www.extrahop.com
Open in
urlscan Pro
52.41.13.114
Public Scan
URL:
https://www.extrahop.com/lp/periodic-table/
Submission: On May 25 via api from IE — Scanned from DE
Submission: On May 25 via api from IE — Scanned from DE
Form analysis
1 forms found in the DOM<form>
<input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>
Text Content
* The Platform EXTRAHOP REVEAL(X) 360 CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE FOR THE HYBRID ENTERPRISE. Learn More Explore Reveal(x) How It Works Competitive Comparison Why Decryption Matters Integrations and Automations Cybersecurity Services Complimentary Shields Up Assessment AWS Cloud Security What is Network Detection & Response (NDR)? Reveal(x) Enterprise: Self-Managed NDR * Solutions -------------------------------------------------------------------------------- SOLUTIONS With the power of machine learning, gain the insight you need to solve pressing challenges. FOR SECURITY Stand up to threats with real-time detection and fast response. Learn More > FOR CLOUD Gain complete visibility for cloud, multi-cloud, or hybrid environments. Learn More > FOR IT OPS Share information, boost collaboration without sacrificing security. Learn More > BY INITIATIVE * Shields Up * Advanced Threats * Ransomware Mitigation * Multicloud & Hybrid Cloud Security * Implement Zero Trust * Security Operations Transformation BY VERTICAL * Financial Services * Healthcare * e-Commerce and Retail * U.S. Public Sector Complimentary SHIELDS UP ASSESSMENT Align with and implement CISA's cybersecurity guidance Start Now Get Additional Shields Up Guidance > * Customers -------------------------------------------------------------------------------- CUSTOMERS Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support. COMMUNITY * Customer Portal Login * Solution Bundles Gallery * Community Forums * Customer Stories SERVICES * Services Overview * Reveal(x) Advisor * Incident Response * Deployment * Complimentary Shields Up Assessment TRAINING * Training Overview * Training Sessions SUPPORT * Support Overview * Documentation * Hardware Policies Featured Customer Story WIZARDS OF THE COAST Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop Read More See All Customer Stories > * Partners -------------------------------------------------------------------------------- PARTNERS Our partners help extend the upper hand to more teams, across more platforms. CHANNEL PARTNERS * Channel Overview * Managed Services Providers * Overwatch Managed NDR * Shields Up Solution Brief INTEGRATION PARTNERS * CrowdStrike * Amazon Web Services * Google Cloud Security * All Technology Partners PANORAMA PROGRAM * Partner Program Information * Partner Portal Login * Become a Partner Featured Integration Partner CROWDSTRIKE Detect network attacks. Correlate threat intelligence and forensics. Auto-contain impacted endpoints. Inventory unmanaged devices and IoT. Read More See All Integration Partners > * Blog * More * About Us * News & Events * Careers * Resources * About Us * The ExtraHop Advantage * What Is Cloud-Native? * Leadership * Board of Directors * Contact Us * Explore the Interactive Online Demo * Sign Up for a Live Attack Simulation * Upcoming Webinars and Events * Newsroom * ExtraHop Media Kit and Brand Guidelines HUNTER CHALLENGE Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event. Read More * Careers at ExtraHop * Search Openings * Connect on LinkedIn * All Resources * Customer Stories * Shields Up Resources * Ransomware Attacks in 2021: A Retrospective * White Papers * Datasheets * Industry Reports * Webinars * Cyberattack Glossary * Network Protocols Glossary * Documentation * Firmware * Training Videos Login Logout Start Demo THE PLATFORM SOLUTIONS CUSTOMERS PARTNERS BLOG MORE START THE DEMO CONTACT US Back EXTRAHOP REVEAL(X) 360 Cloud-native visibility, detection, and response for the hybrid enterprise. Learn More HOW IT WORKS COMPETITIVE COMPARISON WHY DECRYPTION