Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo:

Our Website:

Latest Content From ExtraHop

Research Report: Cloud & Hybrid Security Tooling Report

by ExtraHopJul 08, 2021

Organizations choose to host their critical workloads and data in various locations. However, a significant majority share one thing in common—they know they have gaps in their security toolsets. Nearly two-thirds plan to migrate even more workloads and data to the cloud, and roughly the same number plan to add new security tools by 2022.

In this report, you'll learn:

  • The current state of cybersecurity tooling
  • The challenges facing security teams and the gaps in common toolsets
  • How network detection and response (NDR) can help fill security gaps

Download this ExtraHop report to learn more.

Whitepaper: Cloud Security is Much More than Prevention and Compliance

by ExtraHopJul 08, 2021

It's no secret that cloud security is important. Rather than jumping into deploying a specific product category to protect your cloud workloads, it's important to understand key industry trends so that you can better orient your organization and develop the right approach to addressing cloud security.

In this 451 Research report, you'll learn:

  • How a cloud security approach covers threat mitigation and monitoring
  • How to understand key industry trends to address both human and technology gaps
  • The organizational path that focuses on prevention, compliance, and threat monitoring
  • Download this ExtraHop-sponsored white paper to learn more.

Whitepaper: Gartner: Hype Cycle for Security Operations

by ExtraHopApr 16, 2021

As organizations continue to adopt new IT—from mobile, cloud services, operational technology (OT), and the Internet of Things (IoT)—it's clear that no single security technology provides complete protection, prevention, or visibility. Risk management leaders must make intelligent, business-driven decisions about which operations technologies they choose.

This Gartner whitepaper will help you understand:
• The newest security technologies on the market
• What services are on the rise and their benefit ratings and business impacts
• Which products are losing their footing over more sophisticated management systems

Whitepaper: SANS Institute Survey: The State of Cloud Security

by ExtraHopApr 16, 2021

SANS conducted a survey to discover how cloud security is evolving. They sought to understand cloud adoption trends, current security architectures, and attitudes toward cloud-native tooling.

They found that, as most organizations are pursuing multi-cloud and hybrid environments, they're also shifting away from a perimeter-based security approach. Learn what this means for cybersecurity toolsets and how new technology such as cloud-native network detection and response (NDR) enables a change of strategy.

Download this white paper to learn more.

Whitepaper: A New Take on Cloud Shared Responsibility

by ExtraHopApr 16, 2021

By now, it's assumed that most cloud customers have a good grasp on the shared responsibility model, but the models offered by providers are sometimes more akin to a business proposal than a security plan. Without clarity, the path to a secure cloud infrastructure becomes murky.

This SANS whitepaper will help you navigate cloud infrastructure nuances and strengthen your security posture. Learn the key components of a cloud-based detection and response model and understand the strengths and limitations of on-premises tools when applied to the cloud.

Download this whitepaper to learn more.

Whitepaper: IDC Market Share: How the Network Is Used to Unmask the Adversary

by ExtraHopApr 16, 2021

The market for network intelligence threat analytics (NITA) is growing rapidly. As IDC's Research Director for Security Protocols Chris Kissel indicates, the common denominator of tools and features NITA tracks closely align with network detection and response (NDR).

In this report, you'll learn:
• How NITA market tools are more adaptable in the face of changing infrastructures
• How these platforms can monitor for configuration drift and indicators of compromise (IoC)
• Why IDC named ExtraHop's Reveal(x) as the Vendor Who Shaped the Year

Whitepaper: Lessons Learned Investigating the SUNBURST Software Supply Chain Attack

by ExtraHopApr 16, 2021

In the wake of the SolarWinds attack, organizations worked around the clock to understand the full extent of the damage. As security teams went back through historical records, it became clear that most of the logs were limited or incomplete, which created an issue for narrowing the timeline.

Download this report and learn how:
• Network data can be used to gain a more comprehensive understanding of the attack
• Insights into specific attack patterns cybercriminals use to move laterally within networks
• Our customers used network detection and response (NDR) to identify, investigate, and take swift action post-compromise

Whitepaper: Network Detection and Response for MITRE ATT&CK Framework

by ExtraHopOct 28, 2020

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint Detection and Response (EDR) platforms to test their standard deployments against a subset (56) of the TTPs listed. However, no such evaluation yet exists for network traffic analysis (NTA) products.

Read the white paper for a high-level view of how enterprise NTA with ExtraHop Reveal(x) detects and enables investigation of a broad range of the TTPs catalogued by MITRE ATT&CK!

Whitepaper: Frictionless Security for Agile Game Development

by ExtraHopOct 28, 2020

As the makers of popular titles including "Dungeons and Dragons" and "Magic: The Gathering," international adventure game leader Wizards of the Coast entertains tens of millions of fans around the globe. In the highly competitive arena of online gaming, speed is key, and game development teams need to be able to roll out updates several times a day. That means security has to protect business applications and customer data without compromising speed or agility.

When Wizards added SaaS-based network detection and response (NDR) from Reveal(x) Cloud to their security suite, they empowered their security and development teams to work better together.

Download this case study to learn more about the implementation of ExtraHop Reveal(x) Cloud at Wizards of the Coast.

Whitepaper: Top Threats to Cloud Computing: The Egregious 11

by ExtraHopOct 20, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways from experts in the field, shares security guidance, and shows where CSA's cloud control matrix, or CCM, provides coverage.

Gain insight into the "Egregious 11" list of security issues in the cloud and learn more about:

• Key takeaways from cloud security experts
• Domain-based security guidance
• Cloud controls matrix (CCM) coverage