Products
Security
Network Detection and Response
RevealX NDR
Harness network visibility to reduce cyber risk and detect, investigate, and respond to threats.
OverviewPerformance
Network Performance Management
RevealX NPM
Anticipate network disruptions, rapidly respond to incidents, and ensure availability across your enterprise.
OverviewSolutions
Security Use Cases
Detect ransomware at every step in the attack chain.
Proactively hunt for known and unknown threats on your network.
Discover how network visibility speeds threat detection, investigation, and response.
Accelerate incident response with 90 days of traffic look-back.
Get visibility into all devices on your network to strengthen security hygiene.
Defend critical cloud workloads from advanced threats with RevealX.
Performance Use Cases
Build operational resilience at scale with powerful network performance monitoring.
Move from alert to insight in three clicks or less.
Secure your cloud migration with application-layer visibility, asset discovery, and monitoring.
Keep critical cloud workloads free from IT disruption.
Accelerate root cause analysis with an extensible packet capture repository.
Business Initiatives
Discover how RevealX supports a zero trust security architecture.
Enhance cloud security with agentless network detection and response.
Learn why NDR is essential to XDR strategies.
Maximize SOC efficiency and take threat response from reactive to proactive.
Seamlessly weave security and resiliency into the fabric of your digital transformation.
Industry
Seize business opportunities, accelerate IT transformation, maintain customer trust.
Protect our kids and the education system from disruption.
Maintain the security and resiliency of vital public services.
Accelerate cyber modernization and meet national security mandates.
Achieve operational resilience and preserve the cyber advantage.
Keep every digital interaction with constituents safe and secure.
Why ExtraHop
Partners & Integrations
Partners & Integrations
Our partners help extend the upper hand to more teams across more platforms.
OverviewDiscover how easily RevealX integrates with other leading security solutions.
Explore the benefits of our partner program and become a partner.
Gain the benefits of RevealX without having to manage it yourself.
Professional Services
Professional Services
Accelerate time to value with RevealX through our robust training and professional services offerings.
OverviewExplore our straightforward, credit-based packages for professional services.
Augment your team with a dedicated or partially dedicated ExtraHop solutions architect.
Let us deploy and configure your ExtraHop appliances.
Customer Support
Customer Support
Experience the dedication and passion of our world-class global support team.
OverviewConnect with peers and learn from ExtraHop engineers in our thriving community.
Exceptional support for our exceptional customers
Explore our expert-delivered, live and virtual training and certification offerings.
Why ExtraHop
Get to know ExtraHop's Executive Leadership and Board of Directors
Explore job openings at ExtraHop
Learn more about ExtraHop
Blog
Cybersecurity news and analysis, insights and perspectives from CISOs, threat briefings, and company announcements.
Explore all articlesResources
Learn about the value and capabilities of RevealX through analyst reports, videos, and more.
Explore all resourceswhitepaper
This report details a critical technique used in the SUNBURST attack to evade detection: hiding command-and-control traffic by taking advantage of known weaknesses with enterprise domain name systems (DNS). DNS is a popular attack vector both because of its ubiquity and its noisiness. The sheer volume of DNS queries make it extremely difficult to monitor and secure.