it Works - ExtraHop
- Kerberos - Protocol Definition & How it Works - ExtraHop
- SAP ASE Protocol - Definition & How it Works - ExtraHop
- RTCP XR Protocol - Definition & How it Works - ExtraHop
- Db2 Database - Definition & How it Works - ExtraHop
- CIFS Protocol - Definition, How it Works, and SMB - ExtraHop
- SMTP Protocol - Definition & How it Works - ExtraHop
- ICMP: Definition & How it Works | Protocol Support Library
- Appliance Policies
- Four Ways Network Traffic Analytics Can Supercharge Your SOC
- Ransomware Mitigation & Detection Solution - ExtraHop
- Sitemap
- Training Sessions
- ExtraHop Cybersecurity Solution by Industry
- Chase Snyder
- Diameter Protocol - Definition & How it Works - ExtraHop
- Oracle - Definition & How it Works - ExtraHop
- Technology Partner: Microsoft
- HL7 Protocol - Definition & How it Works - ExtraHop
- Telnet Protocol - Definition & How it Works - ExtraHop
- LDAP Protocol - Definition & How it Works - ExtraHop
- Technology Partner: Amazon Web Services
- Leader in Cloud-Native Network Intelligence | ExtraHop Leadership Team
- ExtraHop Board of Directors
- ExtraHop Case Study - MEDHOST Uses ExtraHop Reveal(x) to Help Protect Healthcare Customers and Patients
- ExtraHop Reveal(x) - Network Performance Monitoring Solution
- On-Demand Webinar - Protecting Against Ransomware - ExtraHop
- Reveal(x) 360 - Network Detection & Response for Cloud
- Integrating Network Analytics Into Your Security Architecture
- Dan Tucholski
- Ted Driggs
- Situational Intelligence for Cyber Hunters
- Cegedim Ensures Mission Critical Service Delivery with ExtraHop
- Ashley Stewart
- ExtraHop Security & Compliance
- ExtraHop Demo for Reveal(x)
- Apply for IT Jobs At ExtraHop | Seattle, San Francisco, New York
All Blog Posts
- War Stories or: How I Learned to Stop Worrying and Love the New Application
- An iPhone for the Holidays?
- CIP Firewall
- Do you know the 7 Deadly Sins of Network Management?
- New Year Resolutions for Network Engineers
- ExtraHop: Like Google Earth for Your Network
- Replay of an IT Support Incident - ExtraHop In the Wild
- The Curious Case of Packet Sniffers
- The Management Impact of Virtualization
- When Your CFO Can't Email
- Unified Computing Demands Unified Management
- Survey Says: No Business Case for IPv6, We'll Use NATs instead
- Speed Up Your Cloud
- I come to work daily to defend my job
- ExtraHop Announces $5.1M in Series A Funding
- Vendor Chronicles Part I or: How I Learned to Stop Worrying and Saved $1M
- Moving Towards the Private Cloud
- Stop Fighting With Your Management Tools
- Transatlantic Latency On Your LAN
- The Big Internet Brown Out of 2012?
- Fighting with Your Management Tools and You Don't Even Know It?
- When Alerts Actually Become Useful
- Top 10 Tips for Tuning BIG-IP
- Separate Marketing Hype from Product Reality
- Fix Application Problems 200% Faster Than Your Competition
- When L3 Stats Just Aren't Enough
- When Virtual Servers create real headaches
- Optimize Application Performance in a Day
- No, We Run at 10 Gb
- L7 Visibility into Your "Middle Boxes"
- Network World's Top 10 IT Management Start-ups to Watch
- The Biggest IT Stories of 2009
- What Matters Most in 2010
- Network Timeout gets nominated for Best of Interop!
- Interop panel: EMC, CA, and Jesse from ExtraHop
- We're hitting the ground running at Interop—and launching Network Timeout!
- F5 partners with ExtraHop
- ExtraHop Wins Best of Interop—twice!
- ExtraHop Selected by Globespan Capital to Present to its CIO Advisory Board
- ExtraHop Presenting at Morgan Stanley's CTO Summit
- Visit the ExtraHop booth at Cisco Live!
- ExtraHop exhibiting at the F5 Summit
- ExtraHop Makes Root-cause Analysis Easy for Alaska Airlines
- Network Timeout, a free web service from ExtraHop Networks, leverages AWS
- SLA Monitoring: Using Internal SLA's to Improve Application Performance
- Getting the Most Out of Your Network Management Investment
- ExtraHop in the U.K.
- Virtual Packet Loss: The Silent Killer of Network Performance
- Alaska Airlines uses ExtraHop to ensure that flights take off
- Blackouts, Brownouts, and Application Aware Network Performance Management (AANPM)
- End-to-End Application Performance Managment APM: ExtraHop Keynote Partnership
- Monitoring Storage I/O Latency with Application Performance Management Solutions
- ExtraHop Talks Big Growth at 7th Annual AGC Conference
- Database Application Performance Management, Database Performance Management Strategies
- Database Performance Monitoring: ExtraHop Monitors All Major Databases
- ITIL Management and Application Performance Solutions - ExtraHop APM
- Troubleshooting SAP with Application Performance Management (APM)
- ExtraHop and SevOne Partner for Application-Aware Network Performance Management
- Introducing Application Inspection Triggers: Just Another Day in the Life of an ExtraHop Agent Buster
- Application Performance Management (APM) + Database Activity Monitoring (DAM): It's [Not] All About the Agents!
- ExtraHop at Interop Las Vegas 2011
- Decrypt & Analyze SSL Traffic | SSL Decryption | Encrypted Application Performance Management
- Memcache Performance Monitoring, Action Message Format Performance Monitoring
- Monitoring Storage Performance, Monitoring Storage Access & Usage
- Monitoring Cloud Applications, ExtraHop Virtual Performance Monitor
- Big Data and Application Performance Management (APM) | Managing Big Data
- NAPM Performance Monitoring, Network-based APM Analyst Reports
- Troubleshooting Distributed Data Centers | Data Center Monitoring & Performance
- Gartner APM Magic Quadrant, Gartner Application Performance Monitoring
- Oracle Database Performance Monitoring, No Agents, No Profilers
- Data Storage, Digital Data Explosion, Monitoring Data Storage
- CIFS Errors: Analyze CIFS Metrics, Networked Storage Transactions
- By the power of ExtraHop, I found bugs!
- RIM BlackBerry Outage Oct. 2011 Preventable with Database Monitoring
- Lean Methodology for Application Performance Managment: Lean IT, Lean APM
- ExtraHop Application Inspection Triggers, APM, Innovation of the Year
- Avoid the IT Blame Game: ITBlame.com and Comments on PacketLife.net
- It's Time to Rethink Application Performance Management
- 2011 Innovation of the Year, Oracle & IBM DB2 Database Support, SSL Decryption
- Finding the APM Solution That's Best for Your Company
- Why Healthcare IT Teams Need Application Performance Monitoring
- Sujal Patel and Eric Scollard Join ExtraHop: Delivering Dynamic APM
- Application Performance Company ExtraHop is One of Seattle's Hottest
- Getting Clear on Virtual APM Appliances by Seeing Intra-VM Traffic
- Axstores Chooses ExtraHop to Ensure Smooth Application Migration
- Join ExtraHop at Interop Las Vegas 2012 and Citrix Synergy!
- Dealing with Application Performance Monitoring (APM) Data Overload, Part 1
- Dealing with Application Performance Monitoring (APM) Data Overload, Part 2
- ExtraHop Nominated for Stevie Awards for Application Performance Management
- The 2012 Gartner MQ for APM: What IT Operations Teams Need to Know
- Lowering the Cost of Entry for Application Performance Management (APM)
- Why ExtraHop + Splunk Integration Matters
- Top 10 Capabilities DBA's Gain with Agent-less APM from ExtraHop
- DevOps Collaboration with Application Performance Management (APM)
- Application Performance Metric of the Month: HTTP Payload Details
- Aberdeen APM Report: The Value of End-to-End APM and How to Achieve It
- Storage Performance Monitoring: 3 Metrics Needed for Holistic Visibility
- SharePoint Monitoring Questions Asked and Answered
- Under the Hood: How ExtraHop Takes Advantage of Mulit-core Processing
- ExtraHop wins Best of Interop in the Cloud Computing and Virtualization category
- Understanding Data Integrity: Preserving Meaning in Aggregation
- Wire Data: The Visibility You Need for Microsoft Environments
- Tap the Wire Data Inside Your Cisco UCS Environment
- A Little Bit Tech Geek, a Little Bit Rock 'n' Roll
- Looking for a Great Place to Work? We're #1
- ExtraHop Discovery Edition: A Port in the IT Storm for Businesses of All Sizes
- Making SDN Work: The Need for Persistent Visibility
- Transaction Tracing for Web Gateways, Load Balancers, and Other Proxies
- Healthcare in the Digital Age: Obamacare and the Information Security Imperative
- Prepare to Have Your Bits Rocked Off at the Battle of the Geek Bands
- How to Migrate to AWS with Cloud Monitoring
- What IT Can Learn from Target's Data Breach
- What's Next for Cloud Computing? Looking Back and Looking Ahead
- Why I Joined ExtraHop – One Wire Data Expert's Story
- Lean and Mean: Our Open-Source Enhancements to RPCAP
- Seahawks Get a Geeky Salute with ExtraHop's "Binary 12th Man"
- Detecting Malware Such as BlackPOS with ExtraHop
- Monitoring at Scale: Questions You Should Ask Your Vendor
- Paying Down Technical Debt in Your IT Infrastructure
- You Should Never Send to Know "For Whom the SYN ACKs"
- Five Ways to Strengthen Healthcare IT Security with Wire Data Analytics
- How Retailers Can Protect Themselves from POS Malware
- Why I Joined ExtraHop: It's All About 20Gbps in Real-Time
- More Time with Patients, Less Time Waiting for the Application
- Detect Heartbleed Exploits with ExtraHop's Free Download
- How ExtraHop's IT Team Performed a Heartbleed Audit Going Back Years
- Target's Data Breach: What IT Pros on LinkedIn Had to Say
- Seattle Children's Busts the "Ghost in the Machine" with ExtraHop
- Run Your "Microsoft Shop" Better with Wire Data Visibility
- Server Decommissioning: Wait, We Have How Many DNS Servers?!
- How to Move Beyond "Mean-Time-to-Innocence" with Wire Data
- See Which World Cup Matches Are Popular in Your Office
- ExtraHop Hearts Visio Stencils
- See Who's Using (or Abusing) Your Network
- What Caused My Web Server to Crash?
- Why IT Needs a Culture of Healthy Paranoia
- IT Operations Is Drowning in Data, But Thirsty for Insight
- Monitor Shellshock Attempts with ExtraHop
- Neuter the POODLE: Detect All SSLv3 Clients and Servers with ExtraHop
- Programming by Voice: Staying Productive without Harming Yourself
- The Big Data Opportunity for Healthcare with HL7 Analytics
- Detect and Track HTTP-based C&C Traffic for Backoff Malware
- Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP
- Community: The Icing on Your ExtraHop & Why I'm Here
- Turla Trojan Tactics Trounced
- ExtraHop Is the Proud Home of the Binary 12th Man!
- FTP Dashboard: Detect and Mitigate FTP Data Leaks
- The Four Data Sets Essential for IT Operations Analytics (ITOA)
- Healthcare's Y2K: The Dreaded ICD-10 Conversion
- ExtraHop's Top 5: FireEye, Turla, ICD-10 Conversions & More
- Step-by-Step Guide to Building Custom Dashboards | ExtraHop
- Outranging HTTP.sys Range-Based Attacks, Trigger Style
- Step-by-Step Guide: HL7 Analytics
- War Room Chronicles: Podcasting For Great Justice!
- Building Stellar ExtraHop Dashboards Part II: Chart Types
- Real-User Monitoring's Next Frontier is Context
- Geeksquee and More - Top 5 Moments from Interop 2015
- ITOA Spotlight: Turning IT Teams into Profit Centers
- ExtraHop Top5: June 8, 2015
- For AWS Monitoring, Conga Uses ExtraHop
- OPM Hack - What IT Can Learn
- A Portrait of the Artist as an IT Guy
- Is Your Job Candidate Technical Enough?
- Using Math Adds Up to Better Alerts
- Why I Joined ExtraHop: One Security Expert's Story
- How Lockheed Martin Uses Wire Data For Situational Awareness
- Join ExtraHop at VMworld 2015
- The Results Are In: "State of ITOA" Survey
- What is FHIR (Fast Healthcare Interoperability Resources)?
