www.extrahop.com Open in urlscan Pro
54.214.40.190  Public Scan

Submitted URL: http://groove.ehlinks.com/url/Vyzl8nRSt9odWNTGMCmWeh05WGQ/aHR0cHM6Ly93d3cuZXh0cmFob3AuY29tL3VzZS1jYXNlcy9zZWN1cml0eS90aHJl...
Effective URL: https://www.extrahop.com/use-cases/security/threat-hunting/
Submission: On August 01 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form>
  <input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   REVEAL(X)
   
   The industry's only network detection
   and
   response platform that delivers the
   360-degree
   visibility needed to
   uncover the cybertruth.
   
   DEPLOYMENT MODEL
   
   SaaS-Based Solution >
   
   Unified intelligence across on-premises,
   hybrid, and multi cloud environments.
   
   On-Premises Solution >
   
   East-West visibility, real-time detection,
   and intelligent response at scale.
   
   SECURITY
   
   Network Detection and Response >
   
   Use the power of network visibility
   and AI for real-time detection,
   rapid investigation, and intelligent
   response for any threat.
   
   Intrusion Detection System >
   
   Forensics >
   
   PERFORMANCE
   
   Network Performance Monitoring >
   
   Use network data and machine learning to identify network and application
   performance issues and expedite time to response.
   
   Forensics >
   
   TRY IT FOR FREE
   
   
   REVEAL(X) 360
   
   
   LIGHT UP YOUR AWS
   ENVIRONMENT.
   
   No friction.
   No credit card required.
   
   Start Free Trial
 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   BY INITIATIVE
   
    * ExtraHop IDS
    * XDR
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * Education
    * U.S. Public Sector
   
   
   
   
   
   
   
   THREAT BRIEFING
   
   
   GENERATIVE AI TOOLS
   
   Detect data leaks from employee use of ChatGPT in Reveal(x)
   
   Watch a Demo
   
   

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Bundle Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Incident Response
    * Deployment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Appliance Policies
    * Knowledge Base
   
   Featured Customer Story
   
   
   SEATTLE CHILDREN'S HOSPITAL
   
   Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Splunk
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   * Detect network attacks. * Correlate threat intelligence and forensics. *
   Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * Events & Newsroom
    * Careers
    * Resources
   
    * About Us
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   
   
   
   
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
    * Cyberattack Glossary
   
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


English
 * 日本語

Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


REVEAL(X)

The industry's only network detection
and
response platform that delivers the
360-degree
visibility needed to
uncover the cybertruth.

DEPLOYMENT MODEL

SaaS-Based Solution >

On-Premises Solution >

SECURITY

Network Detection and Response >

Intrusion Detection System >

Forensics >

PERFORMANCE

Network Performance Monitoring >

Forensics >

Back


SOLUTIONS



Learn More

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


EVENTS & NEWSROOM


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More



WHAT IS CLOUD-NATIVE?

CONTACT US

Back


EVENTS & NEWSROOM

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS

 * For Security //
 * By Initiative
   * ExtraHop IDS
   * Strategic XDR
   * ExtraHop Network Forensics
   * Advanced Threats
   * Ransomware Mitigation
   * Multicloud & Hybrid Cloud Security
   * Implement Zero Trust
   * Security Operations Transformation
   * Enterprise IoT Security
   * Integrate NDR and SIEM
 * Use Cases
   * Hunt Advanced Threats
   * Enhance Security Hygiene
   * Detect Lateral Movement
   * Detect Unusual Network Activity
   * Monitor Sensitive Data
   * Improve Mean Time to Respond (MTTR)
   * Detect Software Supply Chain Attacks
   * Retrospective Coverage (MTTI & MTTD)
 * Resources
   * IDC Market Share Report
   * 2020 SANS Network Visibility and Threat Detection Survey
 * Integrations
   * CrowdStrike
   * Microsoft 365


HUNT ADVANCED THREATS

 * Challenge
 * Answers
 * Video
 * Resources


ADVANCED ATTACKS BYPASS TRADITIONAL CONTROLS AND LIVE OFF THE LAND IN YOUR
EAST-WEST CORRIDORS.

By detecting threats proactively, organizations can avoid a data breach or other
damage. Threat hunting, finding the "unknown unknowns" applies the intuition of
an analyst to data from the environment and was previously only possible for
very mature organizations. Junior analysts often lack the necessary skills, and
traditional hunting methods require the use of multiple complex tools and
time-intensive grueling manual work.




WITH EXTRAHOP REVEAL(X)


THREAT HUNTING FOR ANY LEVEL ANALYST

Reveal(x) makes meaningful threat hunting accessible to analysts of all skill
levels, and enables advanced analysts to form and test hypotheses faster through
automatically-surfaced hunt starting points and efficient investigation
workflows.

GET ANSWERS TO THE TOUGH QUESTIONS


DO YOUR LESS-EXPERIENCED ANALYSTS HAVE THE TOOLS TO SUCCESSFULLY THREAT HUNT?

Reveal(x) makes threat hunting more easily accessible to all analysts with
automated querying and rich transaction data available in intuitive and
query-based starting points for your hunt.

DO YOUR LESS-EXPERIENCED ANALYSTS HAVE THE TOOLS TO SUCCESSFULLY THREAT HUNT?

Reveal(x) makes threat hunting more easily accessible to all analysts with
automated querying and rich transaction data available in intuitive and
query-based starting points for your hunt.


WHAT ARE THE BARRIERS TO EXPANDING YOUR THREAT HUNTING CAPABILITIES?

Using guided workflows with a complete dataset and mechanisms to automate
hunting techniques, Reveal(x) simplifies and accelerates threat hunts, even for
less experienced analysts.

WHAT ARE THE BARRIERS TO EXPANDING YOUR THREAT HUNTING CAPABILITIES?

Using guided workflows with a complete dataset and mechanisms to automate
hunting techniques, Reveal(x) simplifies and accelerates threat hunts, even for
less experienced analysts.


DO YOU LEVERAGE NETWORK DATA IN YOUR THREAT HUNTING ACTIVITIES?

Reveal(x) provides a packet-based data source that is nearly impossible for
attackers to disable or modify, enabling rapid research and validation of a wide
variety of IOCs.

DO YOU LEVERAGE NETWORK DATA IN YOUR THREAT HUNTING ACTIVITIES?

Reveal(x) provides a packet-based data source that is nearly impossible for
attackers to disable or modify, enabling rapid research and validation of a wide
variety of IOCs.


SIMPLE, STREAMLINED THREAT HUNTING





ADDITIONAL RESOURCES

Blog


BASIC THREAT HUNTING WITH REVEAL(X)

How to search for risky database and DNS behaviors in a few clicks.



Blog


UNCOVERING THE UNKNOWN: PROACTIVE, COVERT IDENTIFICATION OF EVASIVE THREATS

Learn how to simplify threat hunting.



Report


CYBERSECURITY INSIDERS 2020 THREAT HUNTING REPORT

In 2020, Cybersecurity Insiders conducted the third annual research project on
threat hunting to gain deeper insights into the maturity and evolution of the
security practice.




EXPLORE REVEAL(X) IN THE FULL PRODUCT DEMO.

Start Demo


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

 * Use Cases
 * Security
 * Hunt Advanced Threats

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x)
 * Reveal(x) 360
 * Reveal(x) Enterprise: Self-Managed NDR
 * Security
 * IT Ops

SOLUTIONS

 * Use Cases
 * Explore By Industry Vertical

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * Events & Newsroom
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2023
 * Terms of Use
 * Privacy Policy
 * 日本語

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube

Click for sound


5:57

















Close


suggested results