www.extrahop.com Open in urlscan Pro
34.213.122.93  Public Scan

Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2021-q4-december-newsletter-general-dynamic-all-regions&utm_medium=email&utm_s...
Effective URL: https://www.extrahop.com/resources/?utm_campaign=2021-q4-december-newsletter-general-dynamic-all-regions&utm_medium=email...
Submission: On December 17 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Competitive Comparison
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   What is Network Detection and Response (NDR)?
   
   Cloud-Native Security Solutions
   
   Reveal(x) Enterprise: Self-Managed NDR

 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * Advanced Threats
    * Security Operations Transformation
    * Enterprise IoT Security
    * Integrate NDR and SIEM
    * Implement Zero Trust
    * Multicloud & Hybrid Cloud Security
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * U.S. Public Sector
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Solution Bundles Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Deployment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Hardware Policies
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Overwatch Managed NDR
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Amazon Web Services
    * Security for Google Cloud
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   Detect network attacks. Correlate threat intelligence and forensics.
   Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * News & Events
    * Careers
    * Resources
   
    * About Us
    * The ExtraHop Advantage
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Take the Hunter Challenge
    * Upcoming Webinars and Events
    * Newsroom
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Remote Access Resource Hub
    * White Papers
    * Datasheets
    * Industry Reports
   
    * Webinars
    * Network Attack Library
    * Protocol Library
    * Documentation
    * Firmware
    * Training Videos


English
 * 日本語

Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS

COMPETITIVE COMPARISON

WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

WHAT IS NETWORK DETECTION AND RESPONSE (NDR)?

CLOUD-NATIVE SECURITY SOLUTIONS

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWS & EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More

THE EXTRAHOP ADVANTAGE

WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWS & EVENTS

Get the latest news and information.

Learn More

TAKE THE HUNTER CHALLENGE

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

REMOTE ACCESS RESOURCE HUB

NETWORK ATTACK LIBRARY

PROTOCOL LIBRARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS


RESOURCES


GARTNER QUICK ANSWER: HOW TO RESPOND TO A SUPPLY CHAIN ATTACK?

 * Analyst Report
 * August 17, 2021
 * Peter Firstbrook, Jeremy D'Hoinne




2020 GARTNER MARKET GUIDE FOR NETWORK DETECTION & RESPONSE

 * Analyst Report
 * June 11, 2020
 * Lawrence Orans, Jeremy D'Hoinne, and Josh Chessman




UNIFYING SECURITY ACROSS MULTICLOUD, HYBRID, & REMOTE DEPLOYMENT

 * Webinar
 * June 11, 2020



--------------------------------------------------------------------------------

GARTNER QUICK ANSWER: HOW TO RESPOND TO A SUPPLY CHAIN ATTACK?

--------------------------------------------------------------------------------

UNIFYING SECURITY ACROSS MULTICLOUD, HYBRID, & REMOTE DEPLOYMENT

--------------------------------------------------------------------------------

2020 GARTNER MARKET GUIDE FOR NETWORK DETECTION & RESPONSE

SOLUTION AREAS

Security

Cloud

IT Ops

Select All



Select All

CONTENT TYPES


Industry Reports

Customer Stories

White Papers

Videos

Datasheets

Webinars

Select All



Select All

Apply Filters

Analyst Report

12.17.21

Chris Crowley, John Pescatore

SANS 2021 SOC SURVEY



Learn about the most targeted industries, the common compromise vectors and
breaches, and best practices for improving overall security.

Read Now

White Paper

12.8.21

John Grady, Senior Analyst

A NETWORK-BASED APPROACH TO CLOUD WORKLOAD SECURITY



Learn how many cloud security tools rely on logs and agents, limiting
effectiveness while increasing complexity, and how ExtraHop Reveal(x) 360
provides a network-based approach with cloud-native …

Read Now

Datasheet

10.27.21

SCALABLE LONG-TERM PCAP REPOSITORY



Learn how ExtraHop Reveal(x) 360 dramatically reduces time, effort, and the cost
of performing packet-level investigations with an extensible PCAP repository.

Read Now

White Paper

10.25.21

ENCRYPTION VS. VISIBILITY: WHY SECOPS MUST DECRYPT TRAFFIC FOR ANALYSIS



Read this technical brief for a deep dive into why SSL/TLS decryption
capabilities are crucial for security operations and how ExtraHop Reveal(x)
provides network detection and response with passive, …

Read Now

White Paper

10.22.21

NETWORK DETECTION & RESPONSE: HOW REVEAL(X) DETECTS THREATS



Learn how Reveal(x) enables security teams to resolve threats 84% faster using
full-spectrum, real-time detection and continuous behavioral machine learning.

Read Now

Solution Brief

10.14.21

FORENSICS READINESS SPEEDS ROOT CAUSE ANALYSIS, IMPACT SCOPING, & RECOVERY



Learn about the challenges facing incident responders, how network forensics can
take up valuable time, and how Reveal(x) 360 offers complete visibility across
hybrid environments.

Read Now

Solution Brief

10.13.21

MONITORING MICROSOFT 365 WITH REVEAL(X) 360 NDR



Learn about the challenges facing security teams, their need to secure a wide
range of services, and how Reveal(x) 360 monitors Microsoft 365 with deeper
visibility and greater security hygiene.

Read Now

Datasheet

10.13.21

EXTRAHOP SENSORS


Read Now

Datasheet

10.8.21

DEFEND YOUR CONTAINERIZED ENVIRONMENTS WITH REVEAL(X) 360



Learn how defending containerized environments requires continuous monitoring
and AI-powered analysis, and how Reveal(x) 360 can quickly detect and respond to
advanced threats.

Read Now

Datasheet

10.6.21

ACCELERATE ZERO TRUST ADOPTION WITH REVEAL(X)



Learn about rise of Zero Trust initiatives, the challenge to meet these
mandates, and how Reveal(x) 360 can simplify the transition to your Zero Trust
rollout.

Read Now

Solution Brief

9.28.21

EXTRAHOP + AZURE SENTINEL



Strengthen your Azure security by adding ExtraHop Reveal(x) 360 SaaS-based
network detection and response to Azure Sentinel SIEM.

Read Now

Solution Brief

9.28.21

EXTRAHOP REVEAL(X) FOR MICROSOFT AZURE


Read Now

White Paper

9.24.21

John Pescatore

SANS 2021 TOP NEW ATTACKS AND THREAT REPORT



Understand the perceived gaps in cloud security, the challenges of securing
DevOps without slowing them down, and how network detection and response offers
more comprehensive security capabilities.

Read Now

Datasheet

9.9.21

INTEGRATED REVEAL(X) NDR AND EXABEAM FUSION SIEM



Learn how advanced threats erase logs and avoid endpoint agents to evade
detection, and how you can take back the advantage by integrating NDR and SIEM
to detect threats faster.

Read Now

Customer Story

LEADING MANUFACTURER BRINGS NETWORK SECURITY TO THE SHOP FLOOR WITH EXTRAHOP
REVEAL(X)

Manufacturing & Industries
Read Now

Solution Brief

9.1.21

REVEAL(X) NG-IDS USE CASES



Learn about the declining efficacy of legacy IDS, how pushing it deeper into the
network creates more false alerts, and how next-generation IDS (NG-IDS) builds a
comprehensive security posture.

Read Now

Solution Brief

8.30.21

SECURE AND ACCELERATE HEALTHCARE EXPERIENCES



Learn about the changing landscape of healthcare IT, the challenges facing
healthcare delivery organizations, and how their IT teams can reduce friction
and improve collaboration.

Read Now

Solution Brief

8.26.21

EXTRAHOP + CROWDSTRIKE: EXTRAHOP REVEAL(X) 360: FULL-COVERAGE NDR AND EDR, BUILT
FOR WHEN SECONDS MATTER



Learn about the growing sophistication of cyberattacks, how they evade security,
and why integrating NDR and EDR can offer complete visibility to stop advanced
threats.

Read Now

Industry Report

8.26.21

THE THREAT INSIDE YOUR NETWORK: SUPPLY CHAIN GLOBAL RISK AND FINANCIAL SERVICES



Learn about the challenges financial services face in a post-Covid world, how
sophisticated attackers infiltrate the network, and get practical advice on
monitoring and end-to-end visibility.

Read Now

Customer Story

REDUCE TIME TO DETECT AT SCALE WITH NETWORK DETECTION AND RESPONSE TOOLS

SaaS / Technology
Read Now

Datasheet

8.25.21

ACCELERATE ZERO TRUST ADOPTION IN THE PUBLIC SECTOR WITH REVEAL(X)

Government

Learn why Zero Trust initiatives are on the rise, the challenges facing the
public sector, and how ExtraHop Reveal(x) can help businesses quickly achieve
this mandate.

Read Now

Webinar

8.19.21

CURBING THE FLOW OF RANSOMWARE: REAL OR PIPE DREAM?

Government

The Federal push for better cybersecurity has become a national priority as a
result of the Colonial Pipeline attack. Learn about all that entails.

Watch Now

Solution Brief

8.18.21

EXTRAHOP REVEAL(X) 360 FOR EDUCATION

Government

Learn about the security challenges facing educational institutions, why schools
and colleges are good targets for cyberattacks, and how real-time visibility can
mitigate risk and respond faster.

Read Now

Analyst Report

8.17.21

Peter Firstbrook, Jeremy D'Hoinne

GARTNER QUICK ANSWER: HOW TO RESPOND TO A SUPPLY CHAIN ATTACK?



Learn about supply chain attacks, how they infiltrate and affect the network,
and how to develop an incident response plan to deal with potential events.

Read Now

White Paper

8.6.21

MERITALK: COLONIAL PIPELINE HACK ROCKETS RANSOMWARE TO TOP OF U.S. SECURITY
AGENDA

Government

Learn about the new policies being enacted for the public sector, how it affects
American business, and the key takeaways from the Biden administration's agenda.

Read Now

Webinar

8.2.21

REDUCE TIME TO DETECT AT SCALE USING NETWORK DETECTION AND RESPONSE TOOLS



Get details on VIASAT's selection, deployment, and experience of using ExtraHop
Reveal(x).

Watch Now

Webinar

7.29.21

ACCELERATE ZERO TRUST ADOPTION THROUGH COMPLETE VISIBILITY

Government

ExtraHop's Public Sector team discusses important considerations for planning,
implementing, operating, and securing a Zero Trust deployment.

Watch Now

Industry Report

7.22.21

INFORMATIONWEEK MONITORING CRITICAL CLOUD WORKLOADS



Learn how to adapt your security practices to changing cloud architectures with
a phased approach to critical cloud workload monitoring.

Read Now

Webinar

7.21.21

THE CLOUD SECURITY TRIFECTA: AWS + CROWDSTRIKE + EXTRAHOP



Learn how to leverage the three primary data sources or tool types a cloud SOC
needs in order to achieve complete security visibility: logs (SIEM), endpoint
monitoring (EDR), and the network (NDR).