- Ready or Not, Here Comes ICD-10!
- What Is Wire Data? (Video)
- Learning a New Codebase? Static Code Analysis Is Your Friend
- Don't Fly Blind in the Public Cloud
- Become an ExtraHop Ambassador
- Meet ExtraHop at Splunk.conf 2015
- ExtraHop's Fall '15 Ambassador Program is Live
- New Community Forums are Live!
- Happy ICD-10 Day! Here's Some Required Reading for a Smooth Switch
- The Neglected Hero of IT Operations: Wire Data
- Delighting Users with ExtraHop 5.0
- Meet an ExtraHopper: Ashish, Software Engineer
- 3 Steps to Keeping Up in IT
- Quiet Time: The Secret to Finding Resource Leaks
- Good Times at ExtraHop's Southeast User Group
- IT Ops: A New Hope - Join ExtraHop at Gartner Data Center 2015
- Ambassador Update: Mystery Ambassador #1
- Meet an ExtraHopper: Briana, Regional Sales Manager
- Troubleshooting DHCP to Find The Ghosts in My Machines
- Trigger Optimization 101: Exception Handling
- Why I Joined ExtraHop: A Personal Stake in World-Changing Tech
- Build Custom Metrics for Any Application for better IT Operations Analytics (Continued)
- Trigger Optimization 101: Return Quickly
- Writing Malicious Code 101: Infinite Loops
- Trigger Optimization 101: Return or Exit()?
- Q&A: The Key to Healthcare Big Data Analytics
- Live Wire, The Next Dimension for Streaming Analytics
- Trigger Optimization 101: Accessing Metrics
- Meet an ExtraHopper: Eric, Principal Software Engineer
- How to access the ExtraHop REST API using Java
- How Much Data Does The Super Bowl Create?
- 2015: The Year The Data Breach Got Personal
- The NSA's Worst Nightmare
- HIMSS 2016: This is going to be huge
- The First Question A Support Engineer Should Ask You
- Celebrating Badass Women in STEM Throughout History
- Three Reasons to Meet ExtraHop At An Upcoming VMUG
- The Power of Platforms & A DevSecOps Approach
- Meet an ExtraHopper: Lisa, Director of Field Sales Enablement
- How the Healthcare IT Mindset is Evolving (For The Better!)
- Introducing Rose Gold. Style at Scale.
- Getting LEAN: How to Work Smarter in Healthcare IT
- ExtraHop is on the shortlist for two Best of Interop 2016 awards!
- A Huge Thank You to Our 2015 Partners of The Year
- ExtraHop Is the Top Big Data Solution of 2016
- LDAP Definition & Basic Guide to How It's Used
- ExtraHop 5.2: Small Appliance, Big Vision
- An Open Letter from ExtraHop CEO Jesse Rothstein: The Time Has Come for Radical Transparency in Network Performance Monitoring
- For Ransomware Detection, Behavior Beats Signatures
- Speed of Information is Critical for IT and Business
- Stop IT Shaming
- ExtraHop Sweeps Up at Citrix Synergy
- Infographic: Mobile Carrier Replaces 20 Troubleshooting Tools with One Comprehensive Monitoring Platform
- How to Connect the ExtraHop REST API to Highcharts
- The MRI for Federal Electronic Health Records Systems
- VIDEO: ExtraHop Co-Founder Talks iPhone Hacking & IT Visibility at Infosecurity Europe
- Dogfooding ExtraHop for Customer Service Insights
- VIDEO: Keeping Paychecks On-Time at The Department of Veterans Affairs
- Real-Time VoIP Monitoring with Wire Data Analytics
- Real-Time Operational Intelligence at Cisco Live
- Survey: The 7 Biggest Hurdles for IT Teams Implementing Big Data (And How to Get Past Them)
- Stop IT Shaming at Cisco Live!
- Is the Network the Next IT Revolution?
- How to Automatically Detect and Block Ransomware
- VIDEO: ExtraHop Enables Seamless IT Operations at Phoenix Children's Hospital
- IT Industry Leader Arif Kareem Joins ExtraHop as CEO
- How to Get ExtraHop Metrics in AWS Cloudwatch
- Above the Hype: 3 Lab Tests Prove ExtraHop Is as Good as We Say It Is
- Customer Video Series: "Total Visibility with a Single Monitoring Platform"
- Automating Ransomware Prevention with ExtraHop and Citrix Octoblu
- The Human Impact of Hyperscale IT Failure
- Finding Answers to Your ExtraHop Questions Is Easier Than Ever
- Virtual Reality, ExtraHop, and VMworld 2016
- Backup on the Wire: Recover Ransomware-Encrypted Files from Packet Capture
- Webinar: Ransomware and How to Stop It
- Survey Says: ExtraHop Ranks High on Net Promoter Score Comparison
- Infographic: Seeing Through The IT Vendor Hype Machine
- What's New in ExtraHop 6.0?
- Why The Network Is Eating The Enterprise
- Yes, Ransomware Can Take A Bite Out Of Your Apple
- The Next Digital Divide Is the Network
- Announcing the First Ever ExtraHop Bundle Programming Contest
- Protect Yourself from a Recent MySQL Zero-Day
- You Don't Have To Understand Wire Data To Benefit From It
- Clicks and Keys: The New Unit of Labor in IT
- Helping Healthcare Catch FHIR - HL7 Standards & the Future of Health Data
- Q&A with a CIO: How Health IT Leaders Decide Which Technology To Buy
- 451 Research: ExtraHop Goes with the NetFlow
- Rethink the Network: Putting All IT Roles in Control
- You Cannot Fix What You Cannot See
- Don't Trust Log Data! Lessons from the Cryptonomicon
- Log Data vs. Wire Data: Why There's a Clear Winner
- The Equation For Data Value and Information Superiority
- The NSA Doesn't Need Zero-Days to Crack Your Network
- Meet the ExtraHoppers: Brittany and Terry
- CRN: ExtraHop a Top Innovator in Data Security for Ransomware Solution
- Meet the ExtraHoppers: Mike and Emily
- Customer Success: Liberty + AppCentrix
- Don't Be A Stranger to Identity Management
- It's Your Data, You Can Stream if You Want To
- The Year In Ransomware
- What's New in ExtraHop 6.1?
- How-to: Spot Data Thieves Even If They Drop the Audit Table
- Bundle Up!
- ExtraHopping in AsiaPac
- Microsoft Will Block SHA-1 Certs in 2017. Here's How to Find Them.
- ExtraHop's Miracle Elixir (Good for Your Healthcare)
- A New Year, A New Way
- A Hidden Gem in the Emerald City
- Beginner's Guide to the ExtraHop Explore Appliance
- AppDynamics Acquisition
- A Company of Immigrants Speaks Out
- RSA 2017: Ad Hoc Threat Intelligence with ExtraHop and Octoblu
- Introducing ExtraHop Addy: AI Comes to IT
- ExtraHop Addy: Machine Learning Comes to IT Anomaly Detection Service
- HIMSS 2017: ExtraHop's Role In Healthcare Analytics
- Superhuman IT: A CIO's Perspective on ExtraHop Addy
- IT - Moving from Survive to Thrive
- Don't Stop at NPM. Start There.
- Pushing Packets to New Heights
- Once an Owl, Always an Owl
- RSA 2017 Recap: Always a Learning Experience
- Gathering Steam: 2017 FIRST Robotics Challenge
- Women In Tech @ ExtraHop: Jeena Khan
- Women In Tech @ ExtraHop: Margot Kriete
- Women In Tech @ ExtraHop: Archana Ragothaman
- Women In Tech @ ExtraHop: Jen Barrick
- UPA Makes It Possible
- Women In Tech @ ExtraHop: Briana Clark
- Women In Tech @ ExtraHop: Lisa Weir
- Women In Tech @ ExtraHop: Beth Kester-Warner
- Women In Tech @ ExtraHop: Jenn Briden
- Women In Tech @ ExtraHop: Sonal Shetkar
- Women In Tech @ ExtraHop: Jackie Haggerty
- Women In Tech @ ExtraHop: Rachel Pepple
- Know Your Network, Know Your Adversary
- Women In Tech @ ExtraHop: Palvi Mehta
- Azure Brings Cloud Into the Modern Security Era
- ExtraHop + ServiceNow IT Service Management
- IT Won't Recognize Itself by the End of the Year
- What's New in ExtraHop 6.2?
- The Data Growth Dilemma
- ExtraHop Is Geeking Out
- Active Directory by Microsoft supported by ExtraHop
- ExtraHop CEO Arif Kareem Wins GeekWire Hire of the Year Award
- ExtraHop named Best of Interop finalist for Data & Analytics
- WannaCry Ransomware Solution Bundle
- WannaCry Ransomware Update
- ExtraHop Addy Wins Best of Interop 2017 for Data and Analytics
- Thwarting ransomware with IT Automation
- WannaCry: A Debriefing with Tom Roeh
- Addy Wins Best of Show @ Citrix Synergy!
- Get to Know the Metric Explorer
- From One Sysadmin to Another Sysadmin LPT: Use Wire Data
- Add ExtraHop's Outside-In View to Your AppDynamics Monitoring
- Takeaways from Securing a Cloud-Powered, SOC2-Certified Analytics Service
- Easier and More Effective: ExtraHop Is "the New CPR" for IT Operations
- Get the Most Out of Your Triggers
- Meet the ExtraHopper: Chris Lehman
- The 5 Stages of Security Grief
- How Petya Ransomware Uses the EternalBlue Exploit - ExtraHop
- How to Defend Against Petya and SOREBRECT Ransomware
- Below the Waterline
- Stay Ahead of Attackers with ExtraHop's Threat ID Bundle
- Digital Forensic Diaries: Q&A with Author Mike Sheward
- Ahead of the Cloud
- Highlights: BlackHat and Defcon, 2017
- ExtraHop and Cerner Join Forces
- Third Certainty Interviews Jesse Rothstein
- Hunter or Hunted ... Which Would You Rather Be?
- ExtraHop 7.0 Changes the Way You See Your Network
- What is Perfect Forward Secrecy
- Next-Level Threats Require Next-Level Defense
- Build for Speed
- NetOps Meets the 21st Century
- ExtraHop Named Career Launching Company of 2018
- Announcing Addy Automated Investigation
- Customer Story: A Differentiated Approach to Ransomware Detection
- It's Not Citrix...AD, Storage, etc., Are to Blame [Case Study]
- The Network Engineer's Guide to the Galaxy...of Application Teams
- Josh Goldfarb: Why I'm Excited to Be An Advisor for ExtraHop
- Customer Story: Correlated Visibility for Citrix VDI Troubleshooting
- ExtraHop Celebrates 100+ Unique Solution Bundles
- Perfect Forward Secrecy: How to Maintain Visibility
- Announcing: ExtraHop & Amazon Web Services Bundle
- Why ExtraHop Addy Won the 2017 EMA Innovator's Award for Network Analytics
- Meet the ExtraHopper: Christine Shaw
- Detecting Brute Force Attacks with ExtraHop
- Doxware: Definition, Relationship to Malware, and Key Differences
- What's New in ExtraHop 7.1?
- ExtraHop Reveal(x): Brand New Security Offering from ExtraHop
- Silence Your Alert Cannon with ExtraHop Reveal(x) Security Analytics
- How to Save Your Data Center Migration from 5 Major Pitfalls
- Threat Hunting with ExtraHop
- Detect Russian Attacks in Real Time (US-CERT Alert TA18074A)
- Customer Story: ExtraHop Solves The Case of the Broken Login
- What's New in ExtraHop 7.2?
