DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DataOps
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
  • Media Kit
  • About
  • Sponsor
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DataOps
  • DevSecOps
  • DevOps Onramp
  • Platform Engineering
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps
    • ROELBOB
Hot Topics
  • Azure Migration Strategy: Tools, Costs and Best Practices
  • Blameless Integrates Incident Management Platform With Opsgenie
  • OpenAI Hires 1,000 Low Wage Coders to Retrain Copilot | Netflix Blocks Password Sharing
  • Red Hat Brings Ansible Automation to Google Cloud
  • Three Trends That Will Transform DevOps in 2023

Home » Blogs » ExtraHop Introduces Reveal(x) to Expose Attacks on Critical Assets and Automate Investigations

ExtraHop Introduces Reveal(x) to Expose Attacks on Critical Assets and Automate Investigations

Avatar photoBy: DevOps.com on February 1, 2018 Leave a Comment

New Security Analytics Product Discovers and Contextualizes all Network Transactions to Surface High Risk Anomalies and Cut Investigation Time from Days to Minutes

Recent Posts By DevOps.com
  • Global Next-Generation Software Engineering Conference
  • Akamai Security Research: Financial Services Continues Getting Bombarded with Credential Stuffing and Web Application Attacks
  • Vulcan Cyber Announces New Chief Revenue Officer and Internal Promotions to Accelerate Rapid Growth
Avatar photo More from DevOps.com
Related Posts
  • ExtraHop Introduces Reveal(x) to Expose Attacks on Critical Assets and Automate Investigations
  • ExtraHop Introduces New Professional Services for Data-Driven Enterprise IT Transformations
  • From Architect to Operator: The Rise of Developers
    Related Categories
  • Blogs
Show more
Show less

SEATTLE – January 30, 2018 – ExtraHop, the leader in analytics for security and performance management, today announced the general availability of ExtraHop Reveal(x). This new security analytics product builds on enterprise-proven anomaly detection powered by wire data, giving security teams much-needed insight into what’s happening within the enterprise while automating the detection and investigation of threats. By analyzing all network interactions for abnormal behavior and identifying critical assets in the environment, Reveal(x) focuses analysts’ attention on the most important risks and streamlines response to limit exposure.

TechStrong Con 2023Sponsorships Available

An Industry in Transition

Security teams face a convergence of factors that complicate operations and decrease visibility. Hybrid and multi-cloud architectures increase agility but reduce operational control. Encryption is vital but disguises both benign and malicious activities. At the same time, businesses are shifting the emphasis from physical control points like endpoints and firewalls to logical perimeters such as trusted domains, privileged users, IoT, cloud, microservices, and containers. A new source of insight is required for modern architectures, one that provides empirical evidence to help analysts triage and investigate threats with confidence and timeliness.

“Attack surfaces are expanding and the sophistication of attackers is increasing. There simply aren’t enough talented security professionals to keep up,” said Jesse Rothstein, CTO and co-founder, ExtraHop. “Reveal(x) provides security teams with increased scrutiny of critical assets, detection of suspicious and anomalous behaviors, and workflows for both automated and streamlined investigation. We enable practitioners to do more with less by getting smarter about the data they already have.”

A Better Approach, A More Efficient Workflow

Reveal(x) addresses the gaps in security programs by harnessing wire data, which encompasses all information contained in application transactions. It auto-discovers, classifies, and prioritizes all devices, clients, and applications on the network and employs machine learning to deliver high-fidelity insights immediately. Anomalies are directly correlated with the attack chain and highlight hard-to-detect activities, including:

  • Internal reconnaissance — scans for open ports and active hosts, brute force attacks, attempted logins, and unusual access patterns.
  • Lateral movement — relocation from an original entry point, privilege escalation, and ransomware spread.
  • Command and control traffic — communications between a compromised host within the network and the targeted asset or an external host.
  • Exfiltration — large file transfers, unusual read/write patterns, and unusual application and user activity from an asset either directly or via a stopover host.

In a single unified system, Reveal(x) guides analysts to review relationships between these malicious activities and related evidence that informs disposition: the exhibited behavior, baselined measurements, transaction details, and assets involved. Live Activity Maps show communications in real time and can also replay transactions to illuminate the incident’s timing and scope. Detailed forensic evidence is just a click away, enabling immediate root cause determination using individual packets.