Watch Now

Analyst Report

7.9.21

Christopher Kissel and Michelle Abraham

IDC TECHNOLOGY SPOTLIGHT: HOW NETWORK INTELLIGENCE TOOLS FIND AN ADVERSARY AND
DEFEND AGAINST ADVANCED THREATS



Learn how the pandemic impacted organizations and forced a growing attack
surface, and how the need for complete network visibility to expose advanced
threats has increased.

Read Now

Webinar

7.8.21

HOW A HEALTHCARE ORG BOOSTED THEIR SECURITY WITH NETWORK DETECTION & RESPONSE



Learn how Central Oregon Radiology Associates (CORA) improved security posture
and reduced costs while securing remote sites and medical IoT for over 8,000
physicians, hospitals, and clinics.

Watch Now

White Paper

7.7.21

Barbara Filkins and John Pescatore

SANS 2021 REPORT: MAKING VISIBILITY DEFINABLE AND MEASURABLE



Set and track organization-wide visibility goals for more effective security

Read Now

Solution Brief

7.2.21

CATCH UNKNOWN THREATS & REDUCE RESPONSE TIME WITH INTEGRATED NDR + SIEM



Learn how to modernize security operations, get faster threat detection, greater
MITRE ATT&CK and CIS Controls coverage, and achieve next-gen security postures
like Zero Trust and XDR.

Read Now

White Paper

7.1.21

APTS, ZERO DAYS, AND SUPPLY CHAIN ATTACKS: KNOW THE DIFFERENCE AND PREPARE
ACCORDINGLY



Learn about the three most prevalent advanced threats today, how to properly
classify them, and get guidance on how you can protect your organization.

Read Now

Webinar

6.28.21

MAKING VISIBILITY DEFINABLE AND MEASURABLE - A SANS PANEL DISCUSSION



Watch panelists from SANS and ExtraHop discuss the SANS 2021 Visibility Report.

Watch Now

Solution Brief

6.25.21

REVEAL(X) FOR STATE AND LOCAL GOVERNMENT

Government

To beat back intruders already inside a network, state and local governments
need complete visibility, real-time situational awareness, and high-fidelity
contextual data.

Read Now

Customer Story

NATIONAL FINANCE INSTITUTION TRANSFORMS SECURITY OPERATIONS AND GAINS VISIBILITY
WITH EXTRAHOP REVEAL(X)

Financial Services
Read Now

Webinar

6.11.21

BREAKING AD TRUST BOUNDARIES THROUGH KERBEROS VULNERABILITIES



The talk will discuss a flaw in how AD forest trusts operate and how this can be
combined with a vulnerability in the Windows implementation of Kerberos to take
over systems in a different forest.

Watch Now

Solution Brief

6.10.21

4 STEPS TO SECURE CLOUD MIGRATION



Learn how to efficiently migrate your organization to a cloud environment while
maintaining security.

Read Now

Webinar

6.7.21

IT IS ALWAYS DNS, SUNBURST CONFIRMS



Hear ExtraHop discuss insights from the white paper "SolarWinds SUNBURST DNS
Abuse Tactics". The talk will include DNS exploit detection demos and cover the
novel ways SUNBURST exploited DNS.

Watch Now

Webinar

6.3.21

3 WAYS SECOPS AND NETOPS COLLABORATION SAVES MONEY & STOPS ATTACKERS FASTER



Learn how the union between the SOC and NOC can help with tool consolidation,
improve incident response time and effectiveness, and adapt to the cloud, remote
work, and beyond.

Watch Now

Solution Brief

6.3.21

EXTRAHOP REVEAL(X) 360 + CROWDSTRIKE FALCON®: FULL-COVERAGE NDR AND EDR, BUILT
FOR WHEN SECONDS MATTER



Cyberattackers are growing more sophisticated. Learn how combining network
intelligence and endpoint detection can help secure your hybrid and multi-cloud
environment.

Read Now

eBook

6.2.21

WHY THE TIME IS RIGHT FOR NETWORK AND SECURITY COLLABORATION: PUBLIC SECTOR
EDITION

Government

Learn why distributed workforces and cloud adoption increases the strain on
siloed public sector security teams, and how collaboration can help defend
against cyber attacks.

Read Now

Customer Story

AUSTRIA'S LARGEST POWER PRODUCER USES EXTRAHOP REVEAL(X) AS A BUILDING BLOCK FOR
ITS SECURITY OPERATIONS CENTER (SOC)

Energy
Read Now

White Paper

5.21.21

ZERO TRUST IN THE MODERN SECURITY LANDSCAPE



Learn why zero trust is top-of-mind in security and how network data can help
you implement a zero trust strategy.

Read Now

Webinar

5.20.21

BEYOND DARKSIDE: HOW TO CATCH & STOP NEXT-GEN RANSOMWARE

Energy

Hear Mark Bowling, VP of Security Response at ExtraHop and 20-year veteran of
the FBI cybercrimes division, discuss the Colonial Pipeline ransomware attack
and the implications for security leaders.

Watch Now

Webinar

5.19.21

3 WAYS TO IMPROVE YOUR CLOUD SECURITY



In this webinar, we'll demonstrate how to think about cloud security from a
network perspective, and give a demo highlighting how stronger security can be
put into action in your cloud environment.

Watch Now

Security Advisory

5.12.21

SECURITY ADVISORY: INSECURE PROTOCOL USAGE EXPOSES ORGANIZATIONS TO
CYBERSECURITY RISK



The deprecated SMBv1 protocol has been associated with more than $1 billion in
damages from attacks like WannaCry—so why are over two thirds of environments
running it in ten or more devices?

Read Now

White Paper

5.12.21

Dave Shackleford

SANS 2021 CLOUD SECURITY SURVEY



Learn how organizations are approaching cloud security challenges, from current
threats to security tool adoption trends.

Read Now

Webinar

5.7.21

STEALING THE SILVER LINING FROM YOUR CLOUD



In this demo-filled webinar, we'll discuss scenarios where cloud-based
technologies have given opportunities to attackers that have resulted in
catastrophic repercussions for the company involved.

Watch Now

Analyst Report

5.6.21

Fernando Montenegro

CLOUD SECURITY IS MUCH MORE THAN PREVENTION AND COMPLIANCE



Understand the perceived gaps in cloud security, the challenges of securing
DevOps without slowing them down, and how network detection and response offers
more comprehensive security capabilities.

Read Now

Webinar

5.5.21

IT'S TIME TO THINK MORE BROADLY ABOUT CLOUD WORKLOAD SECURITY



Learn how agentless NDR can play a crucial role in protecting your cloud
workloads against today's advanced threats, as well as how to close gaps left by
other cloud workload security technologies.

Watch Now

Webinar

5.3.21

DEFINING AN XDR STRATEGY: WHAT DOES IT MEAN FOR YOUR ORGANIZATION?



Learn how to define what XDR means for your organization, how to create your own
XDR strategy, and why network data is an essential building block for any XDR
ecosystem.

Watch Now

Webinar

5.3.21

PART 3: HOW NG-IDS STOPS ADVANCED THREATS LEGACY IDS MISSES



See how machine learning NG-IDS gives you back the edge against advanced
threats.

Watch Now

Webinar

5.2.21

PART 2: WHY DETECTION-FIRST POSTURE BEATS PREVENTION EVERY TIME



Join ExtraHop experts to get insights into building effective layered defenses
that prioritize your budget, including the importance of upgrading to next-gen
IDS.

Watch Now

Webinar

5.1.21

PART 1: DEFENDING AGAINST ADVANCED THREATS WITH INTEGRATED EDR & NDR



In the first of a three-part series, we'll discuss advanced threat behaviors,
how to leverage the three foundational data sources, and how to rapidly respond
to minimize the blast radius.

Watch Now

Customer Story

CENTRAL OREGON RADIOLOGY SAFEGUARDS SENSITIVE MEDICAL IMAGES AND DATA WITH
EXTRAHOP REVEAL(X)

Healthcare
Read Now

Solution Brief

4.30.21

ACCELERATE DETECTION AND RESPONSE IN FINANCIAL SERVICES



Learn about the challenges financial services face from advanced threats and how
cloud-native network detection and response (NDR) can improve security posture
and reduce overall risk.

Read Now

White Paper

4.28.21

Matt Bromiley

NETWORK SECURITY: PROTECTING YOUR ORGANIZATION AGAINST SUPPLY CHAIN ATTACKS



Now is the time to reconsider supply chain security. Learn about the value of
incorporating network data into your organization's detection capabilities.

Read Now

eBook

4.26.21

WHY THE TIME IS RIGHT FOR NETWORK AND SECURITY COLLABORATION



Learn why distributed workforces and cloud adoption increases the strain on
NetOps and SecOps teams, and how collaboration can help defend against cyber
attacks.

Read Now

eBook

4.23.21

REVEAL(X) 360 EBOOK



Learn how ExtraHop removes security gaps across hybrid and cloud deployments to
detect, investigate, and respond to threats in a single management pane.

Read Now

Webinar

4.22.21

SANS 2021 CLOUD SECURITY SURVEY PANEL DISCUSSION



A panel of security experts analyze this survey, which explores the services
organizations are using, what controls and tools provide the most value, and the
effectiveness of cloud security brokering.

Watch Now

White Paper

4.20.21

TAXONOMY OF SOLARWINDS SUNBURST DNS ABUSE TACTICS



Weaknesses in DNS systems were used by SUNBURST attackers to hide command and
control traffic. Learn how attackers used DNS to evade detection and how to spot
the early signs of an attack.

Read Now

Analyst Report

4.8.21

ESG SHOWCASE: NG-IDS, NDR, AND EXTRAHOP



Learn why intrusion detection systems (IDS) are losing ground to attackers, and
how network detection and response offers more security coverage as the
next-generation IDS.

Read Now

White Paper

4.6.21

ZERO TRUST IN THE PUBLIC SECTOR

Government

Learn about what drives Zero Trust adoption and how this security model is
changing the way federal, state, and local governments effectively mitigate the
risks of cyberattacks and data breaches.

Read Now

Webinar

4.5.21

HYBRID SECURITY: PROTECTING YOUR SUPPLY CHAIN



Learn NDR's capabilities and how bringing endpoint and network together will
prove to be a one-two punch to bring down even advanced attackers.

Watch Now

Solution Brief

4.2.21

SECURE AND ACCELERATE RETAIL DIGITAL TRANSFORMATION

Retail / eCommerce

Learn how to avoid costly disruptions by securing critical revenue-generating
tools and devices.

Read Now

Infographic

3.31.21

WHERE ARE THE GAPS IN YOUR CLOUD AND HYBRID SECURITY TOOLSET?



How can you reduce risk and gain cloud and hybrid visibility? Find out in this
data-packed infographic with links to reports from SANS, Dark Reading,
Forrester, and more!

Read Now

Webinar

3.29.21

SECURE YOUR CLOUD AGAINST ADVANCED ATTACKS WITH NETWORK DETECTION AND RESPONSE



Learn how NDR enables you to adopt a detect-and-respond posture for securing
against advanced attacks in the cloud.

