Network Detection & Response
Harness network visibility to reduce cyber risk and detect, investigate, and respond to threats.
Network Performance Management
Anticipate network disruptions, rapidly respond to incidents, and ensure availability across your enterprise.
Packet Forensics
Jump into action with machine-learning powered, context-enriched alerts that attackers can't evade.
Intrusion Detection System
Blending cloud-scale ML with rule-based insights to expose and contain threats in the network.
Why ExtraHop
Partners & Integrations
Professional Services
Customer Support
Our partners help extend the upper hand to more teams across more platforms.
Discover how easily RevealX integrates with other leading security solutions.
Explore the benefits of our partner program and become a partner.
Gain the benefits of RevealX without having to manage it yourself.
Accelerate time to value with RevealX through our robust training and professional services offerings.
Explore our straightforward, credit-based packages for professional services.
Quick Starts
Live Trainings
Professional Services Integrations
Augment your team with a dedicated or partially dedicated ExtraHop solutions architect.
Let us implement and configure your ExtraHop appliances.
Experience the dedication and passion of our world-class global support team.
Connect with peers and learn from ExtraHop engineers in our thriving community.
Exceptional support for our exceptional customers
Explore our expert-delivered, live and virtual training and certification offerings.
Complete visibility. Real-time detection. Intelligent response.
Get to know ExtraHop's Executive Leadership and Board of Directors
Explore job openings at ExtraHop
Learn more about ExtraHop
Find out where you can interact with and experience ExtraHop.
Fal.Con CrowdStrike Cybersecurity Conference 2025
Gartner Security Summit
Learn about the value and capabilities of RevealX through analyst reports, videos, and more.
Products
Security
Performance
Forensics
IDS
Solutions
Security Use Cases
Performance Use Cases
Business Intiatives
Use Cases By Industry
Events
Resources
Decryption enhanced
Detection Supported
A brute force attack is a trial-and-error attack method to guess a password, encryption key, or hidden webpage. See brute force attack examples.
Detection Reported
Learn how to detect C2 beaconing. C2 beaconing is a method of command and control communication between malware-infected hosts (like those that make up botnets) and the controlling server.
Cryptomining malware, or 'cryptojacking,' is a malware attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin.
A DCSync attack uses commands in MS-DRSR to pretend to be a domain controller (DC) in order to get user credentials. Learn more and see examples of attacks.
DNS tunneling routes DNS requests to the attacker's server, providing attackers a covert command and control channel. Learn more and see DNS tunneling examples.
Denial of service (DoS) & distributed denial of service (DDoS) attacks overload a machine or network to make it unavailable. Learn how to respond to an attack.
HTTP request smuggling attack takes advantage of inconsistencies in how servers process requests from multiple senders. Learn more and see examples.
What is Malware Obfuscation? See techniques, history of attacks, and effective detection methods.
Port scanning attackers scope out their target environment by sending packets to specific ports on a host and using the responses to find vulnerabilities.
Ransomware is a type of malicious software which encrypts files, making them inaccessible until a ransom is paid. Learn more and see examples.
What are RCE Attacks and Vulnerabilities? See attack examples, history of attacks, and effective methods to protect enterprise organizations.
Attacks like RDP exploitation hijack remote access tools to access a network's internal systems. Learn more and see examples.
By injecting an SQL command into a data entry field, attackers communicate directly with your database. Learn more and see examples such as RDP exploitation.
What is a supply chain attack? Types of supply chain attacks, history of attacks, and effective methods to protect enterprise organizations.
Learn about cross-site scripting (XSS) attacks and the top three ways to prevent an attack. See risk factors and examples.