www.extrahop.com
Open in
urlscan Pro
34.212.146.63
Public Scan
Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q3-august-newsletter-general-dynamic-allregions-b&utm_medium=email&utm_so...
Effective URL: https://www.extrahop.com/company/blog/2022/cwpp-and-ndr-together/?utm_campaign=2022-q3-august-newsletter-general-dynamic-...
Submission: On August 11 via api from US — Scanned from DE
Effective URL: https://www.extrahop.com/company/blog/2022/cwpp-and-ndr-together/?utm_campaign=2022-q3-august-newsletter-general-dynamic-...
Submission: On August 11 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMName: untitledForm-1367515949663 — POST https://s1701.t.eloqua.com/e/f2
<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
novalidate="">
<input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
<input type="hidden" name="elqSiteId" value="1701">
<input type="hidden" name="elqCampaignId">
<input type="hidden" name="campaignId" value="70180000001EqjnAAC">
<input type="hidden" name="elqCustomerGUID">
<input type="hidden" name="elqCookieWrite" value="0">
<input type="hidden" name="GA_Medium" value="">
<input type="hidden" name="GA_Source" value="">
<input type="hidden" name="GA_Campaign" value="">
<input type="hidden" name="GA_Content" value="">
<input type="hidden" name="GA_Term" value="">
<input type="hidden" name="GA_Product" value="">
<input type="hidden" name="GA_Region" value="">
<input type="hidden" name="GA_Funnelstage" value="">
<input type="hidden" name="GA_Version" value="">
<input type="hidden" name="gclid" value="">
<input type="hidden" name="FormURL" value="">
<input type="hidden" name="uniqueid" value="">
<input type="hidden" name="GA_Adgroup" value="">
<input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
<div class="inline-input">
<div class="form-group email">
<input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
</div>
<div class="form-group">
<input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
</div>
</div>
</form>
<form>
<input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>
Text Content
* The Platform EXTRAHOP REVEAL(X) 360 CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE FOR THE HYBRID ENTERPRISE. Learn More Explore Reveal(x) How It Works Competitive Comparison Why Decryption Matters Integrations and Automations Cybersecurity Services Complimentary Shields Up Assessment AWS Cloud Security What is Network Detection & Response (NDR)? Reveal(x) Enterprise: Self-Managed NDR TRY IT FOR FREE REVEAL(X) 360 LIGHT UP YOUR AWS ENVIRONMENT. No friction. No credit card required. Start Free Trial * Solutions -------------------------------------------------------------------------------- SOLUTIONS With the power of machine learning, gain the insight you need to solve pressing challenges. FOR SECURITY Stand up to threats with real-time detection and fast response. Learn More > FOR CLOUD Gain complete visibility for cloud, multi-cloud, or hybrid environments. Learn More > FOR IT OPS Share information, boost collaboration without sacrificing security. Learn More > BY INITIATIVE * XDR * Advanced Threats * Ransomware Mitigation * Multicloud & Hybrid Cloud Security * Implement Zero Trust * Security Operations Transformation BY VERTICAL * Financial Services * Healthcare * e-Commerce and Retail * U.S. Public Sector * Education Complimentary SHIELDS UP ASSESSMENT Align with and implement CISA's cybersecurity guidance Start Now Get Additional Shields Up Guidance > * Customers -------------------------------------------------------------------------------- CUSTOMERS Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support. COMMUNITY * Customer Portal Login * Solution Bundles Gallery * Community Forums * Customer Stories SERVICES * Services Overview * Reveal(x) Advisor * Incident Response * Deployment * Complimentary Shields Up Assessment TRAINING * Training Overview * Training Sessions SUPPORT * Support Overview * Documentation * Hardware Policies Featured Customer Story WIZARDS OF THE COAST Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop Read More See All Customer Stories > * Partners -------------------------------------------------------------------------------- PARTNERS Our partners help extend the upper hand to more teams, across more platforms. CHANNEL PARTNERS * Channel Overview * Managed Services Providers * Overwatch Managed NDR * Shields Up Solution Brief INTEGRATION PARTNERS * CrowdStrike * Amazon Web Services * Google Cloud Security * All Technology Partners PANORAMA PROGRAM * Partner Program Information * Partner Portal Login * Become a Partner Featured Integration Partner CROWDSTRIKE * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT. Read More See All Integration Partners > * Blog * More * About Us * News & Events * Careers * Resources * About Us * The ExtraHop Advantage * What Is Cloud-Native? * Leadership * Board of Directors * Contact Us * Explore the Interactive Online Demo * Sign Up for a Live Attack Simulation * Upcoming Webinars and Events * Newsroom * ExtraHop Media Kit and Brand Guidelines HUNTER CHALLENGE Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event. Read More * Careers at ExtraHop * Search Openings * Connect on LinkedIn * All Resources * Customer Stories * Shields Up Resources * Ransomware Attacks in 2021: A Retrospective * White Papers * Datasheets * Industry Reports * Webinars * Cyberattack Glossary * Network Protocols Glossary * Documentation * Firmware * Training Videos Login Logout Start Demo THE PLATFORM SOLUTIONS CUSTOMERS PARTNERS BLOG MORE START THE DEMO CONTACT US Back EXTRAHOP REVEAL(X) 360 Cloud-native visibility, detection, and response for the hybrid enterprise. Learn More HOW IT WORKS COMPETITIVE COMPARISON WHY DECRYPTION MATTERS INTEGRATIONS AND AUTOMATIONS CYBERSECURITY SERVICES COMPLIMENTARY SHIELDS UP ASSESSMENT AWS CLOUD SECURITY WHAT IS NETWORK DETECTION & RESPONSE (NDR)? REVEAL(X) ENTERPRISE: SELF-MANAGED NDR Back SOLUTIONS Learn More SECURITY CLOUD IT OPS USE CASES EXPLORE BY INDUSTRY VERTICAL Back CUSTOMERS Customer resources, training, case studies, and more. Learn More CUSTOMER PORTAL LOGIN CYBERSECURITY SERVICES TRAINING EXTRAHOP SUPPORT Back PARTNERS Partner resources and information about our channel and technology partners. Learn More CHANNEL PARTNERS INTEGRATIONS AND AUTOMATIONS PARTNERS Back BLOG Learn More Back ABOUT US NEWS & EVENTS CAREERS RESOURCES Back ABOUT US See what sets ExtraHop apart, from our innovative approach to our corporate culture. Learn More THE EXTRAHOP ADVANTAGE WHAT IS CLOUD-NATIVE? CONTACT US Back NEWS & EVENTS Get the latest news and information. Learn More SIGN UP FOR A LIVE ATTACK SIMULATION UPCOMING WEBINARS AND EVENTS Back CAREERS We believe in what we're doing. Are you ready to join us? Learn More CAREERS AT EXTRAHOP SEARCH OPENINGS CONNECT ON LINKEDIN Back RESOURCES Find white papers, reports, datasheets, and more by exploring our full resource archive. All Resources CUSTOMER STORIES SHIELDS UP RESOURCES RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE CYBERATTACK GLOSSARY NETWORK PROTOCOLS GLOSSARY DOCUMENTATION FIRMWARE TRAINING VIDEOS BLOG WHAT IS A CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)? CLOUD SECURITY ALPHABET SOUP: MAKING SENSE OF A CROWDED SECURITY MARKET * Published by Dale Norris on August 2, 2022 Part 1 of a series on cloud workload protection platforms, or CWPPs: Choosing the right solution for securing your cloud and hybrid environments can be complicated. The market is an alphabet soup of acronyms, and it's hard to tell what you'll get from one product to the next or from one vendor to another. That complexity can lead to gaps, confusion, tool sprawl, and weakened defenses. To help you make sense of the current tooling landscape, we're going to dig into individual product categories, explaining what they are, what they do, and their strengths and weaknesses. We'll also compare cloud-native network detection and response (NDR) to those products and show you where NDR provides similar or complementary capabilities. WHAT IS A CLOUD WORKLOAD PROTECTION PLATFORM (CWPP)? The answer to that question is right there in the tool's name: CWPPs were designed to protect cloud workloads from attacks. CWPPs check for vulnerabilities in static code, perform system hardening, and identify workload misconfiguration, all of which can help to reduce security risk. Use cases can include system file integrity monitoring, application whitelisting, host-based firewalling, patching and configuration management, anti-malware scanning, and endpoint threat detection and response. HOW DO CWPPS WORK? Typically, CWPPs are agent-based tools that typically use a combination of tactics to secure cloud workloads, including network segmentation, system integrity protection, host-based intrusion prevention and detection, and anti-malware capabilities. Although they provide security