Watch Now

Webinar

3.26.21

EXTRAHOP REVEAL(X) PRESENTS HANDS-ON NETWORK DETECTION & RESPONSE



This session will provide a hands-on demonstration of the detection capabilities
and the depth of forensic data provided by the ExtraHop Reveal(x) platform.

Watch Now

Infographic

3.24.21

5 NEED-TO-KNOW LESSONS FROM SANS TO STOP A BREACH POST COMPROMISE



ExtraHop compiled the top takeaways from a year of SANS Institute research and
analysis to help inform your security strategy.

Read Now

Webinar

3.18.21

INCIDENT RESPONSE AGAINST ADVANCED THREATS: WHAT CHANGES AFTER SUNBURST?



Hear about the benefits of sharing data and tools between security, network, and
other teams for accelerated incident response, reduced risk, and greater
effectiveness.

Watch Now

Webinar

3.17.21

CROWDSTRIKE & EXTRAHOP PARTNER TO STOP BREACHES WITH CLOUD-NATIVE EDR AND NDR



Learn directly from ExtraHop and CrowdStrike about how our Fortune 100 customers
are using this solution, and how the integration can provide enterprise security
operations teams with capabilities and …

Watch Now

Customer Story

TARRANT REGIONAL WATER DISTRICT MITIGATES RISK AND ENHANCES CYBERSECURITY WITH
EXTRAHOP

Government
Read Now

Webinar

3.11.21

TIME FOR AN UPGRADE? WHAT NEXT GENERATION IDS CAN BRING TO THE ENTERPRISE



Join ExtraHop and (ISC)2 for a discussion on Next Generation IDS and how it can
provide more than just a compliance check off and provide context to the alerts
you receive.

Watch Now

Webinar

3.11.21

HOW THE NETWORK IS USED TO UNMASK THE ADVERSARY



Listen as IDC Analyst Chris Kissel speaks with ExtraHop about the importance of
network intelligence and threat analytics (NITA) solutions in addressing the
increasing risk of advanced threat actors.

Watch Now

White Paper

3.10.21

RETIRE THAT NOISY '90S IDS, UPGRADE TO NG-IDS



Intrusion detection systems (IDS) may help meet compliance standards, but they
can't offer much actual security. By putting your budget toward next-generation
IDS, you can reduce false alerts and …

Read Now

Analyst Report

2.28.21

SECURING CLOUD ASSETS: HOW IT SECURITY PROS GRADE THEIR OWN PROGRESS



Gain a better understanding of the top security concerns, approaches to
protecting cloud and hybrid environments, and tooling used by cloud-focused
security teams.

Read Now

Webinar

2.18.21

CLOUD SECURITY: ARE YOU DOING IT WRONG?



Learn how NDR eliminates visibility gaps across your attack surface, and follow
along a live demo of how to stop advanced threats like supply chain attacks,
zero-day exploits, and more.

Watch Now

Industry Report

2.12.21

Christopher Kissel, Frank Dickson

IDC MARKET SHARE REPORT



Worldwide Network Intelligence and Threat Analytics Market Shares: How the
Network Is Used to Unmask the Adversary.

Read Now

Whitepaper

2.12.21

NETWORK DETECTION AND RESPONSE: HOW REVEAL(X) DETECTS THREATS



Learn in detail how Reveal(x) uses a Full-Spectrum Detection approach including
security hygiene, rule-based detection & cloud-scale ML behavior analysis to
detect threats & stop breaches 84% faster.

Read Now

Security Report

2.11.21

EXTRAHOP SECURITY REPORT: LESSONS LEARNED INVESTIGATING THE SUNBURST SOFTWARE
SUPPLY CHAIN ATTACK



SUNBURST attackers went to extreme lengths to evade security, but from March to
early October, 2020, ExtraHop found that detections of threat activity increased
approximately 150 percent.

Read Now

Webinar

2.11.21

HEALTHSCARE – AN INSIDER'S BIOPSY OF HEALTHCARE APPLICATION



Learn about the vulnerabilities and design issues within healthcare solutions.

Watch Now

Webinar

2.8.21

POST MORTEM: THE FIRST 72 HOURS OF SUNBURST THREAT INTELLIGENCE RESEARCH



Hear background on the SUNBURST attack and how it was so hard to detect, as well
as how ExtraHop uncovered new threat intelligence for use in investigating and
responding to SUNBURST.

Watch Now

Webinar

2.4.21

CONFIEZ LA SÉCURITÉ DE VOS APPAREILS NON GÉRÉS ET DE VOS IOT



Découvrez la capacité d'ExtraHop et de Keysight à offrir une visibilité complète
sur tous les appareils et à arrêter les attaques avant qu'elles ne frappent.

Watch Now

Webinar

2.1.21

DRIVING A STAKE IN ADVANCED THREATS (SUNBURST) WITH THE NETWORK



Learn how you can use covert countermeasures to flag unusual and malicious
behavior, investigate, and respond to stop digital vampires before they breach
your network.

Watch Now

Webinar

1.28.21

DOING XDR RIGHT: WHAT IT IS AND WHAT IT CAN DO FOR YOUR ORGANIZATION



Join ExtraHop and (ISC)² for an examination on the costs and benefits of
Extended Detection and Response, which promises to unite security tools focused
on threat protection, detection and response.

Watch Now

Solution Brief

1.20.21

EXTRAHOP REVEAL(X): NEXT GENERATION IDS USE CASES



Learn how to get more from your IDS budget with a next generation intrusion
detection system.

Read Now

White Paper

1.14.21

EXTRAHOP 2021 CLOUD AND HYBRID SECURITY TOOLING REPORT



With hybrid environments on the rise, most organizations have reported gaps in
their toolset. Cloud-native network detection and response uses network data to
address visibility and detection gaps.

Read Now

Analyst Report

1.14.21

RANSOMWARE PREVENTION SPECIAL REPORT: HOW TO ADDRESS A PERVASIVE AND UNRELENTING
THREAT



Discover Ways to Take Action and Protect Your Organization

Read Now

Analyst Report

1.13.21

ANALYZING MALICIOUS BEHAVIOR EFFECTIVELY WITH EXTRAHOP REVEAL(X)



How Advanced Detection and Investigation Features Make Threat Detection
Accessible

Read Now

White Paper

12.31.20

SANS: A NEW TAKE ON CLOUD RESPONSIBILITY



Without more shared responsibility clarity, adapting your security strategy for
the cloud can be a challenge. Learn how to navigate cloud infrastructure nuances
and strengthen your security posture.

Read Now

Webinar

12.21.20

CUSTOMER CLOUD SECURITY: A SANS SURVEY



Watch the webcast to learn more about common cloud architectures, popular
security products, spending trends on tooling and architecture, and CSP-native
tools vs. industry leading security products.

Watch Now

Analyst Report

12.15.20

SANS 2020 CLOUD SECURITY REPORT



Gain valuable insight into the current state of cloud security and the trends
that are driving cloud migration and tooling decisions.

Read Now

Webinar

12.15.20

CLOUD SHARED RESPONSIBILITY: A SANS WHITE PAPER



We discuss the lack of skills in cloud security technologies, the much faster
deployments and changes to keep pace with, and a need for better controls to
help combat these systemic challenges.

Watch Now

Webinar

12.15.20

ANALYZING MALICIOUS BEHAVIOR EFFECTIVELY



Dave Shackleford will share his insights on the many enhancements and new
features of Reveal(x) that help intrusion analysis and investigation teams
analyze malicious behavior rapidly and effectively.

Watch Now

Webinar

12.10.20

FEDTALKS EP. #1: A KILLER COMBINATION - PROACTIVE THREAT HUNTING AND MODERN NDR



See how the ExtraHop Network Detection & Response (NDR) platform can be used,
not only to automatically detect the latest threats, but also for proactive
Threat Hunting workflows.

Watch Now

eBook

12.8.20

BUILDING RESILIENCY AT SCALE: SECURELY ACCELERATING DIGITAL TRANSFORMATION

Healthcare

Discover how healthcare organizations can maximize security as they increase
cloud services.

Read Now

White Paper

12.8.20

THE ROLE FRAMEWORKS AND PRIVACY REGULATIONS PLAY IN HEALTHCARE CYBERSECURITY

Healthcare

Find out what tools and techniques can help overcome challenges to safeguard
healthcare.

Read Now

Webinar

12.3.20

TECHNOLOGY SPRAWL: THE HIDDEN DISEASE OF IT AND WHAT TO DO ABOUT IT



Join a panel of IT and security executives as they discuss the root causes of
technology sprawl, a path out of this cycle, and the benefits to be achieved.

Watch Now

Webinar

11.30.20

ENABLING DETECTION & RESPONSE ACROSS DATA CENTER AND CLOUD APPS



Watch this webinar to hear details on Grand Canyon Education's selection,
deployment and experience using ExtraHop.

Watch Now

Webinar

11.30.20

RANSOMWARE PREVENTION PANEL: HOW TO ADDRESS A PERVASIVE & UNRELENTING THREAT



This webcast takes a deeper dive into the whitepaper, How to Address a Pervasive
and Unrelenting Threat.

Watch Now

Webinar

11.30.20

HOW EXTRAHOP & AWS POWER FRICTIONLESS SECURITY IN THE CLOUD



Learn how AWS and ExtraHop empower security teams to stop breaches, not
business, with frictionless network detection and response.

Watch Now

Analyst Report

11.24.20

EXTENDING DEVSECOPS SECURITY CONTROLS INTO THE CLOUD: A SANS SURVEY



Discover how DevOps can see faster deployment in the cloud by integrating
security.

Read Now

Webinar

11.12.20

EXTENDING DEVSECOPS SECURITY CONTROLS INTO THE CLOUD



A roundtable of security experts discuss results from the SANS 2020 survey of
the same name, and explore best practices for DevSecOps teams to follow when
leveraging todays cloud-based environments.

Watch Now

Webinar

11.4.20

AUFDECKEN UND MANAGEN VON NICHT VERWALTETEN GERÄTEN



Mit Keysight und ExtraHop können Sie alle Geräte im Kontext Ihres restlichen
Netzwerks erkennen und überwachen, um Angriffe zu erkennen und darauf zu
reagieren, bevor sie zu einem Verstoß werden.

Watch Now

Webinar

11.3.20

DISCOVERING AND SECURING IOT AND UNMANAGED DEVICES WITH EXTRAHOP AND KEYSIGHT



Learn how you can discover and monitor all devices in context of the rest of
your network, to detect and respond to attacks before they become a breach.

Watch Now

Webinar

11.3.20

ANOMALY BASED MALWARE DETECTION VIA THE NETWORK DETECTION AND RESPONSE TOOLKIT



This session will discuss how to leverage Network Detection and Response based
tools to uncover, scope, and respond to new malware variants.

Watch Now

Webinar

11.2.20

HTTP REQUEST SMUGGLING IN 2020



We cover new HTTP Request Smuggling attack variants that work against web
servers and HTTP proxy servers. Then we go over a class library that can provide
robust socket-level protection against them.

