ExtraHop Reveal(x): NTA for the Enterprise
The ExtraHop Performance Platform
The ExtraHop Cloud Platform
Digital Business, Accelerated
White Papers, Data Sheets, and More
Analytics Extended, Workflows Automated
Rise Above the Noise.
Rise to the Opportunity.
Get the Latest.
Learn how ExtraHop integrates with Palo Alto Firewall to help you automatically remediate security threats in real time.
See how the ExtraHop App for IBM QRadar boosts enterprise security with Reveal(x) detections for faster threat discovery, response, and forensic investigation.
Watch this 5-minute video to see how ExtraHop Reveal(x) network traffic analysis makes it simple to proactively search for and investigate potential threats like risky database and DNS activity.
See how ExtraHop Reveal(x) integrates with Cisco Identity Services Engine (ISE) to minimize the time between threat detection and containment.
The MITRE ATT&CK Framework gives security teams a way to evaluate threat detection tools against real-world adversary tactics, techniques, and procedures (TTPs). Learn how network traffic analysis tools like Reveal(x) detect more TTPs, faster, than other security solutions.
ExtraHop answers five of Gartner's recommended questions that CISOs should ask before adopting AI or, more accurately, machine learning.
Learn how the latest release of ExtraHop Reveal(x), network traffic analysis for the enterprise, accelerates security investigations, incorporates MITRE & OWASP links, and more!
Learn about the new features and capabilities included in our 7.6 release and Reveal(x) Spring 2019, from accelerated investigations to system health dashboards.
The CIS Top 20 Controls help you prioritize your security efforts. Learn how network traffic analysis solutions are the easiest way to get the most CIS Control coverage in a short amount of time.
Learn about Network Traffic Analysis (an emerging category of cybersecurity product for threat detection and response) including Gartner's definition and the benefits of network traffic analysis for security operations, especially in the enterprise.
Listen to ExtraHop VP of Security Matt Cauthorn chat with CyberWire's Dave Bittner about Chrome Extension malware, our investigation into the fake Postman extension, and why attacks like these are scary despite being relatively unsophisticated.
Our online demo now features a live attack simulation where you can observe a hacker doing her job: exploiting a Drupal vulnerability, installing custom executables through PsExec, and more.
Network scanning and port scanning aren't inherently hostile, but they're often used maliciously. Learn to tell the difference between safe and hostile scanning on your network.
Why does Reveal(x) lead the pack on critical security use cases including asset classification and inventory, early breach detection, encrypted traffic analysis, and more? Learn why Enterprise Management Associates named Reveal(x) a Top 3 Winner in their new report, Security Analytics for Threat Detection and Breach Resolution in 2019.
After detecting and investigating a fake Postman Chrome Extension using Reveal(x) network traffic analysis, one question remained: how much damage could a more sophisticated attacker do? I made my own Chrome malware to find out. Here's what I learned.
What happens when you find a data leak in your own environment using your own network traffic analysis product? You investigate, of course, and record the whole process. Read on to learn how I used Reveal(x) to catch the fake Postman Chrome extension red-handed, complete with screenshots of the hunt.
Watch this 3-minute video to learn how ExtraHop Reveal(x) uses network traffic analysis to help you quickly and easily audit your network for expired certifications, weak ciphers, and more.
It's hard to win a fight if you've never thrown a punch. For cyber security, practice comes in the form of Red-Blue exercises like the one ExtraHop just hosted in our Seattle headquarters. Watch this 2-minute video to see the Blue team take on faux-attackers with Reveal(x)!
Company test runs own traffic analysis service and finds malicious Chrome extension in its own backyard.
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.