www.extrahop.com Open in urlscan Pro
34.212.146.63  Public Scan

Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q3-august-newsletter-general-dynamic-allregions-b&utm_medium=email&utm_so...
Effective URL: https://www.extrahop.com/company/blog/2022/cwpp-and-ndr-together/?utm_campaign=2022-q3-august-newsletter-general-dynamic-...
Submission: On August 11 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: untitledForm-1367515949663POST https://s1701.t.eloqua.com/e/f2

<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
  novalidate="">
  <input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
  <input type="hidden" name="elqSiteId" value="1701">
  <input type="hidden" name="elqCampaignId">
  <input type="hidden" name="campaignId" value="70180000001EqjnAAC">
  <input type="hidden" name="elqCustomerGUID">
  <input type="hidden" name="elqCookieWrite" value="0">
  <input type="hidden" name="GA_Medium" value="">
  <input type="hidden" name="GA_Source" value="">
  <input type="hidden" name="GA_Campaign" value="">
  <input type="hidden" name="GA_Content" value="">
  <input type="hidden" name="GA_Term" value="">
  <input type="hidden" name="GA_Product" value="">
  <input type="hidden" name="GA_Region" value="">
  <input type="hidden" name="GA_Funnelstage" value="">
  <input type="hidden" name="GA_Version" value="">
  <input type="hidden" name="gclid" value="">
  <input type="hidden" name="FormURL" value="">
  <input type="hidden" name="uniqueid" value="">
  <input type="hidden" name="GA_Adgroup" value="">
  <input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
  <div class="inline-input">
    <div class="form-group email">
      <input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
    </div>
    <div class="form-group">
      <input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
    </div>
  </div>
</form>

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Competitive Comparison
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   Complimentary Shields Up Assessment
   
   AWS Cloud Security
   
   What is Network Detection & Response (NDR)?
   
   Reveal(x) Enterprise: Self-Managed NDR
   
   TRY IT FOR FREE
   
   
   REVEAL(X) 360
   
   
   LIGHT UP YOUR AWS
   ENVIRONMENT.
   
   No friction.
   No credit card required.
   
   Start Free Trial
 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * XDR
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
    * Security Operations Transformation
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * U.S. Public Sector
    * Education
   
   Complimentary
   
   
   SHIELDS UP ASSESSMENT
   
   Align with and implement CISA's cybersecurity guidance
   
   Start Now
   
   Get Additional Shields Up Guidance >

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Solution Bundles Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Incident Response
    * Deployment
    * Complimentary Shields Up Assessment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Hardware Policies
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Overwatch Managed NDR
    * Shields Up Solution Brief
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   * Detect network attacks. * Correlate threat intelligence and forensics. *
   Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * News & Events
    * Careers
    * Resources
   
    * About Us
    * The ExtraHop Advantage
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Shields Up Resources
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
   
    * Cyberattack Glossary
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS

COMPETITIVE COMPARISON

WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

COMPLIMENTARY SHIELDS UP ASSESSMENT

AWS CLOUD SECURITY

WHAT IS NETWORK DETECTION & RESPONSE (NDR)?

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWS & EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More

THE EXTRAHOP ADVANTAGE

WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWS & EVENTS

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

SHIELDS UP RESOURCES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS


BLOG


WHAT IS A CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)?


CLOUD SECURITY ALPHABET SOUP: MAKING SENSE OF A CROWDED SECURITY MARKET

 * Published by Dale Norris on August 2, 2022

Part 1 of a series on cloud workload protection platforms, or CWPPs: Choosing
the right solution for securing your cloud and hybrid environments can be
complicated. The market is an alphabet soup of acronyms, and it's hard to tell
what you'll get from one product to the next or from one vendor to another. That
complexity can lead to gaps, confusion, tool sprawl, and weakened defenses. 

To help you make sense of the current tooling landscape, we're going to dig into
individual product categories, explaining what they are, what they do, and their
strengths and weaknesses. We'll also compare cloud-native network detection and
response (NDR) to those products and show you where NDR provides similar or
complementary capabilities.