Watch Now

Webinar

10.26.20

HOW TO USE NETWORK VISIBILITY FOR DEEPER MITRE ATT&CK COVERAGE



Learn about the critical role network detection and response plays in achieving
MITRE ATT&CK Framework coverage, and how to use the network to detect late-stage
attack tactics and stop the breach.

Watch Now

Analyst Report

10.22.20

TOP THREATS TO CLOUD COMPUTING: EGREGIOUS ELEVEN DEEP DIVE



Learn from nine real-world attacks, from exploits to mitigation tactics.

Read Now

Webinar

10.20.20

IMPROVING INCIDENT RESPONSE TIME BY 84%: A FORRESTER TEI SURVEY



Join us as we discuss the recent Forrester Research Total Economic Impact (TEI)
study commissioned by ExtraHop where we will discuss how to improve response
times by 84% and more.

Watch Now

Analyst Report

10.14.20

2020 SANS ENTERPRISE CLOUD INCIDENT RESPONSE SURVEY



Get a glimpse into the current state of cloud incident response, and learn what
SANS experts predict about the future of cloud security.

Read Now

White Paper

10.6.20

SELECTION GUIDE FOR NETWORK VISIBILITY TOOLS



Learn how to improve operational efficiencies and reduce costs through tool
rationalization.

Read Now

Webinar

9.28.20

2020 SANS ENTERPRISE CLOUD INCIDENT RESPONSE SURVEY: A PANEL DISCUSSION



In this webcast, survey author Chris Dale and survey advisor Matt Bromiley will
join experts representing the survey sponsors to discuss results from the 2020
SANS Enterprise Cloud Incident Response …

Watch Now

Webinar

9.26.20

HOW CROWDSTRIKE AND EXTRAHOP HELP TO AUGMENT SECURITY FOR AWS DEPLOYMENTS



Learn how the integration of ExtraHop Reveal(x) 360 and CrowdStrike Falcon helps
security teams detect and respond instantly to sophisticated attacks.

Watch Now

Webinar

9.25.20

ADDRESSING CLOUD SHARED SECURITY RESPONSIBILITY WITH PACKETS AND NDR



Cloud providers offer log-based event and configuration monitoring tools but
real-time detection and response needs full packet data. Learn how NDR in the
cloud presents new opportunities.

Watch Now

Webinar

9.24.20

THE NEW REALITIES OF HEALTHCARE IT



Please join us for a conversation on as we bring healthcare leaders from MEDHOST
, Pacific Dental Services and AdventHealth together to discuss the new realities
and challenges facing healthcare IT …

Watch Now

Webinar

9.24.20

UNLOCKING THE ULTIMATE SOURCE OF TRUTH IN THE CLOUD — NETWORK DATA



Learn how virtual taps from AWS, Azure, and Google Cloud enable NDR solutions to
help secure cloud environments covertly with out-of-band, agentless monitoring
and threat detection capabilities.

Watch Now

Webinar

9.17.20

THE RIPPLE EFFECT: LATENT VULNERABILITIES TO BE FELT FOR YEARS TO COME



Join ExtraHop and (ISC)2 as we explore the ramifications of Ripple20, how to
detect vulnerable devices and determine if you should patch or replace.

Watch Now

Webinar

9.13.20

EXTENDING THE ENTERPRISE NETWORK FOR REMOTE WORKERS



In this webcast, learn about the challenges of teleworking and remote workers,
and the new Remote Work bundle to help organizations get visibility into remote
locations.

Watch Now

Security Advisory

9.10.20

SECURITY ADVISORY: RIPPLE20 VULNERABILITIES



Understand this series of vulnerabilities and what you can do about them, plus
see data from ExtraHop on how widespread the issue is.

Read Now

Webinar

9.3.20

BLACK HAT WEBCAST SERIES - GCP LATERAL MOVEMENT AND PRIVILEGED ESCALATION SPILL



This webinar will do a recap of our BlackHat talk, privilege escalating remote
build execution, and generally talk through the updates from Google and how they
impact attacks.

Watch Now

Analyst Report

9.1.20

Nick Mayberry

FORRESTER TOTAL ECONOMIC IMPACT STUDY



Forrester Consulting interviewed and conducted a financial analysis of ExtraHop
customers, finding that Reveal(x) leads to an overall ROI of at least $1.1
million over three years.

Read Now

Webinar

8.31.20

LOOKING BEYOND IDS: WHAT'S NEXT FOR NETWORK DETECTION?



This webinar will discuss how organizations can use the network to detect
stealthy post-compromise activity that evades other monitoring techniques.

Watch Now

Solution Brief

8.26.20

EXTRAHOP REVEAL(X) FOR U.S. FEDERAL IT NETWORKS

Government

Secure, Modernize, and Visualize the Mission.

Read Now

Webinar

8.19.20

TOP CLOUD THREATS: UNDERSTANDING AND RESPONDING TO THE EGREGIOUS ELEVEN



Get real-world examples from Cloud Security Alliance and ExtraHop of how these
cloud threats can affect your business, as well as steps you can take now to
strengthen your security posture.

Watch Now

Industry Report

8.14.20

Vince Stross, Jake Williams

BLACK HAT: HOW ATTACKERS CONFUSE INVESTIGATORS WITH CYBER FALSE FLAG ATTACKS



Get a better understanding of the techniques attackers use to cover their tracks
and confuse investigators, so you can identify false flags and know who's
attacking—and why.

Read Now

Webinar

8.13.20

DISCOVERING AND SECURING IOT AND UNMANAGED DEVICES WITH EXTRAHOP AND KEYSIGHT



See how together ExtraHop and Keysight provide comprehensive visibility into all
devices to stop attacks before they cause damage.

Watch Now

Webinar

8.12.20

UNDERSTANDING AND LEVERAGING THE MITRE ATT&CK FRAMEWORK



Sponsor representatives and report author John Hubbard will discuss the new SANS
report, "Measuring and Improving Cyber Defense Using the MITRE ATT&CK
Framework."

Watch Now

Webinar

8.3.20

CLOSING THE CRITICAL SKILLS GAP FOR MODERN SECURITY OPERATIONS CENTER



SANS Director of Emerging Security Trends and survey author John Pescatore will
discuss results from our 2020 SOC Skills Survey.

Watch Now

Industry Report

8.3.20

John Hubbard

SANS REPORT: MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK
FRAMEWORK



Learn about the MITRE ATT&CK security framework and how it can help you
strengthen your security and measure your success.

Read Now

Industry Report

7.31.20

John Pescatore and Barbara Filkins

SANS REPORT: CLOSING THE CRITICAL SKILLS GAP FOR MODERN AND EFFECTIVE SECURITY
OPERATIONS CENTERS (SOCS)



Learn how investing in your current staff results in more effective security
operations centers.

Read Now

Webinar

7.31.20

COMPLETING THE TRIAD, THE CASE FOR LEADING WITH NDR



Learn about the ways in which NDR compliments and in many cases improves the
efficacy of your existing investments in SIEM and EDR.

Watch Now

Solution Brief

7.30.20

REVEAL(X) ADVISOR: TARGETED EDUCATION & INVESTIGATION GUIDANCE


Read Now

Webinar

7.29.20

AISA WEBINAR: EXTENDING NETWORK SECURITY FOR THE CLOUD



AWS and ExtraHop will discuss ways to apply AWS controls and services to create
a security visibility strategy for the cloud, deliver an agentless, scalable
approach that provides SecOps with unified …

Watch Now

Webinar

7.28.20

A REAL CONVERSATION ABOUT POST-COMPROMISE, WITH CYBERWIRE'S DAVE BITTNER



We discuss the trends that are complicating the job of security professionals
today, including the overnight move to remote work and the acceleration of cloud
adoption.

Watch Now

Webinar

7.7.20

HOW ATTACKERS CONFUSE INVESTIGATORS WITH CYBER FALSE FLAG ATTACKS



We'll demonstrate techniques showing how attackers can plant forensic evidence,
misdirecting investigators about their intentions and identities.

Watch Now

Customer Story

MAPCO SETS THEIR SIGHTS ON THE ROAD AHEAD, GUIDED BY HYBRID VISIBILITY FROM
EXTRAHOP

Retail / eCommerce
Read Now

Industry Report

7.1.20

Heather Mahalik

SANS 2020 REMOTE WORKERS POLL



See how the tech workforce has adapted to work-from-home and how organizations
have navigated the new challenges posed.

Read Now

Webinar

6.29.20

HOW TO SECURE REMOTE WORKERS FOR THE LONG HAUL



Analysts from SANS and ExtraHop discuss the data from a recent poll about remote
working and explore the critical topics on how to adapt to semi-permanent remote
work situations at enterprises of …

Watch Now

Webinar

6.25.20

TIME TO ADAPT – INTEGRATING SECOPS AND NETOPS



Join Extrahop and (ISC)2 to learn how integrating the two operations can help
you eliminate redundant tools, break down data silos, streamline processes, and
optimize your budget.

Watch Now

Webinar

6.23.20

BLACK HAT: PRAGMATIC DEVSECOPS - CLOUD EDITION



A quick review of DevOps and 5 steps to integrate effective DevSecOps into your
security and DevOps programs.

Watch Now

Customer Story

MAINTAINING SECURITY AND NETWORK PERFORMANCE WHILE MIGRATING TO THE CLOUD

Healthcare
Read Now

eBook

6.15.20

Evan Schuman

SC MEDIA EBOOK ON IOT VULNERABILITIES



Learn about the changing risks of IoT and get a two-part method for securing
this growing attack surface.

Read Now

Webinar

6.11.20

UNIFYING SECURITY ACROSS MULTICLOUD, HYBRID, & REMOTE DEPLOYMENT



Learn about Reveal(x) 360 and how ExtraHop's SaaS offering is natively delivered
from the cloud and provides Network Detection and Response capabilities to
create faster time to value without …

Watch Now

Analyst Report

6.11.20

Lawrence Orans, Jeremy D'Hoinne, and Josh Chessman

2020 GARTNER MARKET GUIDE FOR NETWORK DETECTION & RESPONSE



ExtraHop is a representative vendor two years running

Read Now

Webinar

6.10.20

ENTERPRISE IOT: EXPLORING THE THREAT OF UNKNOWN DEVICES ON YOUR NETWORK



Gain guidance for how to gain visibility into eIoT and how machine learning can
provide the needed context and correlation of all devices to detect threats and
improve the overall security posture of …

Watch Now

Customer Story

LITEHOUSE FOODS SCALES SECURITY OPERATIONS FOR GROWTH WITH EXTRAHOP REVEAL(X)

Manufacturing & Industries
Read Now

Webinar

6.1.20

FACTORING IOT DEVICES INTO DETECTION AND RESPONSE: A SANS WHITEPAPER



Explore the growth of enterprise IoT devices and the implications for incident
detection and response. With the right approach, your team can quickly identify
IoT devices for greater visibility to …

Watch Now

Security Advisory

5.29.20

SECURITY ADVISORY: REMOTE DESKTOP PROTOCOL IN A DISTRIBUTED WORKFORCE



Learn how cyberattackers can exploit RDP misconfigurations, and what you can do
to detect and mitigate attacks.

