ExtraHop
Edit

ExtraHop

https://www.extrahop.com/
Last activity: 20.12.2024
Active
Categories: AnalyticsArtificial IntelligenceBusinessCloudCybersecurityDefenseFinTechITPlatformSecurity
ExtraHop is on a mission to stop advanced threats with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats––before they compromise your business. We apply cloud-scale AI to petabytes of traffic per day, performing line-rate decryption and behavioral analysis across all infrastructure, workloads, and data-in-flight. With complete visibility from ExtraHop, organizations can detect malicious behavior, hunt advanced threats, and forensically investigate incidents with confidence. When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised.
Likes
1.69K
Website visits
206.4K /mo.
Mentions
105
Employees: 501-1000
Phone: +1 877-333-9872
Total raised: $310.1M
Founded date: 2007

Investors 4

Funding Rounds 5

DateSeriesAmountInvestors
09.01.2024-$100M-
14.01.2020IPO$150M-
29.05.2014Series C$41MTCV
02.05.2011Series B$14M-
14.04.2009Series A$5.1M-

Mentions in press and media 105

DateTitleDescription
20.12.2024Operational tech under attack, deepfake phishing and learning to use passkeys -- cybersecurity predictions for 2025With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to predict what might happen, but that doesn't stop us trying. Here are what some industry experts think the ...
17.12.2024AI's impact on cybersecurity: challenges & strategiesThe cybersecurity landscape is set to undergo significant changes in 2025, as experts predict the impact of artificial intelligence (AI) will bring both opportunities and challenges. Industry leaders have shared insights into the evolving r...
29.11.2024Africa's Cybersecurity Crisis: A Call to ArmsAfrica stands at a crossroads. The continent is rapidly digitalizing, yet it finds itself under siege from cybercriminals. The latest report from Check Point Software Technologies reveals a stark reality: African organizations face cyberatt...
29.11.2024The Double-Edged Sword of AI in CybersecurityArtificial Intelligence (AI) is a double-edged sword. It can be a powerful ally in cybersecurity, but it also poses significant threats. As we approach 2025, the landscape of cybersecurity is shifting. Experts warn that while AI can enhance...
28.11.2024Balancing AI advances with cybersecurity risks & cautionAs artificial intelligence (AI) continues to make strides, industry leaders express both optimism and caution regarding its integration into the cybersecurity landscape. The potential benefits are significant, yet the risks are equally prof...
28.11.2024AI in enterprise shifts focus to practical applicationsAs 2025 approaches, the landscape of AI in the enterprise is undergoing significant shifts, with a focus on practical applications rather than the grand disruptions once anticipated. Norman Rice, Chief Commercial Officer at Extreme Networks...
28.11.2024AI's dual role in future cybersecurity: threat & allyAs the world moves towards 2025, experts from various sectors have put forward projections concerning the role of artificial intelligence (AI) in cybersecurity and beyond. These insights, shared by professionals across industries, herald si...
08.11.2024Navigating the Future of Network Operations Observability and RAG: A Dual PerspectiveIn the fast-paced world of IT, clarity is gold. Two recent reports shine a light on critical trends: the EMA Radar Report on Network Operations Observability (NOO) and the complexities of Retrieval-Augmented Generation (RAG). Both concepts ...
06.11.2024EMA Radar Report Evaluates 14 Leading Vendors of Network Operations Observability (NOO) SolutionsEMA Network Operations Observability (NOO) Radar Report EMA crafted a comprehensive 24-page questionnaire, gathering responses on hundreds of critical data points. These insights were used to evaluate and score each vendor across multiple k...
08.10.2024Visibility is vital for detecting ransomware attacksRansomware attacks, once considered a nuisance, have evolved into a sophisticated and lucrative cyberthreat. As noted by ExtraHop's Global Ransomware Trends Report, industries around the world are falling victim to these attacks, and the pr...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In