www.extrahop.com Open in urlscan Pro
52.41.13.114  Public Scan

URL: https://www.extrahop.com/lp/periodic-table/
Submission: On May 25 via api from IE — Scanned from DE

Form analysis 1 forms found in the DOM

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Competitive Comparison
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   Complimentary Shields Up Assessment
   
   AWS Cloud Security
   
   What is Network Detection & Response (NDR)?
   
   Reveal(x) Enterprise: Self-Managed NDR

 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * Shields Up
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
    * Security Operations Transformation
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * U.S. Public Sector
   
   Complimentary
   
   
   SHIELDS UP ASSESSMENT
   
   Align with and implement CISA's cybersecurity guidance
   
   Start Now
   
   Get Additional Shields Up Guidance >

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Solution Bundles Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Incident Response
    * Deployment
    * Complimentary Shields Up Assessment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Hardware Policies
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Overwatch Managed NDR
    * Shields Up Solution Brief
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   Detect network attacks. Correlate threat intelligence and forensics.
   Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * News & Events
    * Careers
    * Resources
   
    * About Us
    * The ExtraHop Advantage
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Shields Up Resources
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
   
    * Cyberattack Glossary
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS

COMPETITIVE COMPARISON

WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

COMPLIMENTARY SHIELDS UP ASSESSMENT

AWS CLOUD SECURITY

WHAT IS NETWORK DETECTION & RESPONSE (NDR)?

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWS & EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More

THE EXTRAHOP ADVANTAGE

WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWS & EVENTS

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

SHIELDS UP RESOURCES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS

NETWORK DETECTION & RESPONSE


NDR USE CASES

This periodic table represents the depth and breadth of what the network can do
for your business. Security, cloud, & IT operations can use NDR to improve
threat response times by 84% and troubleshoot downtime 90% faster.


SECURITY


CLOUD


IT OPS

Ra

Inv
Lm
Msd

Fcs
Pc
Sca

Tt
Rm
Ns

Apm
Sd

Tdr
InR
TH


CDR

Cd

Hyg
Ex
Iot
AD

Rsm
Rma
Vpn
Bhv
Ids
FsI
Sa
Pck
Rw
Sh
Ms
AWS
AZ
GCP
Fn
Hy
Th
Crt
Ssh
Inf
Ir
As
Db
Bd
Dns
Edr
Cp
Apt
Isi
Mg
Mnt
Agti
Sl
Ew
Dct
Cn
Sr

SECURITY
Ra
Inv
Lm
Msd
Sd
Tdr
InR
TH
Iot
AD
Bhv
Ids
FsI
Sa
Pck
Rw
Sh
Ir
As
Db
Bd
Dns
Edr
Cp
Apt


CLOUD
Fcs
Pc
Sca
CDR
Ms
AWS
AZ
GCP
Fn
Hy
Th
Crt
Isi
Mg
Mnt
Agti
Sl
Ew
Dct
Cn
Sr


IT OPS
Tt
Rm
Ns
Apm
Cd
Hyg
Ex
Rsm
Rma
Vpn
Ssh
Inf

Ra
Remote Access

Secure remote access and troubleshoot VPN connecting and performance problems
VIEW THE RESOURCE HUB
Inv
Asset Inventory

Comprehensive inventory of all assets including unmanaged and IoT
VIEW THE USE CASE
Lm
Lateral Movement

Detect post-compromise reconnaisance and lateral movement to stop the threat
before the breach
VIEW THE USE CASE
Msd
Monitor Sensitive Data

Detect unauthorized movement of sensitive data
VIEW THE USE CASE
Fcs
Frictionless Cloud Security

Monitor sensitive cloud workloads and data movement.
VIEW THE STORY
Pc
Post Compromise Detection

Detect post-compromise recon and lateral movement.
VIEW THE USE CASE
Sca
Supply Chain Attack

Monitor unexpected upstream dependencies in cloud workloads.
VIEW THE USE CASE
Tt
Triage and Troubleshooting

Quickly resolve performance issues.
VIEW THE USE CASE
Rm
Remote Working

Support distributed workforces.
VIEW THE USE CASE
Ns
NetSecOps

Eliminate silos between NetOps and SecOps to improve incident response and
productivity.
VIEW THE USE CASE
Apm
Application Performance Monitoring

Eliminate blind spots in your application delivery chain and ensure high quality
user experience without agents or logs.
VIEW THE SOLUTION
Sd
Secure Decryption