- Customer Spotlight: Medilink Thwarts Ransomware and Automates Investigation
- Why InfoSec Needs the Network (And Network Experts)
- ALERT: Phishing Scam Using ExtraHop Name
- Real-Time Analytics for PCI Compliance
- Active Directory Bundle Update: Better Dashboards and Drill-Downs
- 100 Gbps and Beyond: Scalability in Enterprise IT
- INFOGRAPHIC: Optimize Remote Site Monitoring
- Protect Industrial Systems from State-Sponsored Hackers
- How to Supercharge Live Activity Maps
- Why An App Guy Would Find the Network Valuable
- Palo Alto + Reveal(x): A Threat Hunter's Shortcut
- SecOps Encryption Challenge & Why Vendors Can't Help
- Three Ways to Automate Security Investigations, Response, and Remediation with ExtraHop's Phantom Integration
- Detect & Stop the New Android Worm
- Survival of the Focused: How the Pareto Payoff Can Save Your SOC
- ExtraHop Customers on Gartner Peer Insights, Part 1
- New Features & Capabilities in ExtraHop 7.3 and Reveal(x)
- Compare Device Connections in Live Activity Maps
- ExtraHop Customers on Gartner Peer Insights, Part 2
- Cloud Applications Bundle: New Capabilities and Features
- Getting Safe, Smart & Secure on S3
- Update: Office 365 Monitoring Bundle
- La Trobe University Improves App Performance & Security
- ExtraHop is a Network-Based Security Analytics Vendor to Watch
- Black Hat 2018 InfoSec Quiz Game
- Customer Spotlight: Real-Time Network and App Monitoring
- New Research: SANS 2018 Security Operations Center Survey Outcomes
- Saving Cyber Monday: A Retailer Averts Disaster with ExtraHop
- InfoSecurity Magazine: Fixing the Broken Data Breach Response Template
- DDoS Protection Primer: Types and Mitigation Explained
- Reveal(x) Extras: The Easy Way to Reduce and Harden Your Attack Surface
- New Features & Capabilities in ExtraHop 7.4 and Reveal(x)
- Signal Metrics in ExtraHop Reveal(x)
- Security Takeaways from Splunk .conf 2018
- Splunk Agrees: Wire Data Adds Crucial Context to Logs
- Real-Time Analytics vs. Traditional NPM Comparison
- Reveal(x) Feature Short: Security Investigation Workflow
- Customer Spotlight: Value Beyond Detections
- Why Security Teams Delay Cloud Migrations
- Top Cloud Threats According to Cybersecurity Insiders
- Reveal(x) Feature Short: Threat Intelligence
- Reveal(x) Feature Short: Signal Metrics
- 'Tis the Season to be... Breached?'
- Top Risk Management Stats from 2018 Ponemon Institute Study
- ExtraHop CTO Talks Cloud Security on theCUBE
- ExtraHop Partners with Credit Suisse
- Customer Spotlight: Mitchell International
- ZDNet: Industrial espionage fears arise over Chrome extension caught stealing browsing history
- Red-Blue Exercises with Reveal(x)
- TCP vs. HTTP: Definitions and Differences Explained
- AWS Outposts and the Enterprise
- How to Do Incident Response With 72 Hrs to Disclose a Breach
- Honeypots & Wire Data: Better Security Hygiene with Reveal(x)
- Meet ExtraHop's New VP of Customer Success
- Betting on ExtraHop: Emergence of Network Traffic Analysis
- Cybersecurity: Choosing ML over AI today for good reasons.
- Look Past the Enterprise Security Software Noise | ExtraHop
- A New Age of Enterprise Cyber Analytics is Beginning: Reveal(x) Winter 2019 Sounds the Klaxon
- Geekwire: Seattle Hybrid Cloud Security Startup ExtraHop Touts Bookings Growth, Says it's on an IPO Path
- What's New in 7.5 and Reveal(x) Winter 2019
- Espionage Through Chrome Extensions
- EMA Names Reveal(x) Top Vendor for Top Security Use Cases
- Customer Spotlight: GTA Travel Optimizes App Delivery with ExtraHop
- Show and Tell: What a Live Attack Simulation Looks Like in Reveal(x)
- Application Analytics Infographic: ExtraHop vs. APM
- ExtraHop - 2019 Gartner Magic Quadrant Leader for NPMD
- ExtraHop Talks Fake Postman Extension on The CyberWire
- Ixia: NetOps & SecOps: Breaking Down the Silos
- Your Applications Need More Than Just APM
- Must Read: First Gartner Market Guide for Network Traffic Analysis
- Defining Noise in Security & IT: Alerts, Silos, and Runaway Technology
- International Women's Day 2019 at ExtraHop
- ExtraHop Website Migration Part 1: The State of the Site
- Customer Spotlight: The Home Depot Builds Better Customer Experience
- The Trouble with Native Cloud Security
- ExtraHop Website Migration Part 2: Backup Arrives
- Case Study: Proactive Security Hygiene in a Hybrid Enterprise
- Improve Threat Hunting & IR with NTA: ISC2 Briefing
- ISC2 Security Briefing: Getting More Value from SecOps Frameworks
- Customer Spotlight: International Cruise Excursions
- Boost SOC Analyst Productivity with Reveal(x) Spring '19
- What's New in ExtraHop 7.6 & Reveal(x)
- New EMA Research: Rapid, Risky Adoption of TLS 1.3
- Real Answers to Real Questions About AI
- Application Tiers Made Simple
- The Single Cybersecurity Question Every CISO Should Ask
- Basic Threat Hunting with Reveal(x)
- Five Reasons to Integrate SecOps & NetOps
- SANS Webinar: The State of Cloud Security
- Fortune Magazine: Why Trust is a Dirty Word in Cybersecurity
- Packet Pushers & ExtraHop Talk Shop on Decryption After TLS 1.3
- What's New in ExtraHop 7.7 & Reveal(x)
- Major Takeaways from Cisco Live 2019
- Customer Spotlight: CURO Financial Technologies
- Customer Spotlight: Lawrence Livermore National Laboratory
- Announcing Reveal(x) Cloud
- Security Leadership Embrace the Cloud-First Future
- ExtraHop at Security Field Day 2019
- Is Cyber Insurance Worth the Money?
- SANS Webinar: How Network Detection & Response Makes MITRE ATT&CK Coverage Better
- Webinar: How To Accelerate Incident Response with Network Detection & Response
- 2019 SANS SOC Survey Results
- What's In the Box?!
- Guide to Application Analytics and APM Products
- ExtraHop Demand Gen Team Wins 2019 B2B Innovator Award
- Why Are Enterprises Enabling TLS 1.3 Encryption?
- ExtraHop Security Advisory: Phoning Home Data
- Meet ExtraHop's New VP of Customer Success
- Code.org Q&A for Red vs. Blue: Compete for a Cause
- How Orgs Should Approach Shadow IT (& How NDR Can Help)
- Your Latest Data Exfiltration Headache: Phoning Home
- 3 Key Stats from the 2019 Verizon DBIR
- IDC Workbook: Cloud Security Roadmap for 2019 & Beyond
- How NDR Supports the CIS Top 20 Controls
- SANS 2019 Incident Response Survey Results
- DNS: The Set It & Forget It Protocol - Or Is It?
- Monitoring SMTP with Wire Data from Reveal(x)
- How Decryption Helped Beat the Nazis: Infosec Lessons from WWII
- What's New in ExtraHop 7.8 & Reveal(x)
- Reveal(x) Video Feature Short: On-Demand Executive Report
- ExtraHop at Cloud Field Day 2019
- Infographic: Cloud-Native Security & the Cloud-First Enterprise
- Announcing a Free Trial of Reveal(x) Cloud
- AWS Security: Essential Features to Know
- Beginners' Guide to Network Detection & Response
- How Reveal(x) Detects Exploits
- Reveal(x) Cloud in 5 Minutes or Less
- Cloud Security: Best Practices Sure to Pay Off
- Networking in the Cloud: The Same, But Different
- The Reality of Artificial Intelligence
- Why Does Decryption Matter?
- Network Detection & Response: Cloud Security's Missing Link
- How to Maximize Resources in Your Cybersecurity Workforce
- Machine Learning in Cybersecurity: How Technology Adds Value
- SANS WhatWorks Case Study: Security & IT Ops Integration
- Automated AWS Quarantine from Reveal(x) Cloud
- Wire Data vs. Log Data in Cloud Security
- Gartner Market Guide for AIOps
- How Well Do You Know Shared Responsibility?
- ExtraHop Website Migration Part 3: The Great Stall
- Introducing Reveal(x) Cloud Ultra Offering for AWS
- What Does Cloud-Native Mean for Security?
- ExtraHop Predicts 2020
- ExtraHop Website Migration Part 4: Deep Cleaning
- What's New in ExtraHop 7.9 & Reveal(x)
- Talking to the Board about Cybersecurity
- Reveal(x) Feature Short: Cyber Hygiene & Encryption Audit
- IDC Infographic: Implement Security for Cloud Superiority
- A Network Security Solution for the Midsize Enterprise
- Top 3 Considerations for Enterprise IoT Security
- Litehouse Foods Secures Growing Enterprise w/ ExtraHop
- Threat Detection & Investigation in Active Directory
- ExtraHop Reveal(x) for AWS + Check Point
- Threat Investigation Speed Run with ExtraHop Reveal(x)
- Watch Out for These Creative Streaming Methods
- Packet Pushers Weigh In on ExtraHop IoT Capabilities
- RSA Conference 2020 - Security Trends and Observations
- The ExtraHop Reveal(x) Demo: NDR At Your Fingertips
- What's New in ExtraHop 8.0 & Reveal(x)
- Game-Changing, Frictionless Cloud Security: Wizards of the Coast + ExtraHop
- ExtraHop is Here to Help, Not Fool
- Resources to Help IT & Security Teams Cope with COVID-19
- Exposing Citrix Latency Caused by VPN Overload
- ExtraHop Channel in 2020 Update
- Threat Hunting Definitions & Strategies for 2020
- Enhancing Cloud Security Against the Egregious 11 in 2020
- Security Report: Connected Devices During COVID-19
- How to Win in the Channel, Advice from Two Experts
- Understanding Zoom's Security (& Privacy)
- What Reveal(x) 360 Means for the Channel
- Dark Reading Report: Collaboration Between IT & Cybersecurity Teams
- Ask the Expert Series: Gaining Intra-VM Traffic Visibility
- What's New in 8.1 and Reveal(x)
- Litehouse Foods Scales Security Operations for Growth with ExtraHop Reveal(x)
- Security in the Wake of Enabling Remote WFH Access Overnight
- MAPCO Sets Their Sights on the Road Ahead
- Easy Multi-Factor Authentication: JumpCloud SSO With SAML
- Putting Your Tools to Work: Get the Most Out of Reveal(x)
- Right-Sized Security On Demand
- ExtraHop Recognized in Three Recent Award Wins
- SIGRed: What Is It, How Serious Is It, and How Should You Respond?
- How to Respond to a Security Incident: What Does "Response" mean to you?
- How to Respond to an Incident: Top 3 Actions to Improve Your Security Operations
- The Security Doom Loop: Shelfware, Alert Cannons, and Analyst Fatigue
- The Security Flywheel: A Simpler, More Effective Approach
- Ready For Federal: Reveal(x) Available Under Continuous Diagnostics & Mitigation (CDM) Program
- Alerts That Matter: Knowing When (and How) to Take Decisive Action
- Security Alert: Detecting CVE-2020-1472 Zerologon Vulnerability Exploitation with NDR
- Professional Services Customer Success Stories: Scaling Digital Experiences in the Time of COVID-19
- What's New in 8.2 and Reveal(x)
- Infographic: Healthcare IT Security
- How DevOps and NetOps Can Better Understand Microservices
- (ISC)² Webinars on Cloud-Native NDR: Shared Responsibility's Missing Link
- The Feeling is Mutual: Security Solution Reviews for ExtraHop Reveal(x)
- Congrats to Ulta's Diane Brown, CISO of the Year
- The Network, Security, and Cloud Blame Game
- Professional Services Customer Success Stories: Resolving Device Inventory Pitfalls
- Reveal(x) 360 Achieves AWS Security Competency Status
- CSA Top Cloud Threats: Lessons Learned from Major Breaches
- ExtraHop Puts the Spotlight on Securing Cloud Services
- Ransomware Threats on Hospitals & Healthcare - ExtraHop
- Top 3 Ways to Improve Incident Response Time by 84%: A Forrester TEI Survey of Reveal(x)
- ExtraHop Reveal(x) Advisor Available on AWS Marketplace for Professional Services
- Protein Folding at Home for COVID-19 Research: the ExtraHop Team
- SANS on Paving the Way for Secure DevOps in the Cloud
- Securing Healthcare: Frameworks, Visibility, and the Cloud
- Advanced Persistent Threats Can Affect Even the Best of Us
- Designing a Color System: Intuitive UX and Happy Developers
- What's New in 8.3 and Reveal(x)
- LDAP Encryption: What You Need to Know in 2021
- Sunburst Attack: A Forensic Examination
- Free Class on Cryptography
- Professional Services Customer Success Stories: Streamlining an IT Merger
- Act Two: The Vendor Responds
- What the Stock Market Looks Like on the Network
- ExtraHop Security Report Uncovers SUNBURST's Behavior
- ExtraHop's CRN Channel Chiefs on Building Opportunities for Partners
- Detecting Suspicious DNS Behavior
- What is DCSync and How to Protect Against It
- Introducing ExtraHop Reveal(x) Home Edition: The Ultimate Insider Protection
- New Cloud & Hybrid Security Research
- Speed Up Zero Trust Adoption with Less Risk
- In Security, Integrity Matters
- How SUNBURST Used DNS to Avoid Detection
- Why It's Time for Network & Security Collaboration
- The Importance of Network Data in Securing Cloud Workloads
- From the FBI to the Private Sector: What Mark Bowling Has Learned About Cybersecurity
- Patch Tuesday, May 11: Detecting Critical Vulnerabilities
- Adapt Your Defense Strategy to Stop Supply Chain Attacks
- Avoid Insecure Protocols: SMBv1, LLMNR, NTLM, and HTTP
- SQL Injection Attack Example: Government Agency Stops Cyberattack
- 5 Ways Network Data Can Support Zero Trust
- It's an Honor to Be Among the JMP Securities Elite 80
- Don't Wait for Another Wake-up Call to Embrace NetSecOps
- Security Managed Services: Connecting Customers and Partners
- Day Zero: Our Perspective on ExtraHop's Mission, Our Vision, and the Road Ahead
- What's New in 8.5 and Reveal(x)
- DNS Amplification Attacks: How DNS Is the Canary in the Coal Mine
- The Case for Software Behavior Transparency - ExtraHop
- Protect Cloud Workloads Using 3D Chess as a Model - ExtraHop
- Top 3 Trends from the 2021 Verizon DBIR - ExtraHop Blog
- Why You Need PCAP and Forensics in the Cloud - ExtraHop
- Methods for Security Automation and Improving MTTR
- TCP Resets (RST): Attack or Defender Containment Method?
