The focus of the solution has been more on interpreting the interrelationships or interactions between different components within the IT infrastructure. We're talking about that application portfolio and those interdependencies between different components of the network landscape.
ExtraHop is basically an NDR solution - Network Detection and Response. It's a cloud-based offering. If you want to look at real-time traffic to see what's happening in and out, in terms of malicious traffic throughout the network, you can reveal the suspicious activity using the ExtraHop NDR solution. It maps the complete network topology so it looks for devices and it builds a complete network, builds a path. It looks for the misconfiguration of the devices and so on. It gives you full 360-degree visibility into your entire infrastructure. For example, it can show you what components are residing, what vulnerabilities it has, and so forth.
Our primary use case is to seek out the root cause of problems that have been difficult to find. We use it for security anomaly monitoring, as well as performance monitoring.
Learn what your peers think about ExtraHop Reveal(x) for IT Operations. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
The ExtraHop Application Performance Management Solution Delivers Unified Visibility Across the IT Environment w/ Proactive Alerts & Accelerated Troubleshooting
The focus of the solution has been more on interpreting the interrelationships or interactions between different components within the IT infrastructure. We're talking about that application portfolio and those interdependencies between different components of the network landscape.
ExtraHop is basically an NDR solution - Network Detection and Response. It's a cloud-based offering. If you want to look at real-time traffic to see what's happening in and out, in terms of malicious traffic throughout the network, you can reveal the suspicious activity using the ExtraHop NDR solution. It maps the complete network topology so it looks for devices and it builds a complete network, builds a path. It looks for the misconfiguration of the devices and so on. It gives you full 360-degree visibility into your entire infrastructure. For example, it can show you what components are residing, what vulnerabilities it has, and so forth.
Our primary use case is network security.
Our primary use case is to seek out the root cause of problems that have been difficult to find. We use it for security anomaly monitoring, as well as performance monitoring.
We are using it for IT operations monitoring and it's great. From our point of view, it's a very good product.