Out of band decryption of SSL/TLS 1.3 is needed to detect malicious behavior
hiding within encrypted traffic
VIEW THE BLOG POST
Tdr
Threat Detection and Response

By combining rule- and behavior-based analytics, your SOC can identify real
threats, faster
VIEW THE SOLUTION
InR
Intelligent Response

Detect unusual behavior and activity across the hybrid network
VIEW THE USE CASE
TH
Threat Hunting

Streamlined Threat Hunting with rich transaction data for all analyst levels
VIEW THE USE CASE
CDR
Cloud Detection and Response

Respond quickly to advanced threats in the cloud.
VIEW THE USE CASE
Cd
Cloud Operations

Migrating workloads to the cloud is risky without understanding all the
dependencies.
VIEW THE USE CASE
Hyg
Network Hygiene and Compliance

Continuous monitoring, operational awareness and automated audits gives you
immediate answers to proactively maintain hygiene and compliance at massive
scale.
VIEW THE SOLUTION
Ex
User Experience Monitoring

Improve user experience with end-to-end visibility and solve porblems before
your users feel the pain.
VIEW THE SOLUTION
Iot
Enterprise IOT Security

Complete visbility into IoT and unmanaged devices.
VIEW THE SOLUTION
AD
Active Directory Monitoring

Your Microsoft Active Directory (AD) is one of the busiest - and loudest -
systems in your enterprise. How can you identify tell-tale threat signals in all
that noise?
VIEW THE SOLUTION
Rsm
Remote Site Monitoring

Improve branch office and remote site visibility to proactively identify and fix
issues.
VIEW THE SOLUTION
Ram
Remote Access Monitoring

Maintain uptime and monitor resource usage to keep remote workforces productive.
VIEW THE SOLUTION
Vpn
VPN Monitoring

Monitor traffic and performance for remote VPN users to detect unexpected or bad
behaviors.
VIEW THE BUNDLE
Bhv
Behavior Analytics
VIEW THE WEBINAR
Ids
Next Gen IDS

Improve security controls and deepen compliance coverage with critical CVE
exploit rules and ML-powered detections.
VIEW THE SOLUTION
FsI
Forensic Investigation

Search for network evidence to identify, collect and analyze indicators of
compromise
VIEW THE BLOG
Sa
Security Analytics

Monitor and analyze network traffic to identify IOCs before a breach occurs
VIEW THE WEBINAR
Pck
Full Packet Capture
VIEW THE BLOG
Rw
Ransomware Protection

Detect known and unknown and stop ransomware attacks in progress
VIEW THE SOLUTION
Sh
Security Hygeine

To improve security posture you need to ensure you don't have expired certs or
deprecated protocols on your network
VIEW THE BLOG
Ms
Multicloud Security

Secure applications, workloads, and data in multi-cloud environments.
VIEW THE WEBINAR
AWS
AWS Workload Security

Detection, investigation, and response for AWS workloads.
VIEW THE SOLUTION
AZ
Azure Workload Security

Detection, investigation, and response for Azure workloads.
VIEW THE SOLUTION
GCP
GCP Workload Security

Detection, investigation, and response for Google Cloud workloads.
VIEW THE SOLUTION
Fn
Cloud Forensics

Capture full packets for detailed forensic investigations.
VIEW THE USE CASE
Hy
Hybrid Security

Cloud-native visibility, detection, and response for the hybrid enterprise.
VIEW THE SOLUTION
Th
Cloud Threat Hunting

Proactively hunt for threats and IoCs across multicloud and hybrid environments.
VIEW THE WEBINAR
Crt
Monitor Cloud Workloads

Discover and monitor cloud workloads for threats and unusual activity.
VIEW THE USE CASE
Ssh
SSH Monitoring

Monitor Secure Shell (SSH) connections to keep users productive and prevent
suspicous activity.
VIEW THE BLOG
Inf
Infrastructure Monitoring

Gain visibility into the critical systems, servers, and applications that make
up business impacting experiences.
VIEW THE USE CASE
Ir
Incident Response

Incident response when you have 72 hours to disclose a breach under GDPR.
VIEW THE BLOG
As
Application Security

Understanding normal application behavior is required to ensure security across
hybrid enterprise
VIEW THE CUSTOMER STORY
Db
Database Security Monitoring

Monitoring sensitive data and helping customers prevent data exfiltration
VIEW THE USE CASE
Bd
Breach Detection