- How Network Intelligence Tools Find Adversaries & Threats
- Cryptography Training Reveals a Surprise Security Issue
- NDR Use Cases for Cyberdefense - A Periodic Table
- ExtraHop: It's Time for Security Uncompromised
- Welcome to the Next Era of Cyberdefense
- SANS on Defining and Measuring a Central Cybersecurity KPI: Visibility
- Integrate NDR & SIEM to Stop Advanced Threats
- RDP Best Practices: 5 Remote Desktop Protocol Tips
- EDR Security: The Landscape in 2020 | ExtraHop
- Supervised vs. Unsupervised ML for Threat Detection
- NDR vs. NTA - ExtraHop
- Telnet Protocol - Can You Encrypt Telnet?
- What Is Cross Site Scripting (XSS) & How To Prevent It
- OSI Model Explained For Dummies - 2021 Update | ExtraHop
- What is the WPAD Exploit? | ExtraHop
- How to Shut Down the SMBv1 Vulnerability with ExtraHop
- TCP Windowing: Explained | ExtraHop
- TCP_NODELAY & Nagle's Algorithm | ExtraHop
- Citrix End User Experience Monitoring: Visibility You Need
- TCP Retransmission Timeout (RTO): Causes & Performance
- ExtraHop is the Founding NDR Provider in the XDR Alliance
- Introducing ExtraHop Packet Basics
- Monitoring Critical Cloud Workloads
- On the Lookout for Credential-Sharing Gaps
- PetitPotam: Expanding NTLM Relay Attacks
- MeriTalk: Ransomware Tops U.S. Security Agenda
- How to Detect PsExec Misuse with ExtraHop
- Gartner Report: Threat Hunting for Threat Protection
- SQL Injection Attacks: What Are They & Detection | ExtraHop
- How To Monitor Sensitive Data & Stop Data Exfiltration
- 2020 Gartner Market Guide for NPMD | ExtraHop
- Detect Citrix ADC Vulnerability CVE-2019-19781
- Insecure API Cloud Computing: The Causes & Solutions
- The ExtraHop App for IBM QRadar | ExtraHop
- NDR vs. SIEM - ExtraHop
- 3 Reasons Azure vTAP is Huge for Cloud Security | ExtraHop
- Dwell Time In Security | ExtraHop
- What is Silly Window Syndrome? (Includes Examples)
- SIP | Protocol Overview, Performance, Monitoring
- TCP Retransmission: Timeouts (RTO) Explained
- Nagle's Algorithm, To Nagle or Not to Nagle? | ExtraHop
- How to Detect and Respond to the Sunburst Attack | ExtraHop
- Security Alert: New Vulnerability Grants IoT Camera Remote Access
- What is Mitre D3FEND?
- Gas South Finds a Security Partner with ExtraHop
- The Recent Exchange Server Vulnerability and SSRF Attacks
- SolarWinds Sunburst Attack Threat Intelligence | ExtraHop
- How To Get a Complete Inventory of Devices on Your Network
- Ripple20: How to Identify Vulnerable Devices
- ExtraHop Named in the 2020 Gartner Market Guide for NDR
- Monitoring Internal and External RDP with ExtraHop Reveal(x)
- Gartner UCaaS 2020 Monitoring Market Guide: Key Findings
- Announcing Reveal(x) 360 | ExtraHop
- Security Lessons from the Raspberry Pi Attack at NASA
- ExtraHop Reveal(x) for Cisco ISE Security
- NDR for MITRE ATT&CK | ExtraHop
- What Is TLS Version 0xfb1a? | ExtraHop
- Palo Alto Networks & ExtraHop: Remediation Integration
- Investigating a Data Leak with Reveal(x) | ExtraHop
- Decrypt Perfect Forward Secrecy with F5 BIG-IP + ExtraHop
- Detect Apache Struts 2 Exploit CVE-2018-11776 with ExtraHop
- TLS 1.3: Will Your Network Monitoring Go Blind? | ExtraHop
- What is Karn's Algorithm for Optimizing TCP?
- Monitor Unicast Flooding for Network Configuration Problems
- TCP Traffic Analysis: The Network Meets the Application
- TCP Traffic Analysis: The Network Meets the Application
- Configure a Client-Server Environment with Kafka + ExtraHop
- How We Log Exceptions in Production Java Application Servers
- Detect Bad Neighbor Vulnerability on Windows 10 Systems
- NDR vs. IPS for Intrusion Prevention, Detection, and Response - ExtraHop
- How to Detect the Hadoop/YARN DemonBot Exploit | ExtraHop
- How ExtraHop Shut Down a C&C Beaconing Attack
- How Traffic Mirroring in the Cloud Works | ExtraHop
- The Threat Inside Your Financial Services Network
- IT Big Data: IT Operations Analytics (ITOA) with ExtraHop
- SANS WhatWorks: ExtraHop Reveal(x) for Reducing Detection Time
- Seeing Through Cyber False Flags During Incident Response
- Use Case: Machine Learning in Cybersecurity with ExtraHop
- Gartner Report: Challenges with TLS 1.3 & Passive Decryption
- Cloud-Native NDR & EDR With CrowdStrike and ExtraHop
- Reveal(x) IoT Security: Service Layer Discovery & Detection
- Ask the Expert Series: What Are SPANs and Taps? | ExtraHop
- Remote Access Network Security & Availability | ExtraHop
- What Are Cloud-Native Security Tools? - ExtraHop
- Reveal(x) and Demisto Integration | ExtraHop
- 4 Common Cloud Misconfigurations| ExtraHop
- Network Detection & Response (NDR) for NIST | ExtraHop
- How ExtraHop Cloud-Scale Machine Learning Works
- How to Apply CIS Controls & MITRE ATT&CK in the Cloud
- What Traffic Mirroring Means for Cloud Security | ExtraHop
- ExtraHop & ServiceNow CMDB Integration | ExtraHop
- Detect Fake Chrome Extensions with ExtraHop Reveal(x)
- Five Reasons SecOps Needs Decryption | ExtraHop
- How to Forward Session Keys From F5 LTMs to ExtraHop
- Monitoring DICOM: The Why and How | ExtraHop
- Cyber ISR and the Need for Modular, Open Systems & Platforms
- How to Find Expired Certificates on your Network
- ExtraHoppers Build Tiny Homes with Sound Foundations NW
- When Vendor Practices Put Security at Risk
- There's a Better Way to Monitor DNS | ExtraHop
- AWS Expands Support for Frictionless Cloud Security
- Improving Mean Time to Resolution | ExtraHop Customer Story
- SANS Cloud Security Report - 2020 | ExtraHop
- 2021 Hybrid & Cloud Security Tools Report | ExtraHop
- Video: How to Detect Sunburst Malware with NDR | ExtraHop
- Video: SUNBURST Attack Series | ExtraHop
- Why NDR Belongs in Your 2021 Strategy
- What is DNS Tunneling? | ExtraHop
- SANS on Building Effective SOC Teams Despite the Skills Gap
- Remote Work Cybersecurity with ExtraHop
- Debunking the Myths on NDR Selection Criteria | ExtraHop
- Reveal(x) 360 Technical Innovation | ExtraHop
- SANS Survey for Network Visibility and Threat Detection
- How to Evaluate NDR in a Single Sprint | ExtraHop
- 6 New Features to Look for in Network Detection and Response
- What TLS 1.3 Means for Security Operations Visibility
- Find LDAP Clear Text Binds Before the Windows Update
- AWS Security with Traffic Mirroring & Reveal(x) Cloud
- Google Cloud Packet Mirroring | ExtraHop
- NDR and the SOC Visibility Triad | ExtraHop
- How Reveal(x) Detects Reconnaissance | ExtraHop
- How Reveal(x) Detects Command & Control | ExtraHop
- Cybersecurity Operations & IT Operations in 2019
- Our Top 3 Security Podcasts | ExtraHop
- A Case Study for Modern Threat Hunting | ExtraHop
- Network Traffic Analysis for Enterprise Security | ExtraHop
- Azure Secures the Enterprise with Virtual Network TAP
- Gigamon + ExtraHop | ExtraHop
- Data Gravity: What It Is and Why You Should Care | ExtraHop
- How to Dodge the Microservices Tax | ExtraHop
- 3 Key Capabilities Needed to Map the Cyber Terrain
- What Is a Tinygram? | ExtraHop
- NDR vs. XDR - Which is Best for Cybersecurity?
- Why Decryption Is Necessary for Security
- Understand and Detect vCenter Vulnerability Exploitation
- What's New in 8.6 and Reveal(x)
- ExtraHop September TL;DR
- Reveal(x) 360 + AWS Control Tower
- Weak Cryptography Search Leads to Unexpected Discoveries with Reveal(x)
- ExtraHop Reveal(x) + Microsoft Azure Sentinel | ExtraHop
- Uncovering a Security Compromise with ExtraHop Reveal(x) Advisor Threat Hunting
- Uncovering Google DNS Activity with ExtraHop Reveal(x) Advisor Threat Hunting
- Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response
- Things That Go Bump in the Network: Part II
- Bridging Data Retention Gaps En Route to Zero Trust
- How EDR & NDR Support the Zero Trust Security Model
- How the ExtraHop NDR Solution Supports Zero Trust Security
- Wildcard Certificate Risks and the ALPACA TLS Attack
- What is ICMP Tunneling and How to Protect Against It
- Tips for Talking to the Board about IT Security
- Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?
- SANS: A New Take on Cloud Shared Responsibility
- Behavior-Based Detection and Rule-Based Detection: Why Not Both?
- A Network Enumeration Example: Detection and Response
- SANS Review: How ExtraHop Reveal(x) Takes on Modern Threats
- A Forensic Examination of the Sunburst Attack - ExtraHop
- Things That Go Bump in the Network: Part III
- Three Common Advanced Threats and How to Stop Them
- Uncovering the Unknown: Proactive, Covert Identification of Evasive Threats
- Sunburst: Why Supply Chain Attacks Are So Destructive
- Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities
- What Is the Cloud Shared Responsibility Model?
- Containers & Microservices: Definition, Examples, & Visual Aids
- Manage and Monitor Containerized Applications with VMware and ExtraHop
- Our IT OPS Director Gets Colorful in the Name of Tech Diversity
- How Packet Analysis Aids SIEM Logs in Cloud Security
- DoublePulsar Detected
- PrintNightmare Vulnerability: Detection, Explanation, and Mitigation
- How to Detect Lateral Movement | ExtraHop
- Security News Roundup November 2021 TL;DR | ExtraHop
- Container Security: Definition, Best Practices, and Examples
- ExtraHopper Spotlight: The Rock n Roll Airshow
- What is Cyber Digital Transformation?
- Splunk Integration Update: Introducing Easy Mode
- Build Custom Metrics for Any Application for better IT Operations Analytics
- DevOps Hearts Race While CISO Looks for Heartbleed
- Application Performance Monitoring: More Is Not Always Better
- NSA's Advice on BlueKeep
- What's New in ExtraHop 7.0?
- Network Engineers Love Watching Paint Dry
- What is Real-User Monitoring?