MATTERS INTEGRATIONS AND AUTOMATIONS CYBERSECURITY SERVICES COMPLIMENTARY SHIELDS UP ASSESSMENT AWS CLOUD SECURITY WHAT IS NETWORK DETECTION & RESPONSE (NDR)? REVEAL(X) ENTERPRISE: SELF-MANAGED NDR Back SOLUTIONS Learn More SECURITY CLOUD IT OPS USE CASES EXPLORE BY INDUSTRY VERTICAL Back CUSTOMERS Customer resources, training, case studies, and more. Learn More CUSTOMER PORTAL LOGIN CYBERSECURITY SERVICES TRAINING EXTRAHOP SUPPORT Back PARTNERS Partner resources and information about our channel and technology partners. Learn More CHANNEL PARTNERS INTEGRATIONS AND AUTOMATIONS PARTNERS Back BLOG Learn More Back ABOUT US NEWS & EVENTS CAREERS RESOURCES Back ABOUT US See what sets ExtraHop apart, from our innovative approach to our corporate culture. Learn More THE EXTRAHOP ADVANTAGE WHAT IS CLOUD-NATIVE? CONTACT US Back NEWS & EVENTS Get the latest news and information. Learn More SIGN UP FOR A LIVE ATTACK SIMULATION UPCOMING WEBINARS AND EVENTS Back CAREERS We believe in what we're doing. Are you ready to join us? Learn More CAREERS AT EXTRAHOP SEARCH OPENINGS CONNECT ON LINKEDIN Back RESOURCES Find white papers, reports, datasheets, and more by exploring our full resource archive. All Resources CUSTOMER STORIES SHIELDS UP RESOURCES RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE CYBERATTACK GLOSSARY NETWORK PROTOCOLS GLOSSARY DOCUMENTATION FIRMWARE TRAINING VIDEOS NETWORK DETECTION & RESPONSE NDR USE CASES This periodic table represents the depth and breadth of what the network can do for your business. Security, cloud, & IT operations can use NDR to improve threat response times by 84% and troubleshoot downtime 90% faster. SECURITY CLOUD IT OPS Ra Inv Lm Msd Fcs Pc Sca Tt Rm Ns Apm Sd Tdr InR TH CDR Cd Hyg Ex Iot AD Rsm Rma Vpn Bhv Ids FsI Sa Pck Rw Sh Ms AWS AZ GCP Fn Hy Th Crt Ssh Inf Ir As Db Bd Dns Edr Cp Apt Isi Mg Mnt Agti Sl Ew Dct Cn Sr SECURITY Ra Inv Lm Msd Sd Tdr InR TH Iot AD Bhv Ids FsI Sa Pck Rw Sh Ir As Db Bd Dns Edr Cp Apt CLOUD Fcs Pc Sca CDR Ms AWS AZ GCP Fn Hy Th Crt Isi Mg Mnt Agti Sl Ew Dct Cn Sr IT OPS Tt Rm Ns Apm Cd Hyg Ex Rsm Rma Vpn Ssh Inf Ra Remote Access Secure remote access and troubleshoot VPN connecting and performance problems VIEW THE RESOURCE HUB Inv Asset Inventory Comprehensive inventory of all assets including unmanaged and IoT VIEW THE USE CASE Lm Lateral Movement Detect post-compromise reconnaisance and lateral movement to stop the threat before the breach VIEW THE USE CASE Msd Monitor Sensitive Data Detect unauthorized movement of sensitive data VIEW THE USE CASE Fcs Frictionless Cloud Security Monitor sensitive cloud workloads and data movement. VIEW THE STORY Pc Post Compromise Detection Detect post-compromise recon and lateral movement. VIEW THE USE CASE Sca Supply Chain Attack Monitor unexpected upstream dependencies in cloud workloads. VIEW THE USE CASE Tt Triage and Troubleshooting Quickly resolve performance issues. VIEW THE USE CASE Rm Remote Working Support distributed workforces. VIEW THE USE CASE Ns NetSecOps Eliminate silos between NetOps and SecOps to improve incident response and productivity. VIEW THE USE CASE Apm Application Performance Monitoring Eliminate blind spots in your application delivery chain and ensure high quality user experience without agents or logs. VIEW THE SOLUTION Sd Secure Decryption Out of band decryption of SSL/TLS 1.3 is needed to detect malicious behavior hiding within encrypted traffic VIEW THE BLOG POST Tdr Threat Detection and Response By combining rule- and behavior-based analytics, your SOC can identify real threats, faster VIEW THE SOLUTION InR Intelligent Response Detect unusual behavior and activity across the hybrid network VIEW THE USE CASE TH Threat Hunting Streamlined Threat Hunting with rich transaction data for all analyst levels VIEW THE USE CASE CDR Cloud Detection and Response Respond quickly to advanced threats in the cloud. VIEW THE USE CASE Cd Cloud Operations Migrating