Detect post-compromise recon and lateral movement before attacker do real
damage.
VIEW THE USE CASE
Dns
DNS Monitoring

Stop C2 and data theft through inconspicuous DNS responses and queries.
VIEW THE LIBRARY
Edr
EDR Coverage Gaps

Get Broader, Deeper MITRE ATT&CK Coverage by Using EDR and NDR Together.
VIEW THE BLOG
Cp
Compliance Assessment

ExtraHop consultants deliver a complete audit and assessment of security policy
compliance.
VIEW THE SERVICE
Apt
Advanced Persistent Threat

Advanced, steathy attackers should be fought where they are: on the inside.
VIEW THE BLOG
Isi
Investigate Security Incidents

Leverage context-rich packet data and intuitive workflows to determine scale and
scope faster.
VIEW THE USE CASE
Mg
Cloud Migration

Secure and monitor workloads before, during, and after migration to the cloud
VIEW THE SOLUTION
Mnt
Continuous Monitoring

Monitor data flows between workloads for threats and data breach indicators.
VIEW THE USE CASE
Agti
Agentless Workload Security

Agentless deployment enables elastic scalability and frictionless DevOps.
VIEW THE STORY
Sl
Serverless Visibillity

Gain visibility into traffic traversing serverless compute instances and
functions.
VIEW THE EBOOK
Ew
East-West Cloud Visibility

Discover and remediate APTs and attacker lateral movement in east-west traffic.
VIEW THE USE CASE
Dct
Decrypt Cloud Traffic

Examine encrypted traffic to discover hidden threats including C2
communications.
VIEW THE REPORT
Cn
Container Security

Monitor traffic and data flows to and from container deployments.
VIEW THE EBOOK
Sr
Shared Responsibility

Fill gaps in cloud visibility to discover and secure resources that your cloud
provider won't.
VIEW THE SOLUTION


SECURITY:

 * Inv: Asset Inventory
 * Lm: Lateral Movement
 * Msd: Monitor Sensitive Data
 * Tdr: Threat Detection and Response
 * InR: Intelligent Response
 * TH: Threat Hunting
 * Ra: Remote Access
 * Sd: Secure Decryption
 * IoT: Enterprise IoT Security
 * AD: Active Directory Monitoring
 * Bhv: Behavior Analytics
 * Ids: Next Gen IDS
 * FsI: Forensic Investigation
 * Sa: Security Analytics
 * Pck: Full Packet Capture
 * Rw: Ransomware Protection
 * Sh: Security Hygiene
 * Ir: Incident Response
 * As: Application Security
 * Db: Database Security Monitoring
 * Bd: Breach Detection
 * Dns: DNS Monitoring
 * Edr: EDR Coverage Gaps
 * Cp: Compliance Assessment
 * Apt: Advanced Persistent Threats


CLOUD:

 * Fcs: Frictionless Cloud Security
 * Pc: Post Compromise
 * Sca: Supply Chain Attack
 * CDR: Cloud Detection and Response
 * Msd: Monitor Sensitive Data
 * Ms: Multicloud Security
 * AWS: AWS Workload Security
 * AZ: Azure Workload Security
 * GCP: GCP Workload Security
 * Fn: Cloud Forensics
 * Hy: Hybrid Security
 * Th: Cloud Threat Hunting
 * Crt: Monitor Cloud Workloads
 * Isi: Investigate Security Incidents
 * Mg: Cloud Migration
 * Mnt: Continious Monitoring
 * Agti: Agentless Workload Security
 * SI: Serverless Visibility
 * EW: East-West Cloud Visibility
 * Dct: Decrypt Cloud Traffic
 * As: Application Security
 * Cn: Container Security
 * Sr: Shared Responsibility


IT OPS:

 * Tt: Triage and Troubleshooting
 * Rm: Remote Working
 * Ns: NetSecOps
 * Cd: Cloud Operations
 * Apm: Application Performance Monitoring
 * Hyg: Network Hygiene and Compliance
 * Ex: User Experience Monitoring
 * Rsm: Remote Site Monitoring
 * Mnt: Continious Monitoring
 * Rma: Remote Access Monitoring
 * Vpn: VPN Monitoring
 * Ssh: SSH Monitoring
 * Inf: Infrastructure Monitoring



+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Competitive Comparison
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * Complimentary Shields Up Assessment
 * AWS Cloud Security
 * What is Network Detection & Response (NDR)?
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * News & Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2022
 * Terms of Use
 * Privacy Policy

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube




Close


suggested results