- The Return of the Generalist in IT
- ExtraHop v3.7 - APM Improvements for Ease of Use and Visualization
- Quest, Dell, and Legacy Application Performance Management Approaches
- Packet Loss, Retransmission Timeouts (RTOs) and Round-Trip Times in Virtualized Systems
- Network Address Translation, PAWS Dropped SYNs and Network Performance
- Virtual Packet Loss and Network Application Performance Analysis
- New Ruling Sets Security Incident Notification Standards Financial Organizations
- Announcing Reveal(x) 360 NDR in the CrowdStrike App Store
- Download SANS 2021 Cloud Security Report - ExtraHop
- 1st IPO Marks a Milestone for Network Detection and Response
- ExtraHop Reveal(x) 360 Ebook - Includes Pricing & Use Cases
- Find SonicWall Vulnerabilities With An Inventory of Devices
- 3 Signs that NDR Is the Next Big Thing in Cybersecurity
- What ExtraHop's New MSP Resale Program Means for Partners
- What's New in 8.4 and Reveal(x) - ExtraHop
- Securing Remote Work with Collaborative NetSecOps in 2021
- EMA on Securing Cloud Assets - ExtraHop
- IDC Reviews Network Intelligence & Threat Analytics Market
- Managed Services: Augment or Outsource Security Resources
- ExtraHop October TL;DR
- Gartner Includes NDR as One of the Controls Against SUNBURST
- ExtraHop December TL;DR
- ExtraHop Dominates Network World's 2014 APM "Shootout"
- Find All Certs for Microsoft's 1024-Bit RSA Key-Size Requirement
- Case Study: When Application Performance Is About Efficiency, Not Just Speed
- Monitoring Virtual and Cloud-Based Apps: Why Network-Based APM?
- VMware Losing Its Grip on the Market?
- ExtraHop Goes 2.0
- Vendor Wars Episode II: A New Hope
- ExtraHop Named to Built In's Best Places to Work 2022
- Detecting Attacks Using Microsoft Protocol Decryption
- Detect Malware in Encrypted Traffic
- How Reveal(x) Accelerates OMB M-21-31 Maturity
- SonicWall Ransomware Warning: Attacks via SRA & SMA Devices
- REvil Ransomware Attack and Supply Chain Risk
- Darkside Ransomware Attack on Colonial Pipeline - ExtraHop
- Accelerate Cybersecurity Investigations with Reveal(x) Threat Briefings
- What's New in 8.7 and Reveal(x)
- ExtraHop January 2022 TL;DR
- Ransomware Evolution into Multifaceted Extortion - ExtraHop
- How Does Ransomware Work? | ExtraHop
- No Red Team, No Blue Team, Just Good Works
- Machine Learning for Network Detection & Response
- ISC(2) Webcast: Using MITRE ATT&CK In Hybrid and Cloud Environments
- How to Filter ExtraHop Queries for Quick Answers | ExtraHop
- Top 3 Takeaways from Black Hat 2018
- Trendspotting: 2018 Gartner Hype Cycle for Threat-Facing Tech
- Jitter in Networking | ExtraHop
- What Is Network Traffic Analysis (NTA)? | ExtraHop
- Business Major to Web Dev: From College to Career
- AWS S3 Security & Breaches: Lessons in the New Shadow IT
- Faster Threat Detection & Response: Reveal(x) Summer 2018
- Microservices and Network Data: Understanding the Dividend
- Automated Investigation vs. Manual Meltdown: SecOps Workflow Face Off
- Microservices Explained: Going Micro for Macro
- SecOps Visibility Into Encryption: An Overview
- Intent Based Networking & SD-Branch Evolution | ExtraHop
- WannaCry: One Year Later
- Clouded Judgment Part 3: Public Cloud Adoption
- Top 3 Takeaways from RSA 2018
- Evaluating Analytics: A Guide for SecOps
- Hub & Spoke Model vs. Hybrid WAN for Remote Site Networks
- Clouded Judgment Part 2: Cloud Migration Economics
- Key Takeaways From Mandiant's MTrends Report
- Clouded Judgment: Part 1
- Women in Tech: Systems Engineer Heather Gonzales
- Women of ExtraHop: Jeanie Gong
- Women of ExtraHop: Lynda Allen
- Malware Advertising: History and Prevention
- Memcrashed: The Importance of Memcrashed Detection & Other UDP Reflection Attacks (US CERT Alert TA14-017A)
- INFOGRAPHIC: Keep Your Application Vendors Honest About Performance
- Keep Software Vendors Accountable for Performance
- Bitcoin Miner Malware: The Growing Underworld
- New Exfil & Malware Channel: SSL/TLS Handshakes
- 3 Reasons You Need a Data Center Consolidation Strategy
- Into the Great Wide Open...Sort Of
- Metcalfe's Law for IT: Lowering Data Friction
- AIOps: Use Cases, Definition, & Why It Matters | ExtraHop
- Customer Blog: Migrating to AWS Without Compromising on Security or Visibility
- Fix Your Security Workflow (A How-To)
- Top 3 Healthcare Security Takeaways of 2017
- Proactive Visibility in Healthcare: Why and How
- What Is Perfect Forward Secrecy (& How To Decrypt)?
- Analyze This: ExtraHop + Cisco Tetration Will Supercharge Your Security Enforcement Policy
- Performance monitoring tools and data security
- Trends in Healthcare at HIMSS 2017
- Do IT Pros Think Machine Learning Is Hope or Hype?
- Tap the Network, Tap A Keg
- Look Who's Talking
- Brian Madden's Penultimate Podcast
- What is DICOM (Digital Imaging Communications in Medicine)?
- Troubleshooting Network Issues for Your Web Application
- TCP: Where the Network Meets the Application, Part 1
- The Bad Guys Only Have to Be Wrong Once
- Interoperability Is Like Porn: Most Can't Define It, But You'd Know If You Saw It
- 2021 Cybersecurity Landscape: 100 Stats, Facts, & Data Points – ExtraHop
- IT in the Crosshairs of Modern Ransomware Tactics
- How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
- NDR Contributions to MITRE ATT&CK Framework - ExtraHop
- Introducing Patrick Dennis, ExtraHop's New CEO
- What Happens After the Ransomware Payment – ExtraHop
- What You Need to Know about BlackByte Ransomware as a Service
- SANS Survey 2021: Your Security May Ride on SecOps Happiness
- Build Resilience Amid Rising Risk of Russian Cyberthreats
- ExtraHop February 2022 TL;DR
- Cloud Security Threats and Solutions: An Introduction
- Why Humility Is What's Needed for CISO Success
- Our New CRO Explains What 'Customer Centric' Really Means
- #BreakTheBias: International Women's Day 2022
- Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks
- The Long Tail of War: A Cyber Response to an Economic Battle
- What's New in 8.8 and Reveal(x)
- The Long Tail of War: Walking Into the Line of Fire
- The Long Tail of War: The Volunteer Cyber Army
- ExtraHop March 2022 TL;DR
- Beating Ransomware in the Midgame: Detection Best Practices in 2022
- How a Retailer Prevented a Repeat Ransomware Attack - ExtraHop
- April Patch Tuesday Vulnerabilities: What You Need to Know
- Why Smart Cities Like Dallas Need Decryption to Secure Digital Infrastructure
- Prevent REvil Ransomware Encryption & Exfiltration Attacks with NDR
- Our New VP of Product Hints at What's Next for NDR
- ExtraHop April TL;DR
- Log4j Exploits Explained (includes videos) - ExtraHop
- Review SANS SOC Survey Trends 2018-2021 - ExtraHop
- What Pragmatism Among Asia-Pacific Security Leaders Means for Cyber Risk
- Assessing Network Analysis and Visibility Solutions For Zero Trust
- Why Conventional Wisdom Hasn't Stopped or Even Slowed Ransomware
- Bodycams and Firewalls: The Internet is Watching, Are You?
- ExtraHop May TL;DR
- New Complimentary Gartner® Report: How to Respond to the 2022 Cyberthreat Landscape
- Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities - ExtraHop
- 2022 Edison Awards Honors Advancements in Strategic Decryption
- Meet the ExtraHop Team Members Honored as 2022 CRN Women of the Channel
- What's New in 8.9 and Reveal(x)
- Gain PCAP and Forensics in Google Cloud
- ExtraHop June TL;DR
- Announcing Layered Network Intelligence for AWS
- Meet Rafal Los, Head of Services GTM at ExtraHop
- What are Kerberos Golden Ticket Attacks and How to Detect Them
- Our New VP of Product & Technical Marketing Explains His Customer-First Approach
- Integrate EDR and NDR for Comprehensive MITRE ATT&CK Coverage
- ExtraHop July TL;DR
- CWPP and NDR: Better Together? - ExtraHop
- Software Supply Chain Attack vs. Supply Chain Vulnerability - ExtraHop
- Port Scan Detection: Identify Malicious Network & Port Scanning
- Reducing Cloud Security Friction in the C-Suite
- What Is a Cloud Access Security Broker (CASB)? – ExtraHop
- What is XDR?
- ExtraHop August TL;DR
- Takeaways: 2022 Gartner Hype Cycle for Security Operations - ExtraHop
- Seamlessly Integrate VPC Flow Logs for AWS Security
- Enhanced RDS Monitoring with Network Packets
- What Is Cloud Security Posture Management (CSPM)? – ExtraHop
- ExtraHop September TL;DR
- Exchange Server Security Challenges Explained - ExtraHop
- K-12 Organization Stops a Ransomware Attack Post-Compromise
- Cybersecurity Careers: Meet the Defense Against the "Dark Arts" Wizards
- Things That Go Bump in the Network: Part I
- Healthcare's IoT Security Challenge
- How Network Data Improves SOAR Capabilities
- What's New in 9.0 and Reveal(x)
- ExtraHop October TL;DR
- How to Respond to OpenSSL Vulnerabilities
- ExtraHop + Red Canary
- Security News Roundup November 2022 TL;DR | ExtraHop
- Extrahop Cybersecurity Predictions for 2023: The Threat Landscape
- Honest Customer Reviews: Unlocking the Network Black Hole
- ExtraHop Cybersecurity Predictions: 2023 Cloud Security Trends
- ExtraHop December TL;DR
- Top Cybersecurity Trends for 2023: Strategies, Integrations, and Budgets
- The Latest 2022 Gartner® Report: 2022 Market Guide for Network Detection and Response
- Are Businesses Still Vulnerable to Log4j? ExtraHop Reviews the Data 6 Months Later
- How the Spring4Shell Zero-Day Vulnerability Works
- Spring4shell Exploit Detection and Mitigation - ExtraHop
- Detect Log4j Attacks Hiding in Encrypted Traffic
- Executive Summary: What Are Supply Chain Attacks?
- How to Defend Against Supply Chain Attacks | ExtraHop
- What's New in 9.1 and Reveal(x)
- The Importance of NDR in Your Cybersecurity Budget
- Evaluate NDR ROI with Forrester Methodology
- CISO Perspectives on Proposed SEC Cybersecurity Rules
- ExtraHop, Binary Defense Deliver Managed Network Detection and Response
- XDR Report: IT Decision Makers Struggle to Define Value
- How to Detect Black Basta Ransomware
- Detecting Cobalt Strike with ExtraHop Reveal(x)
- Retailer Improves Defenses with ExtraHop & CrowdStrike
- Harnessing the Power of Network Data
- Forrester: Network Analysis and Visibility are Essential
- Meet Wendy Hoey, 2023 CRN Channel Chief
- NDR for Cloud Workloads and Asset Discovery
- Saluting Women in Cybersecurity on International Women’s Day
- How to Detect HardBit 2.0 Ransomware
- Customer Success: Defending the User Experience
- Trigona Ransomware Uses Password-Protected Malware
- Ethical Dilemmas for CISOs: Pressure to Downplay Cyber Risks
- Customer Success: Stopping a Botnet Attack
- CrowdStrike Threat Report Highlights Shift in Attacker TTPs
- Meet ExtraHop at CrowdStrike’s Government Summit 2023
- Threat Alert: 3CXDesktopApp Supply Chain Attack
- Cloud Security Podcast with Anton Chuvakin, Rafal Los
- VoIP RTP Streams Can be Vulnerable to Attack
- 2023 Global Cyber Confidence Index - Cybersecurity Debt
- Building Cyber Resiliency in the Public Sector
- What is an Intrusion Detection System (IDS)?
