sb-nz logo
Story image

ExtraHop listed as Representative Vendor in Gartner guide

23 Jun 2020

Gartner’s Market Guide for Network Detection and Response (NDR) has named ExtraHop as a Representative Vendor this year.

ExtraHop is recognised for its capabilities including full-spectrum detection, advanced investigation, and intelligent response, as included in the company’s Reveal(x) network detection and response solution.

“Enterprises should strongly consider NDR solutions to complement signature-based tools and network sandboxes. Many Gartner clients have reported that NDR tools have detected suspicious network traffic that other perimeter security tools had missed,” explain Gartner analysts Lawrence Orans, Jeremy D’Hoinne, and John Chessman.

ExtraHop RevealX uses stream processing to auto-discover and classify every transaction, user, session, device, and asset in the hybrid enterprise at up to 100 Gbps, with line-rate SSL/TLS decryption and continuous packet capture. 

ExtraHop adds that the offering also uses the scalable computing resources of the cloud for ML and AI, applying millions of models to more than 5,000 features of data derived from 4-plus petabytes of anonymised threat telemetry, collected from more than 15 million devices and workloads worldwide every day. 

ExtraHop also recently announced Reveal(x) 360 as a fully hosted and managed software-as-a-service (SaaS) solution.

“We live in a post-compromise world in which prevention-based approaches to security leave organisations woefully unprotected,” comments ExtraHop CMO Bryce Hein. 

“With the rise of multi-cloud environments, the proliferation of IoT devices, and increasingly distributed operations, the ability to analyse East-West traffic is now a must have.”

The company recently announced a partnership with CrowdStrike, which will combine ExtraHop Reveal(x) and CrowdStrike Falcon for combined detection and response capabilities from the network to the endpoint.

The partnership enables real time detection across a network, instant threat response, and continuous endpoint visibility.

“The threat environment continues to grow in complexity as sophisticated cyber adversaries advance their attack techniques, evading security controls and gaining access to corporate networks,” says CrowdStrike vice president of worldwide business development and channels, Matthew Polly.

“Comprehensive visibility and real-time threat detection that allow for fast investigation and response at scale are imperative for organisations to spot and stop threats quickly.”

“Through this partnership, CrowdStrike and ExtraHop are providing customers the ability to identify and respond to malicious activity across the entire attack surface with a fully cloud-native integration that allows them to adapt with speed and agility.”

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Story image
Acronis launches data centre in Auckland
It is the first of 111 planned new data centres globally, allowing for the benefits of data localisation, including regional data sovereignty. More
Story image
Criminals scale back DDoS attacks after 'abnormal' spike in Q2
The Q2 spike seems to have been short-lived as DDoS activity returns to ‘normal’ levels over Q3, with 73% fewer attacks than seen in the previous quarter.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company's primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More