Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo:

Our Website:

Latest Content From ExtraHop

Research Report: Reveal(x) 360 Cloud Threat Defense for AWS

by ExtraHopAug 03, 2022

Cloud environments are notorious for visibility gaps that weaken security. Unmanaged workloads, server less environments, and containers that only exist for minutes all contribute to visibility challenges.

Learn how ExtraHop Reveal(x) 360 now offers continuous visibility in AWS-based VPC Flow Logs. Organizations can choose flow logs as a standalone subscription or combine that cloud-native data source with packets to take a multi-layered approach to cloud threat defense.

Read this solution brief to learn how ExtraHop extends visibility, expands coverage, and enhances threat defense in AWS without introducing friction.

Whitepaper: SANS 2022 Cloud Security Survey

by ExtraHopAug 03, 2022

Over the past several years, we have seen more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments.

In this recent survey, several hundred respondents—from a variety of industries—provide additional insight into how organizations are using the cloud today, the threats security teams face in the cloud, and what they are doing to improve their security posture.

Read this SANS analyst survey report to learn about the rapid growth in moving workloads to the cloud, building new applications, and subscribing to a wide range of SaaS services.

Research Report: Top Cloud Threats to Cloud Computing: Pandemic Eleven

by ExtraHopAug 03, 2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing.

Learn from a survey of over 700 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments.

Read this report to gain a better understanding of how the Top Threats Working Group used the survey results and its expertise to create this year's "Pandemic Eleven."

Whitepaper: A Practical Guide for Shields Up - For Organizations

by ExtraHopMay 10, 2022

In response to the Russia-Ukraine conflict, the Cybersecurity and Infrastructure Security Agency (CISA) issued its first-ever Shields Up notice, warning that with its cyber capabilities and history of targeting Western governments and corporations, cyberattacks from Russia are likely, if not imminent.

Since its inception in 2018, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has worked to provide critical guidance and information to government and private sector organizations about critical cyber threats.

Read this white paper to get the new CISA guidance organizations with additional considerations from ExtraHop for how best to prepare for and defend against this attack activity.

Whitepaper: Dark Reading: Close the Visibility Gap

by ExtraHopMay 10, 2022

Broad adoption of encryption technologies is causing major shifts in the security operations and cyber threat landscape. This has led to changes in attacker techniques, creating fertile ground for the evolution of a new breed of advanced attacks.

As attackers grow more sophisticated, and regulations require tighter security and privacy measures, there is no escaping the decision to encrypt. Organizations must find a way to balance the increasing expectations for data security and data privacy, against the necessity of maintaining visibility to ensure operational security.

Read this Dark Reading white paper to learn the risks and rewards of implementing strategic decryption. Get specific guidance security teams need to retain visibility for threat detection, investigation, and response—without compromising on business requirements.

Whitepaper: Network Detection and Response: How Reveal(x) Detects Threats

by ExtraHopJan 31, 2022

Many organizations use several perimeter tools, but the reality is that these vital defenses are frequently breached. This white paper explores how network detection and response (NDR) spots lateral movement.

Learn why ExtraHop Reveal(x) NDR can't be evaded or tampered with, making it a crucial tool to catch stealthy threats, supply chain attacks, and advanced persistent threats.

Download this ExtraHop report to get a clear understanding of how Reveal(x) NDR helps teams resolve threats 84% faster.

Research Report: EMA - Security Cloud Assets: How IT Security Pros Grade Their Own Progress

by ExtraHopJan 31, 2022

As enterprise computing moves to the cloud, IT teams struggle to keep up with the burgeoning use of those services. This report explores the challenges facing cloud security and the best tools for the job.

Learn what security best practices look like for IaaS, PaaS, and SaaS services, and where IT security practitioners believe they are along the path to better cloud security practices.

Download this ExtraHop-sponsored report for a briefing on the current state of cloud IT and security operations.

  • Details
  • Research Report

Research Report: SANS 2021 Top New Attacks and Threat Report

by ExtraHopJan 31, 2022

You have to search hard to find solid advice about threat detection and prevention. For the past 15 years, the SANS Five Most Dangerous Attacks expert panel at the annual RSA Security Conference has filled that gap.

Discover statistics from reliable sources of breach and malware data and get a brief summary of expert advice from the RSA panel, which details the emerging threats to look out for in 2021 and beyond.

Download this SANS report to learn how to minimize risk from new and evolving threats.

Whitepaper: ESG Showcase: A Network-Based Approach to Cloud Workload Security

by ExtraHopJan 31, 2022

Many cloud tools rely on logs and agents with limited visibility into the environment. This report explains how these limitations can result in increased complexity and reduced effectiveness.

Learn how network-based tools provide unified, threat-centric protection across the entire environment and can help alleviate challenges while strengthening security.

Download this ESG report to learn how ExtraHop Reveal(x) 360 provides cloud-native visibility, detection, and response for the hybrid enterprise.

Whitepaper: SANS 2021 Cloud Security Survey

by ExtraHopJan 31, 2022

Since 2019, we've seen more and more examples of vulnerabilities in cloud assets, sensitive data disclosure, and public cloud environment breaches. Even with these types of security issues, more organizations than ever are moving their data and workloads to the public cloud, building applications in the cloud, and subscribing to a wide range of SaaS and other cloud services.

In this report, you'll learn:

  • What leads to cloud visibility gaps and how to resolve them
  • Common security weaknesses and how to mitigate them
  • Leading cloud attack trends to help inform your strategy

Download this ExtraHop-sponsored report to learn more.