- NDR vs. IDS for Intrusion Detection - ExtraHop
- Why It’s So Hard to Detect Advanced Persistent Threats
- Modern Threat Hunting with ExtraHop Reveal(x)
- Reveal(x) and Palo Alto Networks Cortex XSOAR Integration
- ExtraHop Launches Automated Retrospective Detection in Reveal(x) 360
- IDS, Palo Alto Networks Integration: What's New in Reveal(x) 9.2
- Introducing ExtraHop IDS
- From IDS to NDR: The Evolution of Threat Detection on the Network
- Automated Retrospective Detection (ARD) Feature Overview
- ExtraHop and CrowdStrike on Zero Trust Security
- Cybersecurity Threats in 2023: How Reveal(x) NDR Mitigates Them
- NDR, AI to Help Government Agencies Battle Cyber Threats
- Uber CSO Sentencing: Implications for CSOs and CISOs
- Mandiant M-Trends 2023: Attackers Won’t Back Down
- Detect Data Leaks from OpenAI ChatGPT with Reveal(x)
- Meet Mark Bowling, Chief Information Security and Risk Officer at ExtraHop
- What Constitutes a “Material” Security Breach?
- Global CSO Explains the Value of Cybersecurity
- ExtraHop named a Customers’ Choice in Gartner Peer Insights™ Voice of the Customer Report
- ExtraHop Reveal(x) 360 + Amazon Security Lake
- The Basics of Generative AI
- How Brittle Is Trust in an Era of Continuous Compromise?
- Impressions from RSA Conference 2023
- What to Expect at RSA Conference 2023
- The Future of Cybersecurity: SECON NJ Recap
- Continuous Compromise: Saving AI from Itself
- 2023 Verizon DBIR: Phishing for Financial Gain
- Cloud Security Threats: CrowdStrike Highlights Cloud-Conscious Adversaries
- Continuous Compromise: When Quantum Computing Breaks Encryption
- ExtraHop Wins 2023 AI Breakthrough Award
- Top 5 SOC Skills and Metrics: 2023 SANS SOC Survey
- CL0P Ransomware: ExtraHop Identifies MOVEit Vulnerabilities
- Continuous Compromise: When Deep Fakes Get Too Real
- ExtraHop Named a Leader in Forrester Wave™: Network Analysis and Visibility, Q2 2023
- China's Role as an Agent of Continuous Compromise
- SEC Targets CISO for Enforcement Action
- Pair Network and Application Performance Monitoring
- Reveal(x) NDR with Native CrowdStrike LogScale Integration
- Reveal(x) Now Tailored Even More for NDR and NPM
- Zero Trust: ExtraHop IDS for Enhanced Government Security
- How to Get Great Deals for Cyber Insurance
- RIP Kevin Mitnick: Tribute to Hacking’s GOAT
- Cybersecurity for Financial Services: Know Your Network
- SEC Cybersecurity Rules: Security Leaders Weigh In
- What You Need to Know About the NCSIP
- Find ExtraHop at Black Hat 2023
- Uncovering the True Cost of Data Breaches
- ExtraHop Joins 10th Cyber Shield Exercise
- 4 Reasons Your Organization Needs NDR
- ExtraHop Brings Ch@os, Magic to Black Hat 2023: Event Recap
- ExtraHop Analysis of 2023 CrowdStrike Threat Hunting Report
- IT, Security Spending Predictions from IDC | ExtraHop
- Department of Defense Zero Trust Strategy | ExtraHop
- Zero Trust for Beginners | ExtraHop
- Zero Trust: CISA and Forrester Maturity Models | ExtraHop
- A Harvard “Masterclass” on Artificial Intelligence | ExtraHop
- Dataset for Detecting Domains Generated by Algorithm | ExtraHop
- CrowdStrike, ExtraHop Expand Technology, Threat Intelligence Partnership
- Zero Trust and Network Detection and Response | ExtraHop
- ExtraHop and CrowdStrike Give Companies XDR Capabilities
All Press Releases
- ExtraHop Networks Launches Industry's First Application Delivery Assurance System
- Instant ROI for Application and Network Management
- Gigamon and ExtraHop Partner in First Total Solution for Network and Application Management
- NSRI USA Reduces Network Troubleshooting by 70% with ExtraHop Networks
- ExtraHop Raises $5.1 Million in Series A Funding
- ExtraHop Breaks the Scalability Barrier with the Industry's First 10GbE Solution for True Application Visibility – ExtraHop Application Delivery Assurance System v2.0
- ExtraHop Networks Sponsors New Aberdeen Research on Application and Network Visibility
- ExtraHop Networks Achieves Significant Milestones One Year Following Launch
- ExtraHop Networks Helps Enterprises Ensure the Success of Business-Critical Transactions
- NetworkWorld Names ExtraHop Networks to its Prestigious 2009 List of Top 10 IT Management Technology Startups to Watch
- ExtraHop Networks Appoints Jeff Feinstein as Senior Vice President of Field Operations
- ExtraHop Networks Launches NetworkTimeout.com, a Free Cloud-Based Service for Analyzing Network Traffic
- ExtraHop Networks Partners with F5 Networks to Improve Application Delivery and Network Monitoring
- ExtraHop Networks Wins Two Best of Interop Awards
- ExtraHop Networks Wins Network Products Guide Reader Trust Award for Best in Application Delivery Assurance
- ExtraHop Networks Delivers Unified Network and Application Visibility for the Enterprise with the Release of Version 3.0
- Keynote Systems ExtraHop Networks Partnership | Real-Time Network APM
- ExtraHop Networks Rounds Out Database Offering With Support for IBM DB2
- ExtraHop Networks Appoints New Chief Financial Officer
- Application-Aware Network Performance | Application-Aware Network Monitoring
- ExtraHop Networks Secures $14 Million Series B Financing Led By Late-Stage Venture Capital Firm Meritech Capital Partners
- Application Inspection Triggers, Flexible Application Monitoring
- ExtraHop Networks and Enterprise Management Associates Free Webinar Solves the Maze of Performance Management Strategies
- Decrypt & Analyze SSL Traffic with ExtraHop | Encrypted Application Performance Management
- ExtraHop Networks Delivers Real-Time Application Visibility for Web Services with Industry's First Memcache Module and New AMF Module
- ExtraHop Creates Fastest Virtual Application Performance Management (APM) Solution with New EH1000v Appliance
- NAPM Approach a "New Paradigm for Performance Monitoring" | APM Analyst Reports
- AFCOM Data Center World Presentation by ExtraHop CEO Jesse Rothstein
- Oracle-Dependent Applications Support | Oracle Database Performance Monitoring
- Application Inspection Triggers, ExtraHop APM Innovation of the Year
- Gartner Report: ExtraHop Application Performance Monitoring Innovator
- EMEA Channel Partner Program | ExtraHop Expands to Europe, Middle East, Africa
- Axstores Selects ExtraHop | EMEA App Performance Market Momentum Grows
- ExtraHop Networks Partners with cPacket Networks to Provide Enhanced Real-Time Application Performance Monitoring (APM)
- ExtraHop Networks Builds First-Ever Agentless Performance Monitoring Solution for Citrix Desktop Virtualization
- ExtraHop Networks Enables Successful NoSQL and Database Performance Optimization for World's Largest SaaS ERP Provider
- ExtraHop Certified for the Cisco Unified Computing System Express (UCS-E)
- Better Application Performance Through Actionable APM Data
- Gullivers Travel Associates Eliminates Data 'BlindSpots'
- Erik Giesa - Former F5 Executive - Joins the Management Team at ExtraHop
- Raja Mukerji Selected as a Winner in PSBJ 40 under 40 Awards for 2012
- ExtraHop Recognized for Leadership and Technology by 2012 American Business Awards
- Subscription Based Application Performance Management (APM)
- Drive IT Automation in Virtual Data Centers and Cloud Infrastructure with Reflex System & ExtraHop
- Splunk and ExtraHop Combine for True End-To-End Visibility of Applications
- Practice Fusion Prevents Application Performance Problems with ExtraHop
- Packet Capture Tools for Modern Application Performance Management
- Monitor Hyper-V Server and Get APM Analysis-as-a-Service with ExtraHop
- Survey: 70% of IT Managers Unsure How to Measure Cloud App Performance
- Big Data Application Performance Management (APM) Sybase IQ
- MedSolutions Boosts IT Operational Intelligence with ExtraHop
- Microsoft SharePoint Monitoring - Better Performance & Troubleshooting
- ExtraHop Grows New Customer Sales 250% in 2012
- ExtraHop Provides Insurance Policy for Healthcare Applications & IT Infrastructure with IT Operational Intelligence
- Auto Trader Uses ExtraHop Networks for Seamless Physical to Virtual (P2V) Migration
- New ExtraHop Appliance Delivers Industry-First 20Gbps Real-Time Transaction Analysis
- ExtraHop Named Cool Vendor in Application Performance Monitoring
- ExtraHop Named a Best of Interop 2013 Finalist for Two Awards
- ExtraHop Wins Best of Interop 2013 for Cloud Computing and Virtualization
- ExtraHop Provides Support for the New Citrix XenDesktop 7
- ExtraHop Accelerates Murphy USA's Application Performance
- IT Professionals Blind to Application Activity on Networks
- ExtraHop Networks Recognized in Best in Biz Awards 2013 International
- ExtraHop Named Best Midsize Workplace in Washington by the Puget Sound Business Journal
- ExtraHop Delivers IT Operational Intelligence for All
- ExtraHop and Arista Deliver Real-Time SDN Visibility
- ExtraHop & Splunk Provide Pervasive Threat Visibility with Real-Time, Context-Aware Monitoring
- ExtraHop and Morgan Stanley Discuss IT Operational Intelligence at Interop New York
- ExtraHop Enables Real-Time Operational Intelligence for bet365, Safeguarding End-User Experience
- ExtraHop signs SMT as first certified partner for Benelux
- ExtraHop Propels Cloud Adoption with Deep Visibility into AWS
- Explosive Demand for IT Visibility Based on Healthcare.gov Debacle
- ExtraHop Delivers Deep IT Visibility with VMware vCenter Log Insight
- ExtraHop Provides Visibility For Large UK Hospital Network
- ExtraHop Demos Extensibility of Wire Data Analytics Platform
- ExtraHop Saves McKesson Over $600K Annually in IT Ops Costs
- ExtraHop Reduces Troubleshooting Time for Steward Health Care
- ExtraHop Stems the 'Heartbleed' Bug
- ExtraHop Co-Founders Named Ernst & Young Entrepreneur of the Year Finalists
- ExtraHop Helps Seattle Children's Reduce Citrix Login Times by 5x
- ExtraHop for AWS Named GeekWire's 2014 Innovation of the Year
- Claris Networks Leverages ExtraHop to Prove Business Value
- ExtraHop Closes $41 Million in Series C Funding
- Bentley University Chooses ExtraHop's Wire Data Analytics
- ExtraHop Partners with Newgen Systems in Australia and New Zealand
- T2 Systems Kicks Dev/Test into High Gear with ExtraHop
- ExtraHop Introduces Open Data Stream Technology
- ExtraHop Healthcare Edition with Real-Time Analysis of HL7
- ExtraHop 4.0 Wire Data Analytics Platform Powers Business Insights
- ExtraHop Announces Partnership with AppDynamics
- ExtraHop Integrates with FireEye to Defend against Threats
- ExtraHop & Sumo Logic Partner to Deliver Powerful Data Insight
- ExtraHop Predicts an IT Security Shakeup
- John Matthews Joins ExtraHop as CIO
- ExtraHop Enables Real-Time IT Analytics at Groundbreaking Speed
- ExtraHop Ensures ICD-9 to ICD-10 Migration Readiness for Healthcare IT
- ExtraHop Exec to Speak at Carahsoft Government Big Data Forum
- ExtraHop Keeps Communication Lines Open with Support for VoIP
- ExtraHop Named Best of Interop 2015 Finalist
- ExtraHop Hosting a CHIME Focus Group at HIMSS15
- ExtraHop Introduces 10 Gbps Virtual Appliance
- ExtraHop Co-Founders Named Ernst & Young Entrepreneur of the Year Finalists for 2015
- ExtraHop Offers Free Real-User Monitoring (RUM)
- ExtraHop to Speak on Big Data for IT Visibility at IP Expo
- ExtraHop CEO to Speak at 2015 Goldman Sachs PLATFORM Conference
- ExtraHop Shines a Light Into AWS Performance for Conga
- ExtraHop Ensures Web Application Performance with Real-Time Analysis and Prescriptive Guidance
- ExtraHop Solutions Architect to Speak at BriForum 2015
- ExtraHop Treats Citrix Slowdowns with Real-Time Diagnostics and Prescriptive Guidance
