Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

A New Take on Cloud Shared Responsibility

This SANS white paper will help you navigate cloud infrastructure nuances and strengthen your security posture. Learn the key components of a cloud-based detection and response model and understand the strengths and limitations of on-premises tools when applied to the cloud.? Download this ExtraHop-sponsored white paper to learn more.

Dark Reading Report: The State of IT Operations & Cybersecurity Operations

This new study from Dark Reading finds that while these two groups are getting better at collaborating, several key roadblocks continue to undermine their success. Ready to understand what those roadblocks are and how to overcome them?

Gartner: 2020 Hype Cycle for Security Operations

As organizations continue to adopt new IT—from mobile, cloud services, operational technology (OT), and the Internet of Things (IoT)—it’s clear that no single security technology provides complete protection, prevention, or visibility. Risk management leaders must make intelligent, business-driven decisions about which operations technologies they choose.

IDC Market Share: How the Network Is Used to Unmask the Adversary

The market for network intelligence threat analytics (NITA) is growing rapidly—it’s up 18.9% in 2019. As IDC’s Research Director for Security Products Chris Kissel indicates, the common denominator of tools and features NITA tracks to closely align with network detection and response (NDR).

Lessons Learned Investigating the SUNBURST Software Supply Chain Attack

In the wake of the SolarWinds attack, organizations worked around the clock to understand the full extent of the damage. As security teams went back through historical records, it became clear that most logs were limited or incomplete, which created an issue for narrowing the timeline.

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

Cybercrime tactics are becoming increasingly sophisticated, creating an urgent need for adaptable detection and defense plans. This whitepaper explores how security operations teams can implement the MITRE ATT&CK framework to help them defend against security threats.?

SANS Institute Survey: The State of Cloud Security

They found that, as most organizations are pursuing multi-cloud and hybrid environments, they’re also shifting away from a perimeter-based security approach. Learn what this means for cybersecurity toolsets and how new technology such as cloud-native network detection and response (NDR) enables a change of strategy. Download this ExtraHop-sponsored white paper to learn more.

SANS Review: Analyzing Malicious Behavior Effectively

Read the product review to find out what SANS says about Reveal(x), its ability to detect today’s advanced threats, and how it helps modern security teams solve common challenges.

You may already have advanced threats inside your cloud environment today. Here’s what you can do about it.

Join experts from ExtraHop The Duckbill Group for this webinar, where you’ll learn how network detection response (NDR) enables you to adopt a detect-and-respond posture for securing against advanced attacks in the cloud. They’ll discuss how NDR products provide the internal visibility, real-time detection, and intelligent response capabilities you need to stop attackers before they accomplish their goals.