WHAT IS A CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)?

The answer to that question is right there in the tool's name: CWPPs were
designed to protect cloud workloads from attacks. CWPPs check for
vulnerabilities in static code, perform system hardening, and identify workload
misconfiguration, all of which can help to reduce security risk. Use cases can
include system file integrity monitoring, application whitelisting, host-based
firewalling, patching and configuration management, anti-malware scanning, and
endpoint threat detection and response.


HOW DO CWPPS WORK?

Typically, CWPPs are agent-based tools that typically use a combination of
tactics to secure cloud workloads, including network segmentation, system
integrity protection, host-based intrusion prevention and detection, and
anti-malware capabilities. Although they provide security at a workload level,
CWPPs do not offer coverage at the data or application layer. When defending
containers, CWPP tools exclude runtime security, a crucial component of advanced
threat detection and response.

Learn More about NDR for Cloud Threat Detection and Response Solutions


HOW DOES NDR COMPARE TO CWPP?

Network detection and response (NDR) tools take a network-based approach to
securing cloud workloads, including containers. Every workload uses the network
to communicate, making network data the ultimate source of truth for
cloud-focused security analysts, incident responders, and forensic
investigators. Although network-based tools have been used for on-premises
security for years, in the past it was often difficult to gather network data in
cloud environments. With the introduction of network taps from major cloud
service providers (CSPs) as well as third-party packet brokers, much of the
friction and complexity previously associated with NDR in the cloud has been
removed. And, unlike log- and agent-based data, network data can't be turned off
or modified.

While NDR and CWPP share some capabilities, there are also major differences.
CWPPs do a good job of securing compute instances and monitoring risk, and many
support multiple IaaS providers and other cloud environments, but they are not
built to monitor and analyze all network traffic flowing within your cloud
environment. Additionally, NDR solutions offer decryption and runtime security,
things most CWPP tools lack. Finally, NDR platforms can provide security at the
data and application layers, a major differentiator between them and CWPP tools.


NDR AND CWPP: BETTER TOGETHER

Although NDR and CWPP can be viewed as competing security categories, they can
also play well together. NDR products excel at visibility and threat detection
inside the perimeter, which allows security teams to investigate and respond to
advanced threats that make it past CWPP tools. NDR tools can also detect and
alert on lateral movement and supply chain attacks that evade CWPP tools. This
defense-in-depth strategy only makes cloud environments more secure. And with
best-in-class NDR solutions, it's possible to combine on-premises and multicloud
security together in the same user interface, enhancing advanced threat defense
in hybrid environments.

Learn How to Monitor Cloud Workloads with Cloud-Native NDR

 * Posted in Cloud, Tech, NDR, Cybersecurity, Industry Trends
 * See other posts by Dale Norris


STOP BREACHES 84% FASTER

Investigate a live attack in the full product demo of ExtraHop Reveal(x),
network detection and response, to see how it accelerates workflows.

Start Demo


RELATED BLOGS

4.23.21


EXTRAHOP REVEAL(X) 360 EBOOK

Download the Reveal(x) 360 Ebook to explore hybrid and cloud security use cases
and view on-demand and list pricing for ExtraHop Reveal(x) 360.

Dale Norris

3.23.22


ANNOUNCING LAYERED NETWORK INTELLIGENCE FOR AWS

Reveal(x) 360 now offers a VPC Flow Logs subscription for continuous visibility
in AWS environments. Choose flow logs as a standalone option or combine the
cloud-native data source with packets for a multi-layered approach to cloud
threat defense.

Ryan Davis

3.1.22


COMMON THREATS TO CLOUD SECURITY

Learn the most common threats to cloud security and get a primer on available
cloud security solutions.

Carol Caley


SIGN UP TO STAY INFORMED

Javascript is required to submit this form


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Competitive Comparison
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * Complimentary Shields Up Assessment
 * AWS Cloud Security
 * What is Network Detection & Response (NDR)?
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * News & Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2022
 * Terms of Use
 * Privacy Policy

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube




Close


suggested results