- ExtraHop Vice President of Systems Engineering to Speak at IT Roadmap NYC
- ExtraHop Honored by Puget Sound Business Journal as a Top Washington Workplace
- Study Shows 93 Percent of IT Pros Consider Wire Data Foundational to ITOA
- ExtraHop Executive to Speak at Digital Government Summit
- ExtraHop Makes Virtual a Reality With Rich Insight Into Application Performance
- ExtraHop Keeps Data Safe With Continuous, Real-Time SSL Monitoring
- ExtraHop and Sony Talk High-Performance Troubleshooting at IP Expo
- ExtraHop Helps ACS Dramatically Improve Hosted Application Performance
- ExtraHop and Macmon Secure Announce Technology Alliance to Deliver Enhanced Real-Time Security Solutions
- ExtraHop Cuts Troubleshooting Time for City of Geel by 50 Percent
- ExtraHop Helps Customers Maximize the Value and Efficiency of Cloud Applications
- ExtraHop Named by Wealthfront as a Top Career-Launching Company
- ExtraHop and MEDHOST Drive Meaningful Use of EHRs at Over 1,000 U.S. Hospitals
- ExtraHop Honored as the Best Emerging Solution at the Fall 2015 Midmarket CIO Forum
- ExtraHop Introduces Explore Search Appliance for Turnkey Big Data Analytics
- ExtraHop Helps Tyler Technologies Maintain Order in the Courts
- ExtraHop Offers New White Paper on Monitoring Virtual Desktops
- ExtraHop and Avenida Partner to Deliver Rich Insight Into Complex and Dynamic Hybrid Environments
- ExtraHop Maps Out Operational Intelligence for Zonar Systems
- ExtraHop and Eduserv Drive IT Transformation for UK Universities, Hospitals, and Research Centres
- ExtraHop Predicts The Rise of The Network as a Core Business Driver
- ExtraHop delivers visibility and security enhancements for Sportingbet
- ExtraHop Announces Aggressive Expansion into APAC
- ExtraHop Continues APAC Expansion, Opens Operations in Australia and New Zealand
- ExtraHop Speeds Insight, Efficiency for The Greenbrier Companies
- ExtraHop CFO Honored by Puget Sound Business Journal
- ExtraHop Saves Phoenix Children's Hospital $600,000 Per Year with IT Insight
- ExtraHop Harnesses Data-in-Flight to Improve Patient Care
- ExtraHop Enables Proactive Security to Stop Ransomware in its Tracks
- ExtraHop Executive to Speak at HIMSS16 Conference and Exhibition
- Top Palo Alto Sales Executive Joins ExtraHop Board of Directors
- ExtraHop selected as finalist for European IT and Software Excellence Awards 2016
- ExtraHop Expands to Meet Growing Demand for IT Operations Analytics in EMEA
- ExtraHop Helps digiChart Enable Seamless Patient Care
- ExtraHop Named a Best of Interop Finalist for the Second Consecutive Year
- ExtraHop Named Best Big Data Analytics Solution of 2016
- ExtraHop Extends Wire Data Analytics to Remote Offices and Azure
- Enterprise Strategy Group Proves ExtraHop Delivers More Functionality at a Fraction of the Cost
- ExtraHop Executive to Speak at Gartner IT Operations Strategies & Solutions Summit
- ExtraHop Takes "Best of Show" Honors at Citrix Synergy
- ExtraHop Debuts Ransomware Bundle for EMEA Businesses at InfoSec 2016
- ExtraHop Hires Former Splunk and VMware Executives to Expand Business and Product Leadership
- ExtraHop Heads to Cisco Live to Radically Change How IT Organizations View the Network
- ExtraHop Appoints Former Fluke Networks President, Arif Kareem, as CEO on the Heels of Most Successful Quarter to Date
- ExtraHop and Kedron Join Forces to Deliver Deeper IT Performance Insights for UK Enterprises
- ExtraHop Helps Accolade Fortify IT, Reduce SIEM Spend by 60 Percent
- ExtraHop and VMware Bring Enhanced Control to the Software-Defined Datacenter
- ExtraHop Wins 2016 HIMSS AsiaPac Innovations Challenge
- Lantmäteriet Leverages IT Data Analytics from ExtraHop to Improve User Experience
- ExtraHop Doubles Down on APAC as Sales Rapidly Outpace Forecasts
- ExtraHop Challenges Business and IT Leaders to Rethink the Network
- ExtraHop Unwraps ESG Buyer's Guide for IT Operations & Analytics Platforms
- ExtraHop Hosts VMware User Group on Regaining Control of Virtual Environments
- ExtraHop Empowers Enterprises to Recover Ransomware-Encrypted Files Without a Backup
- Phoenix Children's Hospital CIO Named CHIME 2016 Innovator of the Year
- ExtraHop Named a Top Career-Launching Company for Second Consecutive Year
- ExtraHop Integrates with GigaSECURE to Bolster Data Security in the Cloud
- ExtraHop and Appcentrix Put Liberty Back in Control of IT Operations
- Fareportal Finds the Ticket to Ensuring Positive Customer Journeys
- ExtraHop Expands to South Korea to Drive Digital Transformation Initiatives
- ExtraHop Predicts 2017 Trends in IT, Security, and DevOps
- ExtraHop Accelerates into 2017 with New SVP of Marketing
- Lyreco Selects ExtraHop to Improve Application Performance During Accelerated Growth Phase
- ExtraHop Security Expert to Host Two Sessions at RSA Conference 2017
- ExtraHop Brings Real-Time Healthcare IT Analytics to HIMSS17
- ExtraHop Debuts as a Visionary in the Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics
- ExtraHop Combines Analytics, Machine Learning, and Low-Cost Storage to Deliver Intelligent Workflows at Scale
- ExtraHop Announces General Availability of Machine Learning Service Addy
- ExtraHop Named a Best of Interop Finalist for the Third Consecutive Year
- ExtraHop Technical Leader to Speak at Gartner IT Operations Strategies & Solutions Summit
- ExtraHop Receives Application Certification from ServiceNow
- ExtraHop Machine Learning Expert to Host Session at Interop 2017
- ExtraHop Expands Australian Channel Program
- ExtraHop Introduces New Professional Services for Data-Driven Enterprise IT Transformations
- ExtraHop Addy Takes Top Honors in the 2017 Best of Interop ITX Awards
- Accordant Technology Taps ExtraHop to Accelerate Digital Enterprise Initiatives
- ExtraHop Addy Takes "Best in Show" in the 2017 Best of Citrix Synergy Awards
- ExtraHop Announces Chris Lehman as New SVP of Worldwide Sales
- ExtraHop Adds Application-Level Visibility to Cisco Tetration
- DDI Selects ExtraHop to Future-Proof its IT Operation
- Cegedim Selects ExtraHop to Ensure Mission Critical Service Delivery for Healthcare Customers
- ExtraHop Introduces Threat ID to Keep Enterprises Ahead of Attackers with Real-Time Threat Detection
- ExtraHop Holds First-Ever APAC Partner Conference
- ExtraHop Announces Australia Availability of Machine Learning Service Addy
- ExtraHop Helps MediLink Improve IT Health for Insurers, Facilities, and Providers
- ExtraHop Unveils Immersive Maps of the Digital Enterprise to Maximize Security and Performance
- FLEETCOR Taps ExtraHop to Fortify IT Operations as Business Scales
- ExtraHop Announces Albert Kuo as New VP of Sales in Asia Pacific Region
- ExtraHop Addy Honored With Enterprise Management Associates' Innovation Award
- ExtraHop Adds AWS Data to Provide Performance and Security Insights for Hybrid Enterprises
- ExtraHop Helps Wood County Hospital Avert a Major Security Breach
- ExtraHop Introduces Reveal(x) to Expose Attacks on Critical Assets and Automate Investigations
- ExtraHop and Orca Tech Partner Up to Provide Complete Network Insights for Australian and New Zealand Customers
- ExtraHop Recognized as a Visionary in the Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics for Second Consecutive Year
- ExtraHop Named to the 2018 JMP Securities Super 70 List
- ExtraHop Wins 2018 Fortress Cyber Security Award
- ExtraHop Delivers Insights at Scale with 100 Gbps of Real-Time Analytics
- ExtraHop Announces Global Availability of Award-Winning Machine Learning Technology within ExtraHop Security and Performance Solutions
- ExtraHop Announces the Global Availability of Network Security Analytics Product Reveal(x)
- ExtraHop CFO to Speak at Seattle Business Magazine's Inaugural Daring Women Event
- ExtraHop Reveal(x) Named a Best of Citrix Synergy 2018 Winner
- ExtraHop Reveal(x) Sheds Light on the Darkspace with Precision Threat Hunting for the Enterprise
- ExtraHop Partners with Kite Distribution to Extend Reveal(x) to Security Markets
- Major North American Insurance Provider Selects ExtraHop Reveal(x) for Cybersecurity
- ExtraHop Listed as a Sample Vendor in Gartner's Hype Cycle for Threat-Facing Technologies, 2018
- ExtraHop Reveal(x) Debuts in EMA's Radar for Network-Based Security Analytics Report as a "Value Leader" and "Vendor to Watch"
- International Cruise and Excursions Taps ExtraHop for Digital Business Insight at Scale
- ExtraHop to Bring Enterprise Network Traffic Analysis to the Cloud through Microsoft Azure
- MedImpact Selects ExtraHop to Drive Innovation and Improve Customer Care
- ExtraHop CTO to Present at Jefferies Public Cloud Summit
- ExtraHop Recognized in Inaugural Credit Suisse Disruptive Technology Recognition Program
- ExtraHop Insures Mitchell International Against Security Threats
- ExtraHop is Named to Wealthfront's 2019 Career-Launching Companies List
- SC Media Names ExtraHop a 2018 Security Industry Innovator
- ExtraHop Blows Past the $100 Million Milestone Fueled by 10x Growth in Security
- ExtraHop Turns Security Analysts into Threat Experts with Reveal(x) Winter 2019
- ExtraHop Reveal(x) Recognized with Six Security Analytics Awards by EMA
- ExtraHop Helps GTA Enhance Travel Services for a Competitive Edge
- ExtraHop Recognized as a Leader in the Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics
- Secureworks CEO Joins the ExtraHop Board of Directors
- John McAdam Joins ExtraHop Board of Directors
- ExtraHop - Representative Vendor in Gartner NTA Market Guide
- ExtraHop Honored by Cyber Defense Magazine with Two 2019 InfoSec Awards
- ExtraHop Hires New VPs of Product Management and Customer Success
- Silver Winner in Cybersecurity Excellence Awards
- ExtraHop Joins AWS CPPO Program
- ExtraHop Announces Panorama Partner Program
- ExtraHop Joins IBM Security App Exchange Community
- ExtraHop in 2019 JMP Securities Elite 80
- ExtraHop Announces Reveal(x) Cloud
- Puget Sound Business Journal - ExtraHop Is Leading Seattle Cloud Computing Company
- ExtraHop Wins 2019 Fortress Cyber Security Award
- ExtraHop Honored as One of Washington's Best Companies to Work For by Seattle Business Magazine
- ExtraHop - 2019 AI Breakthrough Award Recipient
- ExtraHop Announces Bill Ruckelshaus as New CFO
- ExtraHop Issues Warning About "Phoning Home" in New Security Advisory
- ExtraHop Delivers Security and Performance for Touro College of Dental Medicine
- Prisma Health Secures Data and Applications with ExtraHop
- Puget Sound Business Journal Names ExtraHop One of Washington's Best Workplaces
- ExtraHop Nabs Top Security Honors in the Best of VMworld 2019 U.S. Awards
- DXC Connect: APAC Breakthrough Partner of the Year
- ExtraHop Wins Gold in Seattle Business Magazine's Tech Impact Awards
- Top 5 Security Tips for Enterprises
- ExtraHop Award-Winning Threat Detection Innovation
- ExtraHop Integrates with Microsoft Azure Sentinel
- ExtraHop Honored at 2019 CRN Tech Innovator Awards
- ExtraHop Integrates with Google Cloud Platform
- ExtraHop Co-Founder and CTO Speaking at Jefferies Public Cloud Summit
- ExtraHop Integrates with AWS to Automate Response and Forensics for Cloud Workloads
- ExtraHop Predicts 2020
- ExtraHop Announces Two New VPs
- ExtraHop Kicks off 2020 on the Heels of Second Consecutive Year of Over 40 Percent Growth
- ExtraHop Celebrates Second Consecutive Year as SC Media Security Industry Innovator
- ExtraHop Helps Midsize Enterprises Accelerate Security Maturity with New NDR Offering and Analyst Service
- ExtraHop Breaks Down IoT Security Barriers with Device Behavior Profiling and Advanced Threat Detection
