Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo

Our Website: http://www.extrahop.com


Latest Content From ExtraHop

Webcast: Architecting Security for the Internet of Things

by ExtraHopDec 16, 2020

As the Internet of Things (IoT) becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems used in their enterprise and offer advice on monitoring and protecting next-generation IoT technology.


Webcast: Architecting Security for the Internet of Things

by ExtraHopDec 16, 2020

As the Internet of Things (IoT) becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems used in their enterprise and offer advice on monitoring and protecting next-generation IoT technology.


Webcast: Unlocking the Ultimate Source of Truth in Cloud Security—Network Data

by ExtraHopNov 19, 2020

Learn how virtual taps from AWS, Azure, and Google Cloud enable network detection and response (NDR) solutions to help secure cloud environments with agentless and immutable monitoring and threat detection capabilities. Invisible to attackers, NDR solutions sit out of band and analyze network traffic streams to provide crucial information about devices, users, and potential attacks that other security tools simply can’t. Best-of-breed NDR also augments security personnel visibility into SSL/TLS 1.3 encrypted traffic and ML-driven threat detection that alerts only on items that matter while providing intelligence to remediation and forensic workflows.


Whitepaper: Network Detection and Response for MITRE ATT&CK Framework

by ExtraHopOct 28, 2020

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint Detection and Response (EDR) platforms to test their standard deployments against a subset (56) of the TTPs listed. However, no such evaluation yet exists for network traffic analysis (NTA) products.

Read the white paper for a high-level view of how enterprise NTA with ExtraHop Reveal(x) detects and enables investigation of a broad range of the TTPs catalogued by MITRE ATT&CK!


Whitepaper: Frictionless Security for Agile Game Development

by ExtraHopOct 28, 2020

As the makers of popular titles including "Dungeons and Dragons" and "Magic: The Gathering," international adventure game leader Wizards of the Coast entertains tens of millions of fans around the globe. In the highly competitive arena of online gaming, speed is key, and game development teams need to be able to roll out updates several times a day. That means security has to protect business applications and customer data without compromising speed or agility.

When Wizards added SaaS-based network detection and response (NDR) from Reveal(x) Cloud to their security suite, they empowered their security and development teams to work better together.

Download this case study to learn more about the implementation of ExtraHop Reveal(x) Cloud at Wizards of the Coast.


Whitepaper: IDC Workbook: Best Practices for Cloud Security

by ExtraHopOct 20, 2020

Most businesses use at least some public cloud infrastructure such as AWS, Azure, or Google Cloud Platform. But, as a security specialist do you know the vulnerabilities? What is your responsibility and what should be handled by your cloud vendor? In this report, IDC compiles learnings and best practices for cloud security.

You will learn:

• Which pieces of cloud security fall to service providers vs. users under the Shared Responsibility Model
• What are the suggested security practices for cloud customers?
• Which technology solutions does IDC recommend for cloud security?

And, to help you implement your plan, a checklist with questions to ask any cloud security technology solution vendor to help you narrow down which products and services are right for your business.


Whitepaper: Top Threats to Cloud Computing: The Egregious 11

by ExtraHopOct 20, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways from experts in the field, shares security guidance, and shows where CSA's cloud control matrix, or CCM, provides coverage.

Gain insight into the "Egregious 11" list of security issues in the cloud and learn more about:

• Key takeaways from cloud security experts
• Domain-based security guidance
• Cloud controls matrix (CCM) coverage


Whitepaper: 2020 Gartner Market Guide for Network Detection & Response

by ExtraHopOct 20, 2020

Network Detection and Response (NDR) is rapidly emerging as a must-have capability in modern security operations, providing In its second annual Market Guide for Network Detection and Response*, Gartner provides insight into this accelerating market. Key takeaways from Gartner include:

"Enterprises should strongly consider NDR solutions to complement signature-based tools and network sandboxes. Many Gartner clients have reported that NDR tools have detected suspicious network traffic that other perimeter security tools had missed."

Gartner is pleased to say ExtraHop is included as a Representative Vendor in this new high-growth category of Network Detection and Response.

Read the guide to understand which gap Gartner believes NDR fills in the crowded cyber security market, as well as which vendors can support key security objectives including hybrid and multicloud visibility, faster incident response, and stronger security hygiene.


Research Report: 2020 SANS Enterprise Cloud Incident Response Survey

by ExtraHopOct 20, 2020

SANS surveyed 218 enterprises to discover the factors that are affecting their ability to respond to incidents in the cloud. They learned that most incidents are resolved in a matter of days, not hours.

Find out how compromises impacted respondents and which systems were affected. From budget to security tools and critical skills, learn which factors affected respondent's incident response times, and read SANS' predictions and recommendations for the future of cloud security and incident response.

Download this ExtraHop-sponsored analysis to learn more about the current state of cloud incident response.


Research Report: SANS Report: Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

by ExtraHopOct 20, 2020

Download this new report and gain insights into MITRE ATT&CK security framework and how it can help you strengthen your security and measure your success.

You will also learn about:

  • How ATT&CK provides a list of attacker techniques and insight on how to defend against them
  • Learn how to use ATT&CK to improve your security operations
  • Look ahead to an important shift on the horizon for organizing and understanding techniques