SaaS-based network detection and response.
How It Works
Self-managed network detection and response.
Protect and scale your business with complete visibility, real-time threat detections, and intelligent response.
See All Resources
Detect network threats and automatically quarantine impacted devices.
Read More...
See All Integrations
ULTA Beauty Securely Scales High-Growth e-Commerce Operation in the Cloud with ExtraHop
See All Customer Stories
Secure rapid cloud adoption and maintain control of applications, workloads, and data in cloud or multi-cloud environments.
Unified cloud security and monitoring with AWS and ExtraHop.
Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop
Boost NOC/SOC collaboration and ensure availability and performance across your hybrid enterprise.
Know and do more, faster. ExtraHop + ServiceNow makes IT service management even more seamless.
The Home Depot Builds Unified Customer Experience with Visibility from ExtraHop
How to Detect and Respond to the SUNBURST Attack
Sunburst attack 2020: Learn how to detect and respond to the Sunburst backdoor …
Security Alert: Detecting CVE-2020-1472 Zerologon Exploitation with NDR
The recent Zerologon vulnerability (CVE-2020-1472) could allow attackers to get …
Network Detection and Response (NDR) Vs. Extended Detection & Response (XDR)
Get some clarity on the alphabet soup of security vendor acronyms by reading …
Ulta Beauty
Crowdstrike
Detect network threats and automatically quarantine impacted devices. Inventory devices not yet protected by endpoint security.
2020 Gartner Market Guide for Network Detection and Response
ExtraHop is a representative vendor two years running. Learn why.
Newsroom
Get the latest news and information about ExtraHop, including press releases and third-party coverage.
Cloud-native visibility, detection, andresponse for the hybrid enterprise.
Customer resources, training,case studies, and more.
Partner resources and information about our channel and technology partners.
Find white papers, reports, datasheets, and more by exploring our full resource archive.
See what sets ExtraHop apart, from our innovative approach to our corporate culture.
Network attacks are techniques used by threat actors to achieve goals in their target infrastructure. Learn how these attacks work and what you can do to protect against them.
Detection Supported
Brute force attacks are a way for attackers to gain account access through trial and error when a password, encryption key, or hidden webpage is unknown.
C2 beaconing is a type of malicious communication between a command and control server and malware on an infected host.
Cross-site scripting is an application-layer attack exploiting communications between users and applications to gain access to sensitive data or take over applications.
Cryptomining malware, or 'cryptojacking,' is a malware attack that co-opts the target's computing resources to mine cryptocurrency.
In a DCSync attack, threat actors pretend to be a domain controller (DC) to get user credentials from another DC.
A denial-of-service attack is a tactic for overloading a machine or network to make it unavailable by sending more traffic than the target can handle, causing it to fail.
DNS tunneling is a difficult-to-detect attack that routes DNS requests to the attackers server, allowing them to get data.
HTTP request smuggling is a web application attack that hijacks HTTP requests to bypass security measures.
Port scanning is a method attackers use to scope out their target environment by sending packets to specific ports on a host and using the responses to find vulnerabilities and understand running services.
Ransomware is a type of malicious software which encrypts files, making them inaccessible until a ransom is paid.
Remote services exploitation is a technique that hijacks remote access tools to access a network's internal systems.
A SQL injection is a common hacking technique which can compromise a database.
+
ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More