- ExtraHop Executives to Speak About Enterprise Security, Decryption, and Privacy at RSA Conference 2020
- ExtraHop Extends Cloud-Native Detection & Response Leadership with Industry's First Fully Integrated Hosted NDR Solution for Hybrid Enterprises
- ExtraHop Wins Two Cyber Defense Magazine InfoSec Awards at RSA Conference 2020
- ExtraHop Helps Wizards of the Coast Deliver Frictionless Security with Reveal(x) 360
- ExtraHop Hires Security Industry Veterans to Drive Growth in Asia Pacific and Japan Region
- ExtraHop and SANS Institute Survey Finds Huge Gaps in Security Visibility During Large-Scale Shift to Remote Work
- ExtraHop Helps Ulta Beauty Deliver Exceptional and Secure Guest Experiences
- ExtraHop Data Shows Shifts in IoT Device Usage During COVID-19 Have Broad Security Implications
- ExtraHop Channel Leaders Honored by CRN with Channel Chiefs and Women of the Channel Award Wins
- ExtraHop Introduces Reveal(x) 360
- ExtraHop Partners With CrowdStrike to Deliver Cloud-Native Threat Detection from the Network to the Endpoint
- ExtraHop Enables Enterprise-Level Security at Litehouse Foods with Reveal(x)
- ExtraHop Listed as a "Representative Vendor" in Gartner's Market Guide for Network Detection and Response
- ExtraHop Named One of Seattle's Largest Cloud Computing Companies
- ExtraHop Helps MAPCO Set their Sites on the Road Ahead
- ExtraHop Named to the Forbes AI 50 List for 2020
- ExtraHop Recognized as a Best Workplace by Inc. Magazine
- ExtraHop Named Innovative Security Solution for Financial Institutions
- ExtraHop Announces New Compliance for HIPAA National Health Information Protection Standards
- ExtraHop Honored as a Best Place to Work in IT
- ExtraHop Market Share Revenue Ranked Number Three for 2019 Network Detection and Response According to Gartner
- ExtraHop Furthers Push in Australia Security Market With NEXTGEN Appointment
- ExtraHop Celebrates Third Consecutive Year as Best AI-based Solution for CyberSecurity in 2020 AI Breakthrough Awards
- ExtraHop Threat Research Team Finds One in Three IT Environments Vulnerable to Ripple20 Threat
- ExtraHop Customers Experience 84 Percent Reduction in Time to Resolve Threats According to Independent Research Firm Analysis
- ExtraHop, Provider of NDR Cybersecurity Solutions, Starts Full-scale Operations in Japan
- ExtraHop Achieves AWS Security Competency Status
- ExtraHop Reveal(x) 360 Named Finalist in 2020 CRN® Tech Innovator Awards for Innovative IoT Security
- ExtraHop Announces Distribution Agreement with Exclusive Networks to Meet Growing European Demand for Network Detection and Response
- U.S. Air Force Selects ExtraHop Solution to Scale During Global Pandemic
- ExtraHop Expands Network Detection and Response Capabilities in Asia Pacific Region
- ExtraHop Data Shows 150 Percent Increase in Suspicious Network Activity During Peak of SUNBURST Attack
- ExtraHop Ranked Third for 2019 Market Share in Network Intelligence and Threat Analytics
- ExtraHop Partners with High Wire Networks to Deliver Managed Network Detection and Response
- ExtraHop names WestCon-Comstor as Regional Distribution Partner for Network Detection and Response Solutions in APAC
- Vocus New Zealand Selects ExtraHop Reveal(x) To Scale Workforce with Rapid Cybersecurity Network Detection and Response
- ExtraHop Recognized as a Fastest-Growing and Best Cybersecurity Company at the 2021 Cybersecurity Excellence Awards
- ExtraHop and High Wire Networks Team with SYNNEX to Deliver Managed Network Detection and Response
- ExtraHop Channel Program Honored with 5-Star Rating in 2021 CRN® Partner Program Guide and Channel Chiefs Recognition
- ExtraHop strengthens channel leadership with the appointment of Sandra Hilt New Senior Channel Director for EMEA
- ExtraHop Deepens Cyber Incident Response Expertise with Hire of Mark Bowling
- ExtraHop Security Advisory: 67 Percent of Enterprise Environments Still Run Protocol Exploited by WannaCry and NotPetya
- ExtraHop Recognized in Inc. Magazine's Annual List of Best Workplaces for Second Consecutive Year
- ExtraHop Announces That Three of Its Leaders Honored as 2021 Women of the Channel
- ExtraHop Joins Forces with Westcon-Comstor Americas to Drive Growth in Latin America
- ExtraHop Named Next Generation Winner in SaaS/Cloud Security in Global InfoSec Awards at RSA® Conference
- ExtraHop Boosts Cybersecurity for Austria's Largest Electricity Producer
- ExtraHop Listed by Puget Sound Business Journal as a Leading Cybersecurity, AI, and Cloud Computing Company in the Greater Seattle Area
- ExtraHop to be Acquired by Bain Capital Private Equity and Crosspoint Capital Partners
- ExtraHop Wins Best Behaviour Analytics/Enterprise Threat Detection at SC Awards Europe 2021
- ExtraHop Named Leading Defense Solution for Financial Institutions
- Central Oregon Radiology Associates Safeguards Sensitive Medical Images and Data with ExtraHop Reveal(x)
- ExtraHop Experts Contribute Network Detection and Response Expertise to MITRE ATT&CK Framework
- NFU Mutual Selects ExtraHop Reveal(x) for Cybersecurity
- ExtraHop Announces Completion of Acquisition by Bain Capital Private Equity and Crosspoint Capital Partners
- Texas Water District Sidestepped SUNBURST and Enhances Cybersecurity with ExtraHop
- ExtraHop and Pacific Dental Services Leaders Share Insight on Getting the Board to Care about Cybersecurity at HIMSS 2021
- ExtraHop Extends Response and Forensics Capabilities with Deep Threat Insights for Hybrid Cloud
- ExtraHop Boosts Vocational Schools Cyber Security Capabilities
- ExtraHop Announces Record Growth in the First Half of 2021 in Asia Pacific Region
- IG Design Group Selects ExtraHop Reveal(x) for Cybersecurity
- NCSoft Deploys ExtraHop Reveal(x) for Cybersecurity
- ExtraHop Introduces New Proactive Threat Hunting and Network Assurance Services
- ExtraHop Introduces Breakthrough Decryption and Threat Detection Capabilities for Microsoft Environments
- PT Bank Rakyat Indonesia Deploys ExtraHop Reveal(x) To Deliver Industry-Leading Cybersecurity Infrastructure
- ExtraHop Appoints Tanya Hovagimian as First ANZ Channel Manager Ushering in New Period of Growth Across the Region
- ExtraHop Leads the Charge for Network Traffic Analytics at Black Hat USA
- ExtraHop CTO to Keynote Credit Suisse 2017 Data Analytics Expo
- ExtraHop Business Leader to Speak on Analytics for Healthcare IoT at HIMSS AsiaPac17
- ExtraHop Partners with Relus Technologies to Drive Smarter IT Operations
- ExtraHop Reveal(x) Selected as Finalist for the SVC Award for IT Security Innovation of the Year
- Why IT Operations Needs Agile Application Performance Management
- ExtraHop Sees Rapid Growth in the Healthcare Vertical
- ExtraHop Slashes Troubleshooting Time For Middlesex Hospital
- ExtraHop Partners with Carahsoft to Serve the Government Sector
- ExtraHop Wins Network World's APM "Shootout"
- ExtraHop Wins Two Gold American Business Awards
- ExtraHop Named a Finalist in Two 2013 American Business Awards Categories
- ExtraHop Networks Introduces Performance Monitoring for Healthcare IT Applications at the HIMSS12 Annual Conference
- ExtraHop Wins Gold Tech Impact Award from Seattle Business Magazine
- Ovum Highlights ExtraHop's Wire Data Analytics Platform
- Three Application Performance Monitoring Breakthroughs for 2012
- ExtraHop Honored as a Top 100 Company to Work for - 2012
- Sujal Patel and Eric Scollard of Isilon Systems Join ExtraHop Networks
- ExtraHop Grows Annual Recurring Revenue by 47%, Names Patrick Dennis Chief Executive Officer
- ExtraHop Report: 85% of Organizations Have Suffered a Ransomware Incident in the Past Five Years, 72% Paid a Ransom
- ExtraHop Introduces New Layer of Cloud Threat Defense to Identify and Isolate Advanced Cyberattacks
- ExtraHop Names Kenneth Chen VP for Asia to Expand Leadership and Accelerate Growth in the Region
- ExtraHop Names Industry Veteran Karl Werner as Area Vice President of the Central & Southern Europe Region
- ExtraHop Report: 83% of Asia Pacific Organisations Suffered a Ransomware Incident in the Past Five Years; 68% Tried to Keep it Quiet
- ExtraHop Continues EMEA Momentum, Appoints Duncan Butchart Area Vice President for Northern EMEA
- ExtraHop Names Fouad Tawk as Area Vice President of Middle East, Turkey, and North Africa
- ExtraHop Announces Pan-EMEA Distribution Agreement with Exclusive Networks, Meeting Growing Demand for Network Detection and Response
- Brewin Dolphin Improves Security Visibility and Control with ExtraHop
- ExtraHop Extends XDR Partnership with CrowdStrike, Introduces Native Push-Button Response for Precision Threat Quarantine
- ExtraHop Benchmarking Cyber Risk and Readiness Report Highlights Prevalence and Risks of Internet-Exposed Protocols on Organizations Networks
- ExtraHop Names New CFO and CMO, Expands Executive Leadership Team with Appointment of CLO and CPO
- ExtraHop Appoints Tsuyoshi Yamanishi as Area Vice President of Japan
- ExtraHop Appoints Kenneth Chen VP of Asia Pacific to Accelerate Growth in the Region
- ExtraHop Prepares for Rapid EMEA Expansion, Appoints Duncan Butchart Vice President of EMEA
- Axians Chooses Network Intelligence from ExtraHop for Circle of Visibility Offering
- ExtraHop Accelerates Security Operations with High Fidelity Network Intelligence Through New Integration with Splunk SOAR
- ExtraHop Appoints Chris Scanlan as President and Chief Commercial Officer
- ExtraHop Recognized in the Gartner® Market Guide for Network Detection and Response for the Third Time
- Independent Research Firm Analysis found 87% Reduction in Time to Resolve Threats with ExtraHop
- ExtraHop Partners with Binary Defense to Deliver Managed Network Detection and Response
- ExtraHop Report Finds 78% of IT Leaders Agree XDR is a Necessity Despite Confusion
- ExtraHop Unveils Blueprint for Effective NDR to Improve Security Postures
- ExtraHop Network Analysis and Visibility Technology Recognized by Independent Research Firm
- ExtraHop Expands CrowdStrike Partnership with CrowdStrike Falcon® LogScale Integration
- ExtraHop to Participate in First-Ever CrowdStrike Government Summit
- ExtraHop Report Finds 83% of Organizations Paid up in Ransomware Attacks
- ExtraHop Recognized by Gartner®, Ranked Second in NDR Market Share with 34.5% Growth from 2021 to 2022
- ExtraHop Names Mark Bowling as Chief Information Security and Risk Officer
- ExtraHop Expands Customers’ Detection Coverage with New Enterprise-Grade Solutions
- ExtraHop Presents Ratiodata with Gold Partner Status
- ExtraHop® Offers Visibility into Generative AI Tools, Strengthens NDR Platform
- ExtraHop® Showcases First Network Detection and Response Platform in World Wide Technology’s Advanced Technology Center
- ExtraHop® Now Supports Amazon Security Lake to Centralize Security Data on AWS
- ExtraHop® Recognized with a Customers’ Choice Distinction in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response
- MEDIA ALERT: ExtraHop® to Present at Gartner® Security & Risk Management Summit
- ExtraHop Named a Leader in Network Analysis And Visibility Report by Independent Research Firm
- ExtraHop Introduces New Solution for Federal, State, and Local Governments
- ExtraHop Report Finds 73% Average Drop in Net Income One Year Post-Data Breach
- ExtraHop Open Sources Machine Learning Dataset to Help Security Teams Detect Malware and Botnet Operations Faster
- ExtraHop Adds CrowdStrike Falcon Intelligence to Reveal(x) Platform
- ExtraHop Reveal(x) Available for Purchase in the CrowdStrike Marketplace