workloads to the cloud is risky without understanding all the dependencies. VIEW THE USE CASE Hyg Network Hygiene and Compliance Continuous monitoring, operational awareness and automated audits gives you immediate answers to proactively maintain hygiene and compliance at massive scale. VIEW THE SOLUTION Ex User Experience Monitoring Improve user experience with end-to-end visibility and solve porblems before your users feel the pain. VIEW THE SOLUTION Iot Enterprise IOT Security Complete visbility into IoT and unmanaged devices. VIEW THE SOLUTION AD Active Directory Monitoring Your Microsoft Active Directory (AD) is one of the busiest - and loudest - systems in your enterprise. How can you identify tell-tale threat signals in all that noise? VIEW THE SOLUTION Rsm Remote Site Monitoring Improve branch office and remote site visibility to proactively identify and fix issues. VIEW THE SOLUTION Ram Remote Access Monitoring Maintain uptime and monitor resource usage to keep remote workforces productive. VIEW THE SOLUTION Vpn VPN Monitoring Monitor traffic and performance for remote VPN users to detect unexpected or bad behaviors. VIEW THE BUNDLE Bhv Behavior Analytics VIEW THE WEBINAR Ids Next Gen IDS Improve security controls and deepen compliance coverage with critical CVE exploit rules and ML-powered detections. VIEW THE SOLUTION FsI Forensic Investigation Search for network evidence to identify, collect and analyze indicators of compromise VIEW THE BLOG Sa Security Analytics Monitor and analyze network traffic to identify IOCs before a breach occurs VIEW THE WEBINAR Pck Full Packet Capture VIEW THE BLOG Rw Ransomware Protection Detect known and unknown and stop ransomware attacks in progress VIEW THE SOLUTION Sh Security Hygeine To improve security posture you need to ensure you don't have expired certs or deprecated protocols on your network VIEW THE BLOG Ms Multicloud Security Secure applications, workloads, and data in multi-cloud environments. VIEW THE WEBINAR AWS AWS Workload Security Detection, investigation, and response for AWS workloads. VIEW THE SOLUTION AZ Azure Workload Security Detection, investigation, and response for Azure workloads. VIEW THE SOLUTION GCP GCP Workload Security Detection, investigation, and response for Google Cloud workloads. VIEW THE SOLUTION Fn Cloud Forensics Capture full packets for detailed forensic investigations. VIEW THE USE CASE Hy Hybrid Security Cloud-native visibility, detection, and response for the hybrid enterprise. VIEW THE SOLUTION Th Cloud Threat Hunting Proactively hunt for threats and IoCs across multicloud and hybrid environments. VIEW THE WEBINAR Crt Monitor Cloud Workloads Discover and monitor cloud workloads for threats and unusual activity. VIEW THE USE CASE Ssh SSH Monitoring Monitor Secure Shell (SSH) connections to keep users productive and prevent suspicous activity. VIEW THE BLOG Inf Infrastructure Monitoring Gain visibility into the critical systems, servers, and applications that make up business impacting experiences. VIEW THE USE CASE Ir Incident Response Incident response when you have 72 hours to disclose a breach under GDPR. VIEW THE BLOG As Application Security Understanding normal application behavior is required to ensure security across hybrid enterprise VIEW THE CUSTOMER STORY Db Database Security Monitoring Monitoring sensitive data and helping customers prevent data exfiltration VIEW THE USE CASE Bd Breach Detection Detect post-compromise recon and lateral movement before attacker do real damage. VIEW THE USE CASE Dns DNS Monitoring Stop C2 and data theft through inconspicuous DNS responses and queries. VIEW THE LIBRARY Edr EDR Coverage Gaps Get Broader, Deeper MITRE ATT&CK Coverage by Using EDR and NDR Together. VIEW THE BLOG Cp Compliance Assessment ExtraHop consultants deliver a complete audit and assessment of security policy compliance. VIEW THE SERVICE Apt Advanced Persistent Threat Advanced, steathy attackers