Read Now

Industry Report

5.28.20

Matt Bromiley

SANS: FACTORING ENTERPRISE IOT INTO DETECTION AND RESPONSE



Read the report to learn how threat detection and response programs can best
discover, classify, and detect attacks involving IoT devices.

Read Now

Industry Report

5.26.20

John Pescatore & Juan Canales

SANS WHATWORKS: CLOUD SECURITY & VISIBILITY WITH EXTRAHOP REVEAL(X)


Read Now

Webinar

5.21.20

DARK READING: THE STATE OF IT OPERATIONS AND CYBERSECURITY OPERATIONS



As companies tighten their belts, the need for coordination between operations
and security has never been more urgent. This webinar explores the state of the
relationship between IT Ops and SecOps …

Watch Now

Industry Report

5.19.20

Cynthia Harvey

DARK READING: THE STATE OF IT OPERATIONS & CYBERSECURITY OPERATIONS 2020



Learn where IT Operations and Security teams are succeeding, and where they're
struggling, with collaboration in this new research from Dark Reading.

Read Now

Security Advisory

5.5.20

SECURITY REPORT: CONNECTED DEVICES IN THE TIME OF COVID-19



Learn about the unexpected risks and complexities of connected devices during a
pandemic, plus broader security implications for 2020 and beyond.

Read Now

Solution Brief

5.1.20

EXTRAHOP REVEAL(X) 360



Get a quick summary of how Reveal(x) 360 provides SaaS-based security for edge,
core, and cloud deployments.

Read Now

Webinar

4.29.20

MIGRATING TO THE CLOUD WHILE MAINTAINING SECURITY AND NETWORK PERFORMANCE



Juan Canales from Hill Physicians Medical Group provides insight on what he went
through in the business justification and deployment of ExtraHops Reveal(x) to
increase visibility into network traffic …

Watch Now

Customer Story

ULTA BEAUTY SECURELY SCALES HIGH-GROWTH E-COMMERCE OPERATION IN THE CLOUD WITH
EXTRAHOP

Retail / eCommerce
Read Now

Industry Report

4.28.20

CSA Contributors

CSA: TOP THREATS TO CLOUD COMPUTING


Read Now

Webinar

4.16.20

OFFICE SHUTDOWN: SECURING AN INCREASED REMOTE WORKFORCE



ExtraHop and (ISC)2 hold a timely discussion on how to deal with performance and
security implications of the shift to a remote workforce.

Watch Now

Datasheet

4.14.20

EXTRAHOP REVEAL(X) + CHECK POINT FOR AWS


Read Now

Analyst Report

4.13.20

Scott Crawford et. al.

451: COVID-19 AND ENTERPRISE SECURITY ARCHITECTURE


Read Now

Industry Report

4.6.20

Holger Schulze

CYBERSECURITY INSIDERS 2020 THREAT HUNTING REPORT



In 2020, Cybersecurity Insiders conducted the third annual research project on
threat hunting to gain deeper insights into the maturity and evolution of the
security practice.

Read Now

Industry Report

4.3.20

Ian Reynolds

2020 SANS NETWORK VISIBILITY AND THREAT DETECTION SURVEY



Lack of visibility creates blind spots, while good visibility improves
situational awareness. Monitoring and analyzing network data assists in the
crucial first steps in closing any visibility gap.

Read Now

Webinar

4.2.20

NEW IT REALITIES: A PANEL DISCUSSION ON RAPIDLY SCALING REMOTE ACCESS



Hear best practices on how to handle the performance and security implications
of the shift to a work-from-home workforce.

Watch Now

Industry Report

4.1.20

NETWORK VISIBILITY: DETECTING THE THREAT FROM WITHIN



Discover SANS' recommendations for bridging critical security gaps.

Read Now

Webinar

4.1.20

NETWORK VISIBILITY AND THREAT DETECTION: A SANS SURVEY



Understand the current state of visibility and how organizations can make better
use of network data to detect threats and troubleshoot connectivity problems.

Watch Now

Webinar

3.31.20

MULTI-CLOUD SECURITY: REMOVING FRICTION FROM THE DEVELOPMENT PROCESS



Learn how cloud deployments are affecting security teams and how they can use
agentless NDR to help developers bake security into their processes, gaining the
speed and agility they need to grow their …

Watch Now

Customer Story

WIZARDS OF THE COAST DELIVERS FRICTIONLESS SECURITY FOR AGILE GAME DEVELOPMENT
WITH EXTRAHOP

SaaS / Technology Entertainment
Read Now

Solution Brief

3.20.20

WFH: TIPS FOR ENSURING THE AVAILABILITY AND SECURITY OF REMOTE ACCESS



The COVID-19 pandemic is driving people to work from home and straining remote
access infrastructure. Here are some considerations for IT and Security teams.

Read Now

Analyst Report

3.19.20

Sheryl Kingstone

451: DIGITAL EXPERIENCES ARE FRONT AND CENTER IN COPING WITH CORONAVIRUS


Read Now

Analyst Report

3.18.20

Chris Marsh, Connor Forrest, Raul Castanon-Martinez, Rosanna Jimenez

451: CORONAVIRUS WILL DISRUPT YOUR WORKFORCE: ENSURE THAT YOU HAVE THE RIGHT
TOOLING STRATEGY FOR REMOTE WORKERS



Among the aspects that go into making remote working effective, the right
strategy around workforce tooling is critical. We look at different options to
support employees and explain why it's about …

Read Now

Webinar

3.5.20

USING MITRE ATT&CK IN CLOUD AND HYBRID ENVIRONMENTS



ExtraHop and (ISC)² discuss the MITRE ATT&CK Framework as we look at how to get
the most value from the MITRE ATT&CK Framework in a hybrid environment.

Watch Now

Webinar

2.19.20

CLOUD-NATIVE NETWORK DETECTION AND RESPONSE



Discussion of ExtraHop's cloud native approach to network detection and response
across your hybrid environment, tackling the challenges of visibility and
control in the cloud.

Watch Now

Webinar

2.18.20

BEST PRACTICES FOR GETTING BETTER AT THREAT HUNTING IN 2020



This webinar will cover the 2020 Cybersecurity Insiders Threat Hunting Survey
Results: trends, gaps, areas for improvement, and proven best practices in
threat hunting.

Watch Now

Industry Report

2.7.20

Barbara Filkins

SPENDS & TRENDS: 2020 SANS IT CYBERSECURITY SPENDING SURVEY



SANS outlines potential improvements to help organizations match their security
spend to key trends.

Read Now

Webinar

2.4.20

SANS INSTITUTE: 2020 CYBERSECURITY SPENDING SURVEY PANEL DISCUSSION



Barbara Filkins and John Pescatore from SANS will provide analysis of survey
results and reveal strategies that organizations can use to justify security
spending.

Watch Now

Analyst Report

1.6.20

Eric Hanselman

BUILDING A SCALABLE BUDGET FOR SECURITY ANALYTICS WITH NETWORK DETECTION AND
RESPONSE



Read the Pathfinder report from 451 for advice on how to navigate the shifting
landscape of security capabiliites for smarter budgeting and tool investment.

Read Now

Solution Brief

12.31.19

EXTRAHOP + KEYSIGHT TECHNOLOGIES: PROMOTING ALIGNMENT BETWEEN NETOPS AND SECOPS


Read Now

Webinar

12.20.19

INSTILLING CYBER HYGIENE AMONG USERS AND CREATING A CULTURE OF CYBER SAFETY



Learn how IT managers can implement cyber hygiene practices with existing
phishing penetration testing and awareness training approaches to instill a
culture of cyber safety within the enterprise.

Watch Now

Webinar

12.12.19

A CLOUD CAROL: VISITING THE GHOSTS OF CLOUD SECURITY, PAST, PRESENT, AND FUTURE



Industry analyst Paula Musich from EMA and Ryan Davis from ExtraHop will take a
Dickensian journey through cloud security past, present, and future, and offer
strategies for how security teams change …

Watch Now

Datasheet

12.3.19

REVEAL(X) FOR AWS


Read Now

Webinar

11.14.19

CLOUD SECURITY FAILS OF 2019 AND WHERE TO FOCUS IN 2020



Follow along with the cloud security journey that many enterprises have been on
during the past years, looking at the realities of the high points and low
points. Then, hear about what organizations …

Watch Now

Webinar

11.12.19

WHAT WORKS IN SOC/NOC INTEGRATION: IMPROVING TIME TO DETECT, RESPOND AND CONTAIN



Learn details on the selection and deployment of ExtraHops Reveal(x) to increase
visibility into network traffic, gain detailed and timely insight into
performance and security issues and cross …

Watch Now

Industry Report

11.7.19

John Pescatore

SOC/NOC INTEGRATION WITH EXTRAHOP REVEAL(X)



Gain valuable insights into SOC best practices, Network-based detection tools
and barriers to SOC success from principal SANS Senior Instructor Christopher
Crowley and SANS Director of Emerging …

Read Now

White Paper

11.5.19

NETWORK DETECTION & RESPONSE: CLOUD SECURITY'S MISSING LINK



Learn how NDR solutions leverage cloud virtual taps to complete Gartner's SOC
Visibility Triad of SIEM, EDR, and NDR for strong cloud security.

Read Now

Industry Report

11.4.19

Mathias Fuchs and Joshua Lemon

SANS 2019 THREAT HUNTING SURVEY



Learn which threat hunting strategies you should implement in 2020 based on
research from the SANS Institute.

Read Now

Webinar

11.4.19

SANS INSTITUTE: THREAT HUNTING FOR NEW AND EXPERIENCED HUNTERS PANEL DISCUSSION



SANS 2019 Threat Hunting Survey authors Mathias Fuchs and Joshua Lemon will
discuss key themes that emerged during their analysis of survey results, joined
by a panel of representatives from …

Watch Now

eBook

10.21.19

Esther Shein

ARTIFICIAL INTELLIGENCE: A RELATIVE REALITY



In this SC Solutions tech research report, experts differentiate ML from AI and
alert you to areas where AI can improve.

Read Now

Customer Story

CURO DELIVERS CUSTOMER EXPERIENCE AND SECURITY WITH EXTRAHOP

Financial Services
Read Now

Customer Story

NATIONAL IGNITION FACILITY PROTECTS U.S. NUCLEAR ARSENAL AND EXPLORES CLEAN
ENERGY WITH EXTRAHOP

Energy
Read Now

Datasheet

10.16.19

EXTRAHOP AND SPLUNK


Read Now

Webinar

10.15.19

DIVERSIFY DEFENSE — IMPROVING CYBERSECURITY THROUGH SMART CONSOLIDATION



Jeff Costlow, Deputy CISO at ExtraHop, shares insights about how data-first
approaches and cross-collaboration improve security posture and help reduce tool
sprawl.