What Customers Are Saying

“When you work in a business dealing with the nation’s leading insurance companies, there is a lot of pressure to get it right. We rely on ExtraHop to provide us with the visibility needed to investigate performance and security issues,” said Chris Wenger, Senior Manager of Network & Telecommunication Systems at Mitchell International. “With ExtraHop in our IT environment, we can more easily monitor all of the communications coming into our network, including use of insecure protocols. These insights enable my team to better secure our environment. ExtraHop has been that extra layer of security for us.”

What Analysts Are Saying

“In security, your intelligence is only as good as the data source from which it’s derived,” said Eric Ogren, Senior Analyst at 451 Research. “The network is an ideal place to identify active computing devices and call out threats as they attempt to probe and communicate. ExtraHop Reveal(x) balances real-time critical asset insights with machine learning-based network traffic analytics to create visibility that will help security teams stay one step ahead of security incidents for those assets that matter most.”

What Partners Are Saying

“There are no silver bullets when it comes to identifying and managing risk within a business information security program. It’s a multidimensional problem that requires reliable sources of insight and best-of-breed technology,” said Tim O’Brien, Director of Security Operations at Trace3. “We are excited to integrate the power of ExtraHop Reveal(x) enterprise visibility and machine learning into our world-class security practice, helping our customers identify and address threats before they affect the business.”

For more information on ExtraHop Reveal(x), check out these additional resources:

  • ExtraHop CEO announces Reveal(x)
  • Reveal(x) addresses the persistent challenge that costs security programs millions
  • Security expert shares his take on Reveal(x)
  • Whata customer CEO says about using ExtraHop for security
  • Reveal(x) product details

Product Availability

ExtraHop Reveal(x) is available now in North America via ExtraHop’s value-added resellers for an annual subscription.

Filed Under: Blogs

« GitLab Acquires Gemnasium to Accelerate its Security Roadmap
Machine Learning »

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Automating Day 2 Operations: Best Practices and Outcomes
Tuesday, February 7, 2023 - 3:00 pm EST
Shipping Applications Faster With Kubernetes: Myth or Reality?
Wednesday, February 8, 2023 - 1:00 pm EST
Why Current Approaches To "Shift-Left" Are A DevOps Antipattern
Thursday, February 9, 2023 - 1:00 pm EST

Sponsored Content

The Google Cloud DevOps Awards: Apply Now!

January 10, 2023 | Brenna Washington

Codenotary Extends Dynamic SBOM Reach to Serverless Computing Platforms

December 9, 2022 | Mike Vizard

Why a Low-Code Platform Should Have Pro-Code Capabilities

March 24, 2021 | Andrew Manby

AWS Well-Architected Framework Elevates Agility

December 17, 2020 | JT Giri

Practical Approaches to Long-Term Cloud-Native Security

December 5, 2019 | Chris Tozzi

Latest from DevOps.com

Azure Migration Strategy: Tools, Costs and Best Practices
February 3, 2023 | Gilad David Maayan
Blameless Integrates Incident Management Platform With Opsgenie
February 3, 2023 | Mike Vizard
OpenAI Hires 1,000 Low Wage Coders to Retrain Copilot | Netflix Blocks Password Sharing
February 2, 2023 | Richi Jennings
Red Hat Brings Ansible Automation to Google Cloud
February 2, 2023 | Mike Vizard
Three Trends That Will Transform DevOps in 2023
February 2, 2023 | Dan Belcher

TSTV Podcast

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays

GET THE TOP STORIES OF THE WEEK

Most Read on DevOps.com

New Relic Bolsters Observability Platform
January 30, 2023 | Mike Vizard
OpenAI Hires 1,000 Low Wage Coders to Retrain Copilot | Netflix Blocks Password Sharing
February 2, 2023 | Richi Jennings
Jellyfish Adds Tool to Visualize Software Development Workflows
January 31, 2023 | Mike Vizard
Cisco AppDynamics Survey Surfaces DevSecOps Challenges
January 31, 2023 | Mike Vizard
Let the Machines Do It: AI-Directed Mobile App Testing
January 30, 2023 | Syed Hamid
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2023 ·Techstrong Group, Inc.All rights reserved.