at a workload level, CWPPs do not offer coverage at the data or application layer. When defending containers, CWPP tools exclude runtime security, a crucial component of advanced threat detection and response. Learn More about NDR for Cloud Threat Detection and Response Solutions HOW DOES NDR COMPARE TO CWPP? Network detection and response (NDR) tools take a network-based approach to securing cloud workloads, including containers. Every workload uses the network to communicate, making network data the ultimate source of truth for cloud-focused security analysts, incident responders, and forensic investigators. Although network-based tools have been used for on-premises security for years, in the past it was often difficult to gather network data in cloud environments. With the introduction of network taps from major cloud service providers (CSPs) as well as third-party packet brokers, much of the friction and complexity previously associated with NDR in the cloud has been removed. And, unlike log- and agent-based data, network data can't be turned off or modified. While NDR and CWPP share some capabilities, there are also major differences. CWPPs do a good job of securing compute instances and monitoring risk, and many support multiple IaaS providers and other cloud environments, but they are not built to monitor and analyze all network traffic flowing within your cloud environment. Additionally, NDR solutions offer decryption and runtime security, things most CWPP tools lack. Finally, NDR platforms can provide security at the data and application layers, a major differentiator between them and CWPP tools. NDR AND CWPP: BETTER TOGETHER Although NDR and CWPP can be viewed as competing security categories, they can also play well together. NDR products excel at visibility and threat detection inside the perimeter, which allows security teams to investigate and respond to advanced threats that make it past CWPP tools. NDR tools can also detect and alert on lateral movement and supply chain attacks that evade CWPP tools. This defense-in-depth strategy only makes cloud environments more secure. And with best-in-class NDR solutions, it's possible to combine on-premises and multicloud security together in the same user interface, enhancing advanced threat defense in hybrid environments. Learn How to Monitor Cloud Workloads with Cloud-Native NDR * Posted in Cloud, Tech, NDR, Cybersecurity, Industry Trends * See other posts by Dale Norris STOP BREACHES 84% FASTER Investigate a live attack in the full product demo of ExtraHop Reveal(x), network detection and response, to see how it accelerates workflows. Start Demo RELATED BLOGS 4.23.21 EXTRAHOP REVEAL(X) 360 EBOOK Download the Reveal(x) 360 Ebook to explore hybrid and cloud security use cases and view on-demand and list pricing for ExtraHop Reveal(x) 360. Dale Norris 3.23.22 ANNOUNCING LAYERED NETWORK INTELLIGENCE FOR AWS Reveal(x) 360 now offers a VPC Flow Logs subscription for continuous visibility in AWS environments. Choose flow logs as a standalone option or combine the cloud-native data source with packets for a multi-layered approach to cloud threat defense. Ryan Davis 3.1.22 COMMON THREATS TO CLOUD SECURITY Learn the most common threats to cloud security and get a primer on available cloud security solutions. Carol Caley SIGN UP TO STAY INFORMED Javascript is required to submit this form + ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More Global Headquarters 520 Pike St Suite 1600 Seattle, WA 98101 United States EMEA Headquarters WeWork 8 Devonshire Square London EC2M 4PL United Kingdom APAC Headquarters 3 Temasek Avenue Centennial Tower Level 18 Singapore 039190 PLATFORM * Reveal(x) 360 * How It Works * Competitive Comparison * Why Decryption Matters * Integrations and Automations * Cybersecurity Services * Complimentary Shields Up Assessment * AWS Cloud Security * What is Network Detection & Response (NDR)? * Reveal(x) Enterprise: Self-Managed NDR SOLUTIONS * Security * Cloud * IT Ops * Use Cases * Industries CUSTOMERS * Customer Portal Login * Services Overview * Training Overview * Support Overview PARTNERS * Channel Overview * Technology Integration Partners * Partner Program Information BLOG MORE * About Us * Contact Us * News & Events * Careers * Resources * Copyright ExtraHop Networks 2022 * Terms of Use * Privacy Policy * Facebook * Twitter * LinkedIn * Instagram * YouTube Close suggested results