Watch Now

Datasheet

10.11.19

EXTRAHOP REVEAL(X) AMI FOR AWS


Read Now

eBook

10.11.19

BEGINNERS' GUIDE TO NETWORK DETECTION AND RESPONSE



Learn about the security category of network detection and response (NDR),
including key capabilities to look for in NDR products and questions to ask
vendors.

Read Now

Webinar

10.10.19

NICE TO HAVE OR HAVE TO HAVE? THE CASE FOR CYBER INSURANCE



Join ExtraHop and (ISC)2 for a discussion on cyber insurance, demystifying the
current insurance landscape and what are the right questions to answer.

Watch Now

White Paper

10.7.19

HOW REVEAL(X) SUPPORTS THE NIST CYBERSECURITY FRAMEWORK



This white paper provides some background information about the NIST
Cybersecurity Framework and NIST Special Publication 800-53 Revision 4 and walks
through how ExtraHop Reveal(x), cloud-native …

Read Now

Webinar

10.3.19

EXTRAHOP REVEAL(X) EXPANDS ATTACK INVESTIGATIONS TO COVER ALL VECTORS



In this SANS webcast, expert Dave Shackleford and Tom Stitt from ExtraHop
discuss how Reveal(x) can help an organization evaluate threat activity in
multiple scenarios, and how key new features make …

Watch Now

Industry Report

10.1.19

Dave Shackleford

SANS PRODUCT REVIEW OF REVEAL(X) NETWORK DETECTION & RESPONSE



Read the 12-page review to learn how Reveal(x) addresses five core security
issues as well as detailed use cases including detection/response and active
threat hunting.

Read Now

Webinar

9.30.19

NETSECOPS — SCALING YOUR SECURITY TALENT



ExtraHop and Security Weekly discuss the challenges and opportunities facing
security and IT teams when it comes to scaling security talent.

Watch Now

Webinar

9.24.19

ISSA INTERNATIONAL SERIES: NEW TRENDS IN SECURITY — OUTSOURCING AND OTHER TECH



As deployment models evolve so does the need for our responses. With technology
such as Cloud, containers, and rapid update deployment rolling out, what's going
on with security?

Watch Now

Webinar

9.23.19

BLACK HAT WEBCAST SERIES: RANSOMWARE NETWORK BEHAVIOR AND DEFENSE



We'll show you the latest ransomware in action, with videos and screenshots from
actual cases, and discuss strategies for monitoring and detecting ransomware,
including mistakes to avoid and tactics …

Watch Now

Analyst Report

8.28.19

IDC WORKBOOK: CLOUD SECURITY ROADMAP



Get IDC's take on the limitations, requirements, and best practices for cloud
security under the shared responsibility model.

Read Now

Webinar

8.26.19

BEST PRACTICES FOR NETWORK SECURITY THREAT HUNTING WITH EXTRAHOP AND IXIA



This webinar will define the benefits of threat hunting and best practices for
deployment of threat hunting.

Watch Now

Customer Story

FROM THE CLASSROOM TO THE CLINIC, TOURO COLLEGE OF DENTAL MEDICINE DELIVERS
SEAMLESS EDUCATION AND PATIENT CARE WITH EXTRAHOP

Education
Read Now

Webinar

8.7.19

INTEGRATED INCIDENT RESPONSE: A PANEL DISCUSSION ABOUT THE SANS 2019 IR SURVEY



This webcast takes a deeper dive into the results of the SANS 2019 Incident
Response (IR) Survey. A panel moderated by SANS Digital Forensics and Incident
Response instructor Matt Bromiley and …

Watch Now

Industry Report

8.1.19

Matt Bromiley

SANS 2019 INCIDENT RESPONSE SURVEY



Dive into what's working for security incident response, what needs to improve,
and what the SANS Institute recommends.

Read Now

Security Advisory

7.29.19

EXTRAHOP SECURITY ADVISORY: CALLING HOME



In this Security Advisory, we discuss four real-world examples of data being
'phoned home' by third-party vendors and share best practices for ensuring data
security, privacy, and compliance.

Read Now

Analyst Report

7.25.19

Paula Musich

EMA'S REVIEW OF EXTRAHOP REVEAL(X) CLOUD



It's the dawn of a new era in network detection and response for the cloud. Read
EMA's latest research to understand why.

Read Now

Analyst Report

7.24.19

Shamus McGillicuddy

EMA: BRIDGING THE GAP BETWEEN NETOPS & SECOPS



Learn how network operations and security operations teams can successfully
collaborate to provide a high-performing and highly secure network, based on
research compiled by Enterprise Management …

Read Now

Webinar

7.11.19

COMMON AND BEST PRACTICES FOR SECURITY OPERATIONS CENTERS: PANEL DISCUSSION



This webcast digs more deeply into the results of the SANS 2019 SOC Survey, in a
panel moderated by SANS Director of Emerging Technologies John Pescatore.

Watch Now

Industry Report

7.10.19

Christopher Crowley and John Pescatore

SANS 2019 SOC SURVEY



Gain valuable insights into SOC best practices, Network-based detection tools
and barriers to SOC success from principal SANS Senior Instructor Christopher
Crowley and SANS Director of Emerging …

Read Now

Customer Story

PRISMA HEALTH DELIVERS BETTER PATIENT CARE AND EXPERIENCE WITH EXTRAHOP

Healthcare
Read Now

Datasheet

6.24.19

EXTRAHOP REVEAL(X) VS. VECTRA COGNITO


Read Now

Webinar

6.24.19

HOW TO INCREASE MITRE ATT&CK COVERAGE WITH NETWORK TRAFFIC ANALYSIS



In this presentation you'll learn how to take your ATT&CK understanding and
coverage to the next level with network traffic analysis.

Watch Now

Datasheet

6.10.19

EXTRAHOP REVEAL(X) + PALO ALTO NETWORKS


Read Now

Webinar

6.4.19

WEBINAR: HOW TO SPEED INCIDENT RESPONSE WITH NETWORK DATA



Step through a rapid, end-to-end investigation and response process, from early
breach detection to forensic analysis in just minutes, relying on Network
Traffic Analysis for authoritative and …

Watch Now

Datasheet

6.3.19

EXTRAHOP REVEAL(X) + CISCO IDENTITY SERVICES ENGINE


Read Now

White Paper

6.2.19

RESPONSE AUTOMATION WITH REVEAL(X)



Learn how Reveal(x), cloud-native network detection and response (NDR), can make
your security toolset more effective through automated threat response.

Read Now

eBook

5.31.19

AN EXECUTIVE'S GUIDE TO INTEGRATING NETOPS AND SECOPS



Learn why closing the gap between network and security teams is crucial for
delivering a secure, world-class customer experience, and how to integrate these
systems smoothly and effectively.

Read Now

Webinar

5.15.19

BECOME A THREAT HUNTER IN YOUR ENTERPRISE



Learn the process for building a threat hunting program, and for optimizing the
efforts of designated threat hunters in the organization.

Watch Now

Webinar

5.12.19

SANS WEBINAR: THE STATE OF CLOUD SECURITY - PANEL DISCUSSION



This webcast digs more deeply into the results of the SANS 2019 Cloud Security
Survey, conducted in cooperation with the Cloud Security Alliance.

Watch Now

Industry Report

5.9.19

Jai Vijayan

THE STATE OF IT OPERATIONS & CYBERSECURITY OPERATIONS



Read this report from Dark Reading to understand the changing roles of, and
relationship between, IT Operations and Cybersecurity Operations, as well as
what your organization can do to improve …

Read Now

Solution Brief

5.8.19

AUTOMATED INCIDENT RESPONSE


Read Now

Industry Report

5.7.19

Dave Shackleford

SANS 2019 CLOUD SECURITY SURVEY



Read on to learn about the challenges facing cloud security teams today, as well
as how industry leaders are adapting IR and forensics strategies and integrating
the most effective cloud security …

Read Now

Datasheet

4.23.19

EXTRAHOP FOR IBM QRADAR SIEM


Read Now

training

4.23.19



EXTRAHOP + IBM QRADAR SIEM INTEGRATION



Webinar

4.22.19

BLACK HAT WEBINAR: SECURING ACTIVE DIRECTORY ADMINISTRATION



This Black Hat-hosted presentation will explore typical administration methods
and how attackers exploit them, as well as provide the best methods of secure
administration to protect privileged …

Watch Now

Webinar

4.17.19

PRACTICAL ADVICE FOR THE PROACTIVE SOC: HOW TO ESCAPE THE VICIOUS CYCLE OF REACT



ExtraHop Deputy CISO Jeff Costlow discusses how security operations teams can
escape the cycle of reactivity characterized by constantly responding to a flood
of alerts, and move toward a more …

Watch Now

training

4.16.19



EXTRAHOP + CISCO ISE: THREAT REMEDIATION INTEGRATION



eBook

4.15.19

APPLICATION ANALYTICS EBOOK



Learn how to go from APM black boxes to complete app visibility with enterprise
application analytics. Support your revenue-generating applications using wire
data backed by machine learning.

Read Now

tech talk

4.11.19



APPLICATION TIERS MADE SIMPLE



White Paper

4.11.19

NETWORK DETECTION & RESPONSE FOR THE MITRE ATT&CK FRAMEWORK



Learn how ExtraHop Reveal(x), cloud-first network detection and response, helps
security teams detect and investigate more adversary tactics, techniques, and
procedures in the MITRE ATT&CK framework …

Read Now

Webinar

3.19.19

ENCRYPTION IS EATING THE ENTERPRISE: LEARN HOW TO THRIVE IN THE AGE OF TLS 1.3



Learn about research findings to help you gain support for a proactive plan and
avoid retrofitting security. Security pros will learn what to consider and
prioritize and how to engage productively …

Watch Now

Customer Story

INTERNATIONAL CRUISE AND EXCURSIONS GETS COMPLETE VISIBILITY

Entertainment
Read Now

Customer Story

THE HOME DEPOT BUILDS UNIFIED CUSTOMER EXPERIENCE WITH VISIBILITY FROM EXTRAHOP

Retail / eCommerce
Read Now

White Paper

3.13.19

HOW NETWORK DETECTION & RESPONSE MAKES THE CIS CONTROLS EASIER



The CIS Critical Security Controls are meant to help your SOC reclaim the
advantage. This document explains how cloud-native NDR with Reveal(x) supports
CIS Controls version 7, including several of …

Read Now

Industry Report

3.6.19

Shamus McGillicuddy, Jon Kies

NETSECOPS: EVERYTHING NETWORK MANAGERS MUST KNOW ABOUT COLLABORATING WITH
SECURITY


Read Now

Webinar

2.26.19

72-HOURS-TO-DISCLOSE SURVIVAL GUIDE



This webinar will discuss the role that network traffic analysis can play in
speeding up incident response, quickly investigate incidents and get definitive
answers.

Watch Now

Analyst Report

2.15.19

Paula Musich

EMA REPORT: TLS 1.3 ADOPTION IN THE ENTERPRISE



Read new research on how encryption is impacting enterprises, and how they're
preparing for even further transformation due to TLS 1.3 and perfect forward
secrecy.

