www.extrahop.com
Open in
urlscan Pro
54.214.40.190
Public Scan
Submitted URL: http://groove.ehlinks.com/url/_5Bo0FR5-4ePCu0i08PP1XF7zTs/aHR0cHM6Ly93d3cuZXh0cmFob3AuY29tL2NvbXBhbnkvYmxvZy8yMDIyL3RvcC1j...
Effective URL: https://www.extrahop.com/company/blog/2022/top-cybersecurity-trends-for-2023-strategies-integrations-and-budgets/
Submission: On August 31 via api from US — Scanned from DE
Effective URL: https://www.extrahop.com/company/blog/2022/top-cybersecurity-trends-for-2023-strategies-integrations-and-budgets/
Submission: On August 31 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMName: untitledForm-1367515949663 — POST https://s1701.t.eloqua.com/e/f2
<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
novalidate="">
<input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
<input type="hidden" name="elqSiteId" value="1701">
<input type="hidden" name="elqCampaignId">
<input type="hidden" name="campaignId" value="70180000001EqjnAAC">
<input type="hidden" name="elqCustomerGUID">
<input type="hidden" name="elqCookieWrite" value="0">
<input type="hidden" name="GA_Medium" value="">
<input type="hidden" name="GA_Source" value="">
<input type="hidden" name="GA_Campaign" value="">
<input type="hidden" name="GA_Content" value="">
<input type="hidden" name="GA_Term" value="">
<input type="hidden" name="GA_Product" value="">
<input type="hidden" name="GA_Region" value="">
<input type="hidden" name="GA_Funnelstage" value="">
<input type="hidden" name="GA_Version" value="">
<input type="hidden" name="gclid" value="">
<input type="hidden" name="FormURL" value="">
<input type="hidden" name="uniqueid" value="">
<input type="hidden" name="GA_Adgroup" value="">
<input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
<div class="inline-input">
<div class="form-group email">
<input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
</div>
<div class="form-group">
<input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
</div>
</div>
</form>
<form>
<input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>
Text Content
* The Platform REVEAL(X) The industry's only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. DEPLOYMENT MODEL SaaS-Based Solution > Unified intelligence across on-premises, hybrid, and multi cloud environments. On-Premises Solution > East-West visibility, real-time detection, and intelligent response at scale. SECURITY Network Detection and Response > Use the power of network visibility and AI for real-time detection, rapid investigation, and intelligent response for any threat. Intrusion Detection System > Forensics > PERFORMANCE Network Performance Monitoring > Use network data and machine learning to identify network and application performance issues and expedite time to response. Forensics > TRY IT FOR FREE REVEAL(X) 360 LIGHT UP YOUR AWS ENVIRONMENT. No friction. No credit card required. Start Free Trial * Solutions -------------------------------------------------------------------------------- SOLUTIONS With the power of machine learning, gain the insight you need to solve pressing challenges. BY INITIATIVE * ExtraHop IDS * XDR * Advanced Threats * Ransomware Mitigation * Multicloud & Hybrid Cloud Security * Implement Zero Trust BY VERTICAL * Financial Services * Healthcare * e-Commerce and Retail * Education * U.S. Public Sector THREAT BRIEFING GENERATIVE AI TOOLS Detect data leaks from employee use of ChatGPT in Reveal(x) Watch a Demo * Customers -------------------------------------------------------------------------------- CUSTOMERS Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support. COMMUNITY * Customer Portal Login * Bundle Gallery * Community Forums * Customer Stories SERVICES * Services Overview * Quick Starts * Training * Integrations * Resident Expert SUPPORT * Support Overview * Documentation * Appliance Policies * Knowledge Base Featured Customer Story SEATTLE CHILDREN'S HOSPITAL Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data Read More See All Customer Stories > * Partners -------------------------------------------------------------------------------- PARTNERS Our partners help extend the upper hand to more teams, across more platforms. CHANNEL PARTNERS * Channel Overview * Managed Services Providers INTEGRATION PARTNERS * CrowdStrike * Splunk * Amazon Web Services * Google Cloud Security * All Technology Partners PANORAMA PROGRAM * Partner Program Information * Partner Portal Login * Become a Partner Featured Integration Partner CROWDSTRIKE * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT. Read More See All Integration Partners > * Blog * More * About Us * Events & Newsroom * Careers * Resources * About Us * What Is Cloud-Native? * Leadership * Board of Directors * Contact Us * Explore the Interactive Online Demo * Sign Up for a Live Attack Simulation * Upcoming Webinars and Events * Newsroom * ExtraHop Media Kit and Brand Guidelines HUNTER CHALLENGE Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event. Read More * Careers at ExtraHop * Search Openings * Connect on LinkedIn * All Resources * Customer Stories * Ransomware Attacks in 2021: A Retrospective * White Papers * Datasheets * Industry Reports * Webinars * Cyberattack Glossary * Network Protocols Glossary * Documentation * Firmware * Training Videos Login Logout Start Demo THE PLATFORM SOLUTIONS CUSTOMERS PARTNERS BLOG MORE START THE DEMO CONTACT US Back REVEAL(X) The industry's only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. DEPLOYMENT MODEL SaaS-Based Solution > On-Premises Solution > SECURITY Network Detection and Response > Intrusion Detection System > Forensics > PERFORMANCE Network Performance Monitoring > Forensics > Back SOLUTIONS Learn More USE CASES EXPLORE BY INDUSTRY VERTICAL Back CUSTOMERS Customer resources, training, case studies, and more. Learn More CUSTOMER PORTAL LOGIN CYBERSECURITY SERVICES EXTRAHOP SUPPORT Back PARTNERS Partner resources and information about our channel and technology partners. Learn More CHANNEL PARTNERS INTEGRATIONS AND AUTOMATIONS PARTNERS Back BLOG Learn More Back ABOUT US EVENTS & NEWSROOM CAREERS RESOURCES Back ABOUT US See what sets ExtraHop apart, from our innovative approach to our corporate culture. Learn More WHAT IS CLOUD-NATIVE? CONTACT US Back EVENTS & NEWSROOM Get the latest news and information. Learn More SIGN UP FOR A LIVE ATTACK SIMULATION UPCOMING WEBINARS AND EVENTS Back CAREERS We believe in what we're doing. Are you ready to join us? Learn More CAREERS AT EXTRAHOP SEARCH OPENINGS CONNECT ON LINKEDIN Back RESOURCES Find white papers, reports, datasheets, and more by exploring our full resource archive. All Resources CUSTOMER STORIES RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE CYBERATTACK GLOSSARY NETWORK PROTOCOLS GLOSSARY DOCUMENTATION FIRMWARE TRAINING VIDEOS BLOG TOP CYBERSECURITY TRENDS FOR 2023: STRATEGIES, INTEGRATIONS, AND BUDGETS Paul Ditty December 20, 2022 When an offense shifts, the defense must shift along with it. In the early years of cyberthreats, all you needed was a sturdy wall. Now, it seems, you need a bigger wall, more alerts, extended visibility, and more people to manage operations. According to the Gartner® Hype Cycle™ for Security Operations, 2022: "Organizations need to support a complex and sometimes competing array of approaches to security, while also supporting the growth of the organization via traditional IT infrastructure deployments, cloud-based deployments and hybrid approaches." Budgeting and security risk planning go hand in hand, which is why we asked our security experts to offer their thoughts on emerging trends and technology considerations for 2023 and beyond. SECURITY LEADERS MUST ADAPT TO CHANGE It's no secret that attackers are becoming more sophisticated, but that doesn't mean everyone believes it. In an ExtraHop survey of IT decision makers, 77% or respondents remain confident in their ability to mitigate threats, yet 64% also claim that half of reported data breaches are due to outdated security postures. As ExtraHop Senior Principal Data Scientist Edward Wu explains, it's critical to know your attack vectors and how security leaders might rethink defense spending when they're securing budget: Spending on perimeter network defense still outpaces spending on post-defense strategies. The consequence of this imbalance in spending is that attackers are finding very easy ways to bypass all these network defense tools and, once inside the environment, they have their run of the place. The current network defense spending trend is based on an assumption of how attackers attack, and that assumption is outdated. In 2023, organizations will need to adapt to these changes and shift their spending allocation to combat today's attack methodology. Attacks on vulnerable infrastructure also continue to escalate, especially among healthcare IoT and educational organizations. Karl Werner, Area Vice President in Germany, expects to see more executives weighing in on preventative measures: As high-profile attacks grip the news cycle, security is no longer exclusively the "headache" of the IT department. It's everyone's problem. The C-suite is taking note of the impact ransomware attacks could have on their operations and reputation. Top executives across Germany understand that an attack today could potentially ruin the company. COMPANIES WILL EMBRACE XDR AND INTEGRATED PARTNERSHIPS High-fidelity integrations will also play a key role in the fight for data protection. Combining resources also helps alleviate friction and allows teams to share valuable information. Karl Werner sees this trend shifting from nice to have into a business priority: Integration is crucial to today's enterprise security landscape. Most businesses do not value silos or standalone solutions that make it harder to solve their business challenges around today's complex threats. They prefer solutions that integrate seamlessly into existing IT infrastructure. From a network monitoring perspective, many businesses are now very interested