should be fought where they are: on the inside. VIEW THE BLOG Isi Investigate Security Incidents Leverage context-rich packet data and intuitive workflows to determine scale and scope faster. VIEW THE USE CASE Mg Cloud Migration Secure and monitor workloads before, during, and after migration to the cloud VIEW THE SOLUTION Mnt Continuous Monitoring Monitor data flows between workloads for threats and data breach indicators. VIEW THE USE CASE Agti Agentless Workload Security Agentless deployment enables elastic scalability and frictionless DevOps. VIEW THE STORY Sl Serverless Visibillity Gain visibility into traffic traversing serverless compute instances and functions. VIEW THE EBOOK Ew East-West Cloud Visibility Discover and remediate APTs and attacker lateral movement in east-west traffic. VIEW THE USE CASE Dct Decrypt Cloud Traffic Examine encrypted traffic to discover hidden threats including C2 communications. VIEW THE REPORT Cn Container Security Monitor traffic and data flows to and from container deployments. VIEW THE EBOOK Sr Shared Responsibility Fill gaps in cloud visibility to discover and secure resources that your cloud provider won't. VIEW THE SOLUTION SECURITY: * Inv: Asset Inventory * Lm: Lateral Movement * Msd: Monitor Sensitive Data * Tdr: Threat Detection and Response * InR: Intelligent Response * TH: Threat Hunting * Ra: Remote Access * Sd: Secure Decryption * IoT: Enterprise IoT Security * AD: Active Directory Monitoring * Bhv: Behavior Analytics * Ids: Next Gen IDS * FsI: Forensic Investigation * Sa: Security Analytics * Pck: Full Packet Capture * Rw: Ransomware Protection * Sh: Security Hygiene * Ir: Incident Response * As: Application Security * Db: Database Security Monitoring * Bd: Breach Detection * Dns: DNS Monitoring * Edr: EDR Coverage Gaps * Cp: Compliance Assessment * Apt: Advanced Persistent Threats CLOUD: * Fcs: Frictionless Cloud Security * Pc: Post Compromise * Sca: Supply Chain Attack * CDR: Cloud Detection and Response * Msd: Monitor Sensitive Data * Ms: Multicloud Security * AWS: AWS Workload Security * AZ: Azure Workload Security * GCP: GCP Workload Security * Fn: Cloud Forensics * Hy: Hybrid Security * Th: Cloud Threat Hunting * Crt: Monitor Cloud Workloads * Isi: Investigate Security Incidents * Mg: Cloud Migration * Mnt: Continious Monitoring * Agti: Agentless Workload Security * SI: Serverless Visibility * EW: East-West Cloud Visibility * Dct: Decrypt Cloud Traffic * As: Application Security * Cn: Container Security * Sr: Shared Responsibility IT OPS: * Tt: Triage and Troubleshooting * Rm: Remote Working * Ns: NetSecOps * Cd: Cloud Operations * Apm: Application Performance Monitoring * Hyg: Network Hygiene and Compliance * Ex: User Experience Monitoring * Rsm: Remote Site Monitoring * Mnt: Continious Monitoring * Rma: Remote Access Monitoring * Vpn: VPN Monitoring * Ssh: SSH Monitoring * Inf: Infrastructure Monitoring + ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More Global Headquarters 520 Pike St Suite 1600 Seattle, WA 98101 United States EMEA Headquarters WeWork 8 Devonshire Square London EC2M 4PL United Kingdom APAC Headquarters 3 Temasek Avenue Centennial Tower Level 18 Singapore 039190 PLATFORM * Reveal(x) 360 * How It Works * Competitive Comparison * Why Decryption Matters * Integrations and Automations * Cybersecurity Services * Complimentary Shields Up Assessment * AWS Cloud Security * What is Network Detection & Response (NDR)? * Reveal(x) Enterprise: Self-Managed NDR SOLUTIONS * Security * Cloud * IT Ops * Use Cases * Industries CUSTOMERS * Customer Portal Login * Services Overview * Training Overview * Support Overview PARTNERS * Channel Overview * Technology Integration Partners * Partner Program Information BLOG MORE * About Us * Contact Us * News & Events * Careers * Resources * Copyright ExtraHop Networks 2022 * Terms of Use * Privacy Policy * Facebook * Twitter * LinkedIn * Instagram * YouTube Close suggested results