Read Now

Webinar

2.15.19

RISE ABOVE COMPLEX WORKFLOWS: PRACTICAL WAYS TO ACCELERATE INCIDENT RESPONSE



Learn how Network Traffic Analysis can provide the visibility and data access
needed to take investigations from many hours to just a few clicks.

Watch Now

Analyst Report

2.5.19

David Monahan

EMA: TOP 3 REPORT AND DECISION GUIDE FOR SECURITY ANALYTICS IN 2019



EMA evaluated 32 vendors across a range of security analytics use cases and
listed Reveal(x) as a Top 3 Winner in six different categories.

Read Now

Solution Brief

2.1.19

EXTRAHOP FOR APPLICATION ANALYTICS


Read Now

Datasheet

2.1.19

EXTRAHOP REVEAL(X)


Read Now

Webinar

1.31.19

HOW IT SECURITY TEAMS CAN USE MACHINE LEARNING TO IMPROVE DATA DEFENSE



Learn the ways that machine learning can help in security operations, how it can
speed threat analysis, and how to evaluate and choose technologies that will
work in your organization.

Watch Now

Customer Story

GTA POWERS GLOBAL TRAVEL WITH GREATER SPEED AND RELIABILITY


Read Now

Webinar

1.22.19

NETOPS AND SECOPS: BETTER TOGETHER



The experts from ExtraHop and Ixia will reveal new insights into best practices
for alignment and delivering the right data—even if it's the same data—to each
team.

Watch Now

Webinar

12.18.18

DARK READING PANEL: THE NEXT-GENERATION SECURITY OPERATIONS CENTER



Hear war stories and recommendations in SOC operations –including how to analyze
and respond to new attacks that have evaded traditional defenses.

Watch Now

Webinar

11.28.18

3 WAYS TO USE YOUR NETWORK AS A FORCE MULTIPLIER FOR INCIDENT RESPONSE



EMA Managing research Director David Monahan joins ExtraHop CIO John Matthews to
explain how you can automatically prioritize your most critical assets, provide
context to alerts, and put full …

Watch Now

Webinar

11.19.18

HOW TO GET MORE OUT OF YOUR SPLUNK DEPLOYMENT WITH EXTRAHOP



This webinar explains why ExtraHop and Splunk make such a great fit, and how you
can use the ExtraHop App for Splunk to stream wire data such as details for DNS,
database, storage, and more.

Watch Now

Webinar

10.24.18

YOU CAN'T OUTSOURCE RISK: SHARED RESPONSIBILITY IN THE CLOUD



In this webinar, you will learn about what cloud providers can help you with,
what gaps you need to fill, and the role that network traffic analysis can play
in securing your cloud environments.

Watch Now

tech talk

10.24.18



THE TOP CLOUD THREATS FROM CYBERSECURITY INSIDERS 2018



Customer Story

MITCHELL INTERNATIONAL USES EXTRAHOP TO SECURE COMMUNICATIONS AND PROTECT ASSETS


Read Now

tech talk

10.11.18



WHY IS YOUR SECOPS TEAM SAYING NO TO PUBLIC CLOUD?



training

10.8.18



REVEAL(X) FEATURE - SIGNAL METRICS



Webinar

10.8.18

INVESTIGATE EAST-WEST ATTACK ACTIVITIES TO DEFEND CRITICAL ASSETS: A SANS REVIEW



This SANS Institute review evaluates the ExtraHop Reveal(x) product and its
ability to support detection, investigation and response for these late-stage
attack activities.

Watch Now

training

10.8.18



REVEAL(X) FEATURE - THREAT INTELLIGENCE



training

10.8.18



REVEAL(X) FEATURE - INVESTIGATION WORKFLOW



training

9.27.18



AZURE INTEGRATION OVERVIEW



Webinar

9.26.18

BEYOND THE BREACH: RECOMMENDATIONS FOR EFFECTIVE RESPONSE



Discover the latest trends in cyber crime, your organization's vulnerabilities,
and how to go about preventing, detecting and responding to a breach.

Watch Now

Datasheet

9.25.18

EXTRAHOP REVEAL(X) FOR MICROSOFT AZURE


Read Now

tech talk

9.19.18



CONTAINERS & MICROSERVICES: DEFINITIONS, EXAMPLES, & VISUAL AIDS!



training

9.18.18



REVEAL(X) EXTRAS BUNDLE



Services Brief

8.30.18

EXTRAHOP REVEAL(X) IMPLEMENTATION GUIDE - ESSENTIAL


Read Now

Services Brief

8.30.18

EXTRAHOP REVEAL(X) IMPLEMENTATION GUIDE - ENTERPRISE


Read Now

Webinar

8.29.18

HOW NETWORK TRAFFIC ANALYTICS ELIMINATES DARKSPACE FOR THE SOC



In this webcast, we'll cover how your peers are using NTA technology to focus on
what matters, the impact of forward secrecy and TLS 1.3 encryption on network
analysis, how NTA can simplify CIS …

Watch Now

White Paper

8.27.18

ENHANCE YOUR APPLICATION PERFORMANCE MANAGEMENT STRATEGY WITH WIRE DATA



This white paper explains how you can use wire data to unlock full, end-to-end
visiblity across all applications as well as quickly resolve performance issues.

Read Now

Webinar

8.20.18

SOC CAPABILITIES & USEFULNESS: SANS 2018 SOC SURVEY RESULTS PT 2



In this webcast, learn the tools and technologies SOCs are deploying to
integrate and manage all their security, operational and response data for
better protection, detection and response.

Watch Now

Webinar

8.14.18

NO SINGLE DEFINITION OF A SOC: SANS 2018 SOC SURVEY RESULTS PART 1



In this webcast, learn how respondents to our 2018 SOC survey are staffing their
SOCs, the value of cloud-based services to augment staff and technology, and
respondents' level of satisfaction with …

Watch Now

customer

8.2.18



LA TROBE UNIVERSITY IMPROVES APPLICATION PERFORMANCE AND SECURITY ACROSS CAMPUS



Analyst Report

8.1.18

Paula Musich, David Monahan

EMA: NETWORK-BASED SECURITY ANALYTICS MARKET TAKES OFF



Read about how EMA views the emerging field of Network-based Security Analytics,
the key players within it, and how ExtraHop stacks up.

Read Now

Analyst Report

7.10.18

Rik Turner

OVUM: EXTRAHOP ENTERS NETWORK DETECTION AND RESPONSE WITH REVEAL(X)


Read Now

Webinar

6.27.18

FOUR WAYS NETWORK TRAFFIC ANALYTICS CAN SUPERCHARGE YOUR SOC



In this webinar, you will learn how your peers are using NTA technology based on
a new market research from 451 Research, as well as ExtraHop's approach to NTA
that goes beyond just detecting threats.

Watch Now

Webinar

6.6.18

PROTECTING AGAINST RANSOMWARE



Join top security experts for this interactive Q&A discussion on trends in
ransomware attacks, backups, patches and other ways to protect your data, how to
bolster your organization's security culture …

Watch Now

Datasheet

5.22.18

EXTRAHOP REVEAL(X) + PHANTOM


Read Now

Webinar

4.25.18

TLS 1.3 AND WHAT IT MEANS FOR DATA CENTER VISIBILITY



On March 21, the IETF approved the TLS 1.3 standard, which requires forward
secrecy. This poses a problem for passive monitoring solutions because they will
not be able to decrypt the traffic. In this …

Watch Now

training

4.18.18



SPLUNK BUNDLE OVERVIEW



tech talk

4.15.18



ANALYZING 1 PB+ EACH DAY AND WHY IT MATTERS



tech talk

4.4.18



CLOUD MIGRATION EP. 4: SECURITY AND THE EXTRAHOP PLATFORM



tech talk

4.4.18



CLOUD MIGRATION EP. 3: TAKING FULL ADVANTAGE OF YOUR CLOUD OPERATIONS



tech talk

4.4.18



CLOUD MIGRATION EP. 2: HOW TO BENEFIT FROM A CLOUD MIGRATION



tech talk

4.4.18



CLOUD MIGRATION EP. 1: WHAT IS THE CLOUD, REALLY?



Customer Story

TOP HEALTH SYSTEM GAINS REAL-TIME APPLICATION, SECURITY, AND CLINICAL DATA WITH
EXTRAHOP

Healthcare
Read Now

Webinar

3.22.18

ASSURE THE NETWORK. ASSURE THE PATIENT.

Healthcare

ExtraHop and Cerner provide the ability to see, in real time and down to the
transactional level, exactly what's happening across your healthcare IT and
clinical systems. This visibility isn't just a …

Watch Now

training

3.20.18



7.2 CRITICAL ASSETS WALKTHROUGH



White Paper

3.15.18

HOW EXTRAHOP SUPPORTS YOUR GDPR INITIATIVE



The General Data Protection Regulation brings about a new era of data protection
and security requirements. ExtraHop can help your compliance in three critical
areas.

Read Now

Analyst Report

3.6.18

Eric Ogden, Patrick Daly, Jasmine Rishi

EXTRAHOP JUMPS INTO SECURITY ANALYTICS AND INCIDENT RESPONSE WITH REVEAL(X)



This report from 451 Research includes expert analysis on the cybersecurity
market and how the new security analytics product, ExtraHop Reveal(x), is poised
to disrupt and outcompete established …

Read Now

Datasheet

3.1.18

EXTRAHOP REVEAL(X) VS. DARKTRACE


Read Now

Customer Story

WRIGHTCORE AND EXTRAHOP DELIVER SMARTER, FASTER ASSESSMENTS

SaaS / Technology
Read Now

Webinar

2.20.18

BEHIND EVERY TICKET IS A PATIENT

Healthcare

Many network operation teams struggle to address data friction issues by failing
to leverage their network. Using a network as a real-time data source allows you
to confidently maximize the value of …

Watch Now

White Paper

2.18.18

SITUATIONAL INTELLIGENCE FOR CYBER HUNTERS



Cyber Protection Teams (CPTs) on the prowl need fast, accurate information in
order to spot and track down threats before they have time to attack. This white
paper explains how wire data is a crucial …

Read Now

Analyst Report

2.15.18

David Monahan, Paula Musich

EMA RESEARCH ON EXTRAHOP REVEAL(X)



ExtraHop makes a lot of big claims because we believe we can prove them true.
Third party research from analyst groups like EMA is just one way we follow
through.

Read Now

White Paper

1.30.18

EXTRAHOP REVEAL(X) DEEP DIVE: THE CRITICAL ASSETS FILTER FOR THE SOC



Learn how ExtraHop Reveal(x) provides auto-discovery, intelligent
classification, and service-centric analytics to help beleaguered SOC analysts
concentrate their energies on the most important and …

Read Now

tech talk

1.29.18



INTRODUCING REVEAL(X), WITH EXTRAHOP CTO JESSE ROTHSTEIN



tech talk

1.29.18



POWER OF DATA AND REVEAL(X)



customer

1.29.18



CUSTOMER VIEWPOINT ON REVEAL(X)



tech talk

1.29.18



INDUSTRY PERSPECTIVE ON REVEAL(X)



tech talk

1.29.18



EXTRAHOP CIO JOHN MATTHEWS TALKS REVEAL(X)



tech talk

1.23.18



DATACENTER MIGRATION LIGHTBOARD



Webinar

12.12.17

CYBERSECURITY & HEALTHCARE: HOW PREPARED ARE YOU?