in combining NDR with EDR and SIEM to form more powerful solutions that combine context and action. Of the many integration solutions out there, extended detection and response (XDR) has been at the forefront of many conversations revolving around security measures. This strategy continues to grow in popularity as we come to understand its true potential, as VP of Sales Engineering in EMEA John Titmus explains: The promise of XDR is clear: Contextualized, coordinated data helps teams streamline, prioritize, and automate work. However, the roadmap to actually get there continues to be a challenge for organizations. In 2023, we will see more vendors embracing open frameworks to assist in the actual implementation of XDR that works for each bespoke organization. The cybersecurity industry has struggled with a one-size-fits-all approach to XDR so 2023 will bring about more integrations, options and, hopefully, adoption. One approach to XDR is managed detection and response (MDR), which merges SIEM, endpoint data security, and network visibility into a single platform. John Titmus also expects this implementation to continue as we face more advanced cybersecurity threats: More businesses are leaning on MDR providers to enable XDR as it ensures they get the best-retained talent to monitor their networks on a daily basis. XDR is complex, with huge amounts of data analysis needed, that specialist talent is critical. However, most organizations hire generalists, which can lead to a "jack of all trades, master of none" situation. By embracing MDR, businesses can rest assured that they are dealing with experts in specific clouds, NPM, and incident response. AS CYBERSECURITY BUDGETS TIGHTEN, SPEND WILL REMAIN CRITICAL After talking about security planning, the next conversation will almost certainly be about cybersecurity spending and what solutions will provide the best ROI. As ExtraHop Vice President of APAC Ken Chen warns, the cost of getting hit by an attack without the proper defense could be even more costly: It seems like a global recession is imminent. As priorities shift, it is possible that gaps in the cybersecurity framework will be left open. Budget, staffing or capacity issues may leave businesses at risk or under-prepared for a cyberattack. The downtime and potential loss in revenue from a cyberattack could be detrimental to many businesses who are already feeling the impact of a strained economy. Depending on the type of company impacted (manufacturing or supply chain), the financial implications could trickle down to other entities affiliated. While the global economy's future is uncertain, Ken remains hopeful that 2023 security budget allocations will hold steady, if not increase: Securing budget for comprehensive IT and cybersecurity initiatives has been challenging in the past—even in a thriving economic environment. In 2023, we may continue to slip deeper into a global economic recession, but for various reasons (geopolitical and digital transformation), I believe cybersecurity budgets will grow. Security will be a top priority for CIOs in 2023 and the spend will remain resilient despite a tougher macro environment. Read More: Takeaways from the Gartner® Hype Cycle for Security Operations, 2022 * Posted in Cybersecurity, Industry Trends, C-Level, Security Threats, NDR * See other posts by Paul Ditty STOP A RANSOMWARE ATTACK IN PROGRESS. Hackers are exploiting the Log4Shell vulnerability as part of a ransomware attack campaign. Stop them in their tracks while exploring the full ExtraHop Reveal(x) user experience. Start Demo RELATED BLOGS 12.13.22 CYBERSECURITY PREDICTIONS: CLOUD SECURITY TRENDS FOR 2023 ExtraHop experts discuss cloud security trends for 2023, sharing their cybersecurity predictions for cloud security threats, security strategy, and tools. Kelsey Milligan 12.6.22 CYBERSECURITY PREDICTIONS FOR 2023: THE THREAT LANDSCAPE ExtraHop experts share their cybersecurity predictions for 2023. Learn what attack vectors to anticipate and how advanced threats are expected to evolve. Kelsey Milligan SIGN UP TO STAY INFORMED Javascript is required to submit this form + ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More Global Headquarters 520 Pike St Suite 1600 Seattle, WA 98101 United States EMEA Headquarters WeWork 8 Devonshire Square London EC2M 4PL United Kingdom APAC Headquarters 3 Temasek Avenue Centennial Tower Level 18 Singapore 039190 PLATFORM * Reveal(x) * Reveal(x) 360 * Reveal(x) Enterprise: Self-Managed NDR * Security * IT Ops SOLUTIONS * Use Cases * Explore By Industry Vertical CUSTOMERS * Customer Portal Login * Services Overview * Support Overview PARTNERS * Channel Overview * Technology Integration Partners * Partner Program Information BLOG MORE * About Us * Contact Us * Events & Newsroom * Careers * Resources * Copyright ExtraHop Networks 2023 * Terms of Use * Privacy Notice * Do Not Sell or Share My Personal Information * Facebook * Twitter * LinkedIn * Instagram * YouTube Close suggested results