www.extrahop.com Open in urlscan Pro
54.68.143.124  Public Scan

URL: https://www.extrahop.com/use-cases/security/threat-hunting/
Submission: On July 08 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Competitive Comparison
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   Complimentary Shields Up Assessment
   
   AWS Cloud Security
   
   What is Network Detection & Response (NDR)?
   
   Reveal(x) Enterprise: Self-Managed NDR

 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * Shields Up
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
    * Security Operations Transformation
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * U.S. Public Sector
    * Education
   
   Complimentary
   
   
   SHIELDS UP ASSESSMENT
   
   Align with and implement CISA's cybersecurity guidance
   
   Start Now
   
   Get Additional Shields Up Guidance >

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Solution Bundles Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Incident Response
    * Deployment
    * Complimentary Shields Up Assessment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Hardware Policies
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Overwatch Managed NDR
    * Shields Up Solution Brief
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   Detect network attacks. Correlate threat intelligence and forensics.
   Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * News & Events
    * Careers
    * Resources
   
    * About Us
    * The ExtraHop Advantage
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Shields Up Resources
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
   
    * Cyberattack Glossary
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


English
 * 日本語

Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS

COMPETITIVE COMPARISON

WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

COMPLIMENTARY SHIELDS UP ASSESSMENT

AWS CLOUD SECURITY

WHAT IS NETWORK DETECTION & RESPONSE (NDR)?

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWS & EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More

THE EXTRAHOP ADVANTAGE

WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWS & EVENTS

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

SHIELDS UP RESOURCES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS

 * For Security //
 * By Initiative
   * Advanced Threats
   * Ransomware Mitigation
   * Multicloud & Hybrid Cloud Security
   * Implement Zero Trust
   * Security Operations Transformation
   * Enterprise IoT Security
   * Integrate NDR and SIEM
 * Use Cases
   * Hunt Advanced Threats
   * Enhance Security Hygiene
   * Detect Lateral Movement
   * Detect Unusual Network Activity
   * Monitor Sensitive Data
   * Improve Mean Time to Respond (MTTR)
   * Network Forensics Readiness
   * Next Gen IDS
   * Detect Software Supply Chain Attacks
 * Resources
   * IDC Market Share Report
   * 2020 SANS Network Visibility and Threat Detection Survey
 * Integrations
   * CrowdStrike
   * Microsoft 365


HUNT ADVANCED THREATS

 * Challenge
 * Answers
 * Video
 * Resources


ADVANCED ATTACKS BYPASS TRADITIONAL CONTROLS AND LIVE OFF THE LAND IN YOUR
EAST-WEST CORRIDORS.

By detecting threats proactively, organizations can avoid a data breach or other
damage. Threat hunting, finding the "unknown unknowns" applies the intuition of
an analyst to data from the environment and was previously only possible for
very mature organizations. Junior analysts often lack the necessary skills, and
traditional hunting methods require the use of multiple complex tools.

More than 80% of attack methods use brute force or stolen credentials, rather
than exploiting vulnerabilities which accounted for the other 20%.

Verizon DBIR 2020


Start Demo


WITH EXTRAHOP REVEAL(X)


THREAT HUNTING FOR ANY LEVEL ANALYST

Reveal(x) makes meaningful threat hunting accessible to analysts of all skill
levels, and enables advanced analysts to form and test hypotheses faster through
automatically-surfaced hunt starting points and efficient investigation
workflows.

GET ANSWERS TO THE TOUGH QUESTIONS


DO YOUR LESS-EXPERIENCED ANALYSTS HAVE THE TOOLS TO SUCCESSFULLY THREAT HUNT?

Reveal(x) makes threat hunting more easily accessible to all analysts with rich
transaction data available in intuitive and query-based starting points for your
hunt.

DO YOUR LESS-EXPERIENCED ANALYSTS HAVE THE TOOLS TO SUCCESSFULLY THREAT HUNT?

Reveal(x) makes threat hunting more easily accessible to all analysts with rich
transaction data available in intuitive and query-based starting points for your
hunt.


WHAT ARE THE BARRIERS TO EXPANDING YOUR THREAT HUNTING CAPABILITIES?

Using guided workflows with a complete dataset and mechanisms to automate
hunting techniques, Reveal(x) simplifies and accelerates threat hunts, even for
less experienced analysts.

WHAT ARE THE BARRIERS TO EXPANDING YOUR THREAT HUNTING CAPABILITIES?

Using guided workflows with a complete dataset and mechanisms to automate
hunting techniques, Reveal(x) simplifies and accelerates threat hunts, even for
less experienced analysts.


DO YOU LEVERAGE NETWORK DATA IN YOUR THREAT HUNTING ACTIVITIES?

Reveal(x) provides a packet-based data source that is nearly impossible for
attackers to disable or modify, enabling rapid research and validation of a wide
variety of IOCs.

DO YOU LEVERAGE NETWORK DATA IN YOUR THREAT HUNTING ACTIVITIES?

Reveal(x) provides a packet-based data source that is nearly impossible for
attackers to disable or modify, enabling rapid research and validation of a wide
variety of IOCs.


SIMPLE, STREAMLINED THREAT HUNTING



We were spending a lot of time in our packet capture tool troubleshooting
problems and threat hunting. We needed better analytics to help us find problems
more quickly.

SVP, Global Infrastructure
Financial Services,


ADDITIONAL RESOURCES

Blog


BASIC THREAT HUNTING WITH REVEAL(X)

How to search for risky database and DNS behaviors in a few clicks.



Blog


UNCOVERING THE UNKNOWN: PROACTIVE, COVERT IDENTIFICATION OF EVASIVE THREATS

Learn how to simplify threat hunting.



Report


CYBERSECURITY INSIDERS 2020 THREAT HUNTING REPORT

In 2020, Cybersecurity Insiders conducted the third annual research project on
threat hunting to gain deeper insights into the maturity and evolution of the
security practice.




EXPLORE REVEAL(X) IN THE FULL PRODUCT DEMO.

Start Demo


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

 * Use Cases
 * Security
 * Hunt Advanced Threats

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Competitive Comparison
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * Complimentary Shields Up Assessment
 * AWS Cloud Security
 * What is Network Detection & Response (NDR)?
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * News & Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2022
 * Terms of Use
 * Privacy Policy
 * 日本語

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube

5:57
















Close


suggested results