Healthcare

This webinar will discuss the pieces of a cybersecurity ecosystem model, and how
this type of model requires policies, processes, and technologies that allow
your healthcare organization to take a …

Watch Now

tech talk

12.1.17



HOW METCALFE'S LAW APPLIES TO IT OPERATIONS



Webinar

11.8.17

EXTEND NETWORK VISIBILITY AND REAL-TIME ANALYTICS TO REMOTE LOCATIONS



ExtraHop, APCON, and Portland Community College (PCC) discuss the challenges PCC
faced when trying to expand visibility and aggregate network traffic from
multiple remote sites.

Watch Now

Customer Story

WOOD COUNTY HOSPITAL GETS PROACTIVE ON SECURITY THREATS WITH EXTRAHOP

Healthcare
Read Now

Webinar

11.2.17

"THE FIVE LS" FOR TROUBLESHOOTING CITRIX PERFORMANCE ISSUES



Join this webinar to discover how you can track five key metrics that
characterize the performance of your Citrix environment. We call these metrics
"The Five Ls": Launches, Logon Time, Load Times, …

Watch Now

tech talk

10.30.17



PERFECT FORWARD SECRECY EXPLAINED



training

9.14.17



INTRODUCING EXTRAHOP LIVE ACTIVITY MAPS



Customer Story

MEDILINK TURNS TO EXTRAHOP FOR AN IT WELLNESS PLAN

Healthcare
Read Now

Customer Story

WIRE DATA: A SAFE BET FOR OPTIMISATION AND SECURITY


Read Now

White Paper

8.15.17

PROTECTING YOUR SAAS INVESTMENT: MONITORING OFFICE 365 PERFORMANCE



This white paper explains how you can keep SaaS vendors honest about performance
with the ExtraHop platform.

Read Now

Webinar

8.2.17

INTEGRATING NETWORK ANALYTICS INTO YOUR SECURITY ARCHITECTURE



This webinar will explain the SOAPA approach and how wire data fits, and will
include use cases for integration and orchestration of wire data with other
security tools such as SIEM platforms.

Watch Now

eBook

7.8.17

REMOTE SITE MONITORING FOR A CLOUD-FOCUSED FUTURE



Learn how modernizing your distributed network to hybrid WAN will help you
deliver a better customer experience in the cloud.

Read Now

Customer Story

CEGEDIM ENSURES MISSION CRITICAL SERVICE DELIVERY WITH EXTRAHOP

SaaS / Technology
Read Now

Customer Story

EXTRAHOP HELPS DDI BUILD A LEADING IT OPERATION


Read Now

Webinar

6.26.17

THE NETWORK: CEREBRO FOR THE GROWING IT ENTERPRISE



In this webinar, we'll share a story from an ExtraHop customer who underwent a
large datacenter migration after it acquired a new business.

Watch Now

Webinar

6.15.17

PROTECT YOUR HOSPITAL, PROTECT YOUR PATIENTS

Healthcare

Learn how ExtraHop helps you identify ransomware by providing full, real-time
visibility into which devices are accessing network share and what type of
behavior they are exhibiting, backed by machine …

Watch Now

White Paper

5.20.17

THE BUSINESS CASE FOR NETWORK SEGMENTATION



In this white paper, we outline the fundamental business values that come with
modern network segmentation, and offer clear, prescriptive guidance on the
methodologies needed to make it a reality for …

Read Now

Datasheet

5.15.17

EXTRAHOP SOLUTIONS ARCHITECTURE SERVICES


Read Now

White Paper

5.15.17

TAKE CONTROL OF YOUR DATA CENTER MIGRATION & CONSOLIDATION EFFORTS WITH EXTRAHOP



The ExtraHop platform takes the guesswork out of application and data center
migration by providing complete visibility and performance metrics that make
clear the risks, but also support the success, …

Read Now

Datasheet

5.8.17

EXTRAHOP FOR SERVICENOW


Read Now

tech talk

3.19.17



LIGHTBOARD: DATA GRAVITY



eBook

3.10.17

EBOOK: HEALTHCARE IT'S TOP 3 PAIN POINTS & HOW TO FIX THEM

Healthcare

In healthcare IT, the stakes are high. Get insight on prioritization in this
survey of Healthcare IT professionals covering pain points, areas for
improvement, and common roadblocks.

Read Now

Customer Story

WIRE DATA ANALYSIS MONITORS NETWORK ACTIVITY FOR TWO LARGE DATA CENTERS ACROSS
ASIAPAC AND EUROPE


Read Now

White Paper

12.20.16

TCP OPTIMIZATION GUIDE: NAGLE DELAYS AND BEYOND



After reading this paper, you'll have a better understanding of some
oft-misunderstood methods for improving TCP performance, which will make it
easier to troubleshoot network performance problems in …

Read Now

Customer Story

FAREPORTAL FINDS THE TICKET TO ENSURING DIGITAL EXPERIENCE IN EXTRAHOP


Read Now

Customer Story

LIBERTY IMPROVES IT OPERATIONS THROUGH APPCENTRIX POWERED BY EXTRAHOP

Financial Services
Read Now

Datasheet

11.28.16

EXTRAHOP AND GIGAMON


Read Now

Customer Story

FORTUNE 500 RETAILER KEEPS CLOUD COSTS IN CHECK WITH EXTRAHOP

Retail / eCommerce
Read Now

White Paper

11.16.16

DISSECTING THE NSA'S 6 PHASE PLAYBOOK FOR HACKING NETWORKS



Learn the six steps of the NSA's playbook for breaking into sophisticated,
highly-secured networks, and how you can use the NSA's mindset to protect your
own network from hackers.

Read Now

Customer Story

GLOBAL TELECOMMUNICATIONS PROVIDER USES EXTRAHOP TO MONITOR EXTERNAL CONNECTIONS
TO IMPROVE COMPLIANCE AND SECURITY


Read Now

Customer Story

EXTRAHOP HELPS GLOBAL FINANCIAL INSTITUTION IMPROVE BANKING SECURITY WITH
REAL-TIME USER BEHAVIOR ANALYTICS

Financial Services
Read Now

White Paper

9.15.16

INVERTING THE INVESTIGATION WORKFLOW



Modern security teams can no longer guarantee their companies won't experience a
breach, but they can still stay ahead of increasingly sophisticated
attackers—if, that is, they change the way they …

Read Now

White Paper

8.3.16

HOW TO GET MORE SIGNAL, LESS NOISE FOR YOUR SIEM: JUST ADD WIRE DATA



Many enterprises invest heavily in SIEM solutions, then struggle to make them
effective. Here's how to get more bang for your buck.

Read Now

Customer Story

ACCOLADE CUTS ANNUAL SIEM SPEND BY 60% WITH EXTRAHOP

Healthcare
Read Now

Datasheet

6.2.16

EXTRAHOP ATLAS RX SERVICES


Read Now

Datasheet

6.1.16

EXTRAHOP REMOTE ANALYSIS REPORTS


Read Now

Customer Story

DIGICHART FINDS THE DIAGNOSIS AND THE CURE IN WIRE DATA

Healthcare
Read Now

Datasheet

3.6.16

ATLAS TECHNICAL ACCOUNT MANAGER SERVICES


Read Now

Datasheet

3.5.16

ATLAS OPERATIONAL EXCELLENCE


Read Now

Datasheet

3.4.16

ATLAS QUICKSTART


Read Now

Datasheet

3.3.16

ATLAS INFOSEC


Read Now

White Paper

3.1.16

DETECT AND STOP RANSOMWARE WITH A NEW MITIGATION APPROACH



With knowledge handpicked from real-world observations and testing, this paper
offers practical and prescriptive guidance on how in-flight data analysis from
ExtraHop gives you the power to detect and …

Read Now

Customer Story

LEADING HEALTH SERVICES PROVIDER THWARTS RANSOMWARE ATTACK WITH EXTRAHOP

Healthcare
Read Now

Customer Story

AWARD-WINNING CHILDREN'S HOSPITAL SAVES $600,000 ANNUALLY IN IT STAFFING COSTS
WITH EXTRAHOP

Healthcare
Read Now

Customer Story

AMERICAN TRANSPORTATION MANUFACTURER FAST TRACKS IT AND BUSINESS OPERATIONS WITH
EXTRAHOP

Transportation
Read Now

Customer Story

SECURITY VISIBILITY WITH SPORTINGBET

SaaS / Technology
Read Now

Customer Story

ZONAR MAPS A SMARTER ROUTE TO EFFICIENT TRUCK FLEET OPERATIONS

SaaS / Technology
Read Now

Customer Story

TOP HOSPITAL CUTS MTTR BY 90% WITH INSIGHT FROM REAL-TIME WIRE DATA

Healthcare
Read Now

Customer Story

CITY OF GEEL DRAMATICALLY IMPROVES APPLICATION PERFORMANCE WITH EXTRAHOP

Government
Read Now

Customer Story

MEDHOST USES WIRE DATA TO DRIVE MEANINGFUL USE OF EHR SYSTEMS

SaaS / Technology
Read Now

Customer Story

LEADING SALESFORCE APPLICATION PARTNER IMPROVES AWS VISIBILITY WITH EXTRAHOP

SaaS / Technology
Read Now

training

4.28.15



HL7 - PARSING HL7 MESSAGES

Healthcare

Customer Story

AN EAST COAST UNIVERSITY GAINS DEEP INSIGHTS WITH EXTRAHOP

Education
Read Now

Customer Story

ONLINE BROKERAGE TRANSFORMS IT OPERATIONS WITH VISIBILITY ACROSS TIERS

Financial Services
Read Now

Customer Story

CONCUR IMPROVES SCALABILITY TO SUSTAIN COMPETITIVE ADVANTAGE

SaaS / Technology
Read Now

Customer Story

MEDSOLUTIONS ENABLES CONTINUAL SERVICE IMPROVEMENT FOR APPLICATIONS AND
INFRASTRUCTURE

Healthcare
Read Now

Customer Story

GAS RETAILER FUELS FASTER NETWORKS AND APPLICATIONS WITH EXTRAHOP

Retail / eCommerce
Read Now

Customer Story

STEWARD HEALTH CARE DIAGNOSES APPLICATION ISSUES WITH INSIGHTS FROM WIRE DATA

Healthcare
Read Now

Customer Story

ACCELERATING CITRIX LOGIN TIMES BY 500% WITH CROSS-TIER INSIGHT

Healthcare
Read Now

Datasheet

11.4.14

EXTRAHOP AND APPDYNAMICS


Read Now
Load More







+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Competitive Comparison
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * What is Network Detection and Response (NDR)?
 * Cloud-Native Security Solutions
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * News & Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2021
 * Terms of Use
 * Privacy Policy
 * 日本語

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube





















Close


suggested results