Hi [[ session.user.profile.firstName ]]

ExtraHop

  • Date
  • Rating
  • Views
  • Integrating Network Analytics Into Your Security Architecture
    Integrating Network Analytics Into Your Security Architecture Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks Recorded: Aug 2 2017 59 mins
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
  • The Network:  Cerebro for the Growing IT Enterprise
    The Network: Cerebro for the Growing IT Enterprise Chris Abella and Eric Thomas, ExtraHop Recorded: Jul 26 2017 38 mins
    IT environments are becoming larger and more complex through organic growth as well as acquisition. Accompanying initiatives—like datacenter migrations, for example—are expensive. Done well, these moves cost $1,200 to $6,000 per server. But when things go wrong? A poorly optimized load balancer could mean downtime for critical application servers – a price that could skyrocket to more than $25,000 per server.

    What if IT teams could be guided through the process? What if they had a way to map the plan and troubleshoot issues before they became outages?

    In this webinar, we'll share a story from an ExtraHop customer who underwent a large datacenter migration after it acquired a new business. Not only did their IT team undergo a successful migration, they also decreased troubleshooting time and cost to the company by 85 percent – freeing them to move beyond reactive firefighting to proactive solution building for the business.

    Join us to learn how they did it.
  • End the IT Blame Game
    End the IT Blame Game Moderator: Isaac Roybal, Presenter: Matt Cauthorn Recorded: Jul 26 2017 61 mins
    Network engineers and system administrators can spend a great deal of time responding to user complaints and troubleshooting slow performance issues that are difficult to diagnose or replicate. Resolving those issues can be especially problematic if those applications are provided by a third-party vendor or hosted by third parties, such as SaaS EMR applications, claims processing applications, and practice management applications. Often, IT teams do not have enough visibility to determine root causes or to counter claims from third-party vendors and managed service providers that host applications. With real-time insight into end-user experience for these hosted applications, including application-level transaction details, IT teams can hold vendors accountable and identify root causes faster.

    Learn how ExtraHop helps you identify the root cause of your IT problems, avoiding unnecessary friction among your IT teams and ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
  • Protect Your Hospital, Protect Your Patients
    Protect Your Hospital, Protect Your Patients Isaac Roybal, Systems Engineering Manager and Tom Roeh, Systems Engineering Manager Recorded: Jun 15 2017 58 mins
    As May's WannaCry attacks made devastatingly clear, ransomware isn't going anywhere—and focusing on intrusion prevention and detection won't keep your network safe. Once an attacker makes it around your defenses and into your system, they linger for 200 days on average, representing a serious threat to sensitive data, brand reputation and most importantly patient safety. While many healthcare organizations have invested heavily in monitoring north-south traffic, they have limited visibility for east-west traffic. Many security tools also rely on known malware signatures, making it all too easy for an attacker to slip past defenses with a new strain of ransomware.

    Learn how ExtraHop helps you identify ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
  • Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning
    Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning ExtraHop Team Recorded: May 23 2017 55 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and software-defined networks will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight, on-prem and in the cloud.

    Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • WannaCry Aftermath: Lessons Learned and What to Expect Next
    WannaCry Aftermath: Lessons Learned and What to Expect Next Tom Roeh, Systems Engineering Manager, Jeff Costlow, Director of Security, ExtraHop Networks Recorded: May 19 2017 49 mins
    What happens when cybercriminals get hold of exploits developed at the NSA? We found out earlier this month with the WannaCry ransomware attack, which quickly spread within organizations around the globe. In this webinar, we will discuss the weaknesses in existing IT defenses that WannaCry exposed, what the attack portends for the rest of 2017, and—most importantly—what IT organizations can do to defend themselves against increasingly potent threats.
  • Machine Learning in the Cloud: The Future of Real-Time Data Detection
    Machine Learning in the Cloud: The Future of Real-Time Data Detection Paul Sanford, Product Management, Isaac Roybal, Product Marketing, ExtraHop Networks, David Johnson, Systems, Washington St. Recorded: Mar 8 2017 51 mins
    There is so much happening in your IT environment that it can be overwhelming. What if you had a partner that never slept, remained vigilant, and identified real problems? The first machine learning service in the cloud for wire data is here, and it works nonstop so you don't have to.

    Join us for a live webinar with our customer David Johnson, Enterprise Systems Specialist for the State of Washington, for an overview of how this machine learning takes advantage of Wire Data's real-time insight to surface the most important information and reduce alert fatigue. Always on and always learning, the cloud-based Addy service keeps watch for anomalous behavior and highlights only the problems that require your attention.


    Presenters:

    Paul Sanford - Sr Director of Product Management - ExtraHop Networks
    Isaac Roybal - Dir of Product Marketing - ExtraHop Networks
    David Johnson - Enterprise Systems Specialist - State of Washington
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture
    Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit, Product Marketing Manager, Kanen Clement,Senior Systems Engineer, ExtraHop Networks Recorded: Feb 16 2017 20 mins
    ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today introduced a new version of its award-winning ransomware mitigation offering that, for the first time, allows enterprises to recover ransomware-encrypted files without a backup. The ransomware offering incorporates the ExtraHop platform's proprietary Precision Packet Capture capability, allowing companies to detect ransomware attacks in-progress and recover lost files in minutes, creating an end-to-end solution that puts control back in the hands of the enterprise.

    In this Webinar Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • Solving IoT & BYOD Challenges: The Answers are in your Network
    Solving IoT & BYOD Challenges: The Answers are in your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Jan 18 2017 20 mins
    Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare
    IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner Recorded: Jan 12 2017 49 mins
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.

Embed in website or blog