ExtraHop 7.0 Released
September 19, 2017
Share this

ExtraHop announced the general availability of ExtraHop 7.0.

With this release, ExtraHop introduces live activity maps for complete 3D interaction with the hybrid IT environment; enhanced threat anomalies and machine learning-initiated workflows for performance and security; and perfect forward secrecy (PFS) decryption at scale to support next-generation security architectures.

With ExtraHop 7.0, organizations can accelerate remediation of performance and security issues by visually identifying and investigating anomalous behavior; answer audit and compliance questions via visual representations of device communications and dependencies; monitor PFS-encrypted traffic at scale so that organizations don't have to choose between security and visibility; and easily share relevant data and insights across multiple teams.

New features in ExtraHop 7.0 include:

- Live activity maps: With live activity maps, ExtraHop delivers a complete 360 degree visualization of the entire IT environment, from on-premises to the cloud. Moving beyond static block diagrams or simple network topology maps, live activity maps enables IT operations and security teams to accelerate investigations by exploring a visual map of all device and application communications, including real-time and historical views. Users can zero in on incidents and anomalies by filtering or excluding devices, and drill down into the transaction records with one click. Live activity maps also support business-critical initiatives like cloud migration, datacenter consolidation, and regulatory compliance.

- ExtraHop Decryption Suite: ExtraHop now extends SSL decryption capabilities to support PFS, the emerging standard for privacy and security encryption. With PFS decryption capability, security teams can implement best-in-class security and compliance measures without compromising critical visibility for network and IT operations teams.

- Addy security anomalies: ExtraHop Addy now automatically detects and alerts on more types of suspicious behavior, including network scans, data exfiltration, and unusual file server access.

- Anomaly-initiated workflows: ExtraHop Addy's machine learning detects and alerts on performance and security anomalies automatically, leveraging ExtraHop Open Data Stream technology to enable rapid incident response and remediation. With anomaly-initiated workflows, users can automate the response to alerts for specific events in ServiceNow, Cisco Tetration, and other third-party systems.

"IT underpins every aspect of operations, from the way employees accomplish work to the way customers interact with the organization," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With 7.0, we're empowering enterprise IT with the analytics, alerting, and automation required to manage performance at scale and address today's advanced threats. When IT can know everything about the environment, they can be fearless in accelerating and securing business transformation."

Share this

The Latest

September 19, 2019

You must dive into various aspects or themes of services so that you can gauge authentic user experience. There are usually five main themes that the customer thinks of when experiencing a service ...

September 18, 2019

Service desks teams use internally focused performance-based metrics more than many might think. These metrics are essential and remain relevant, but they do not provide any insight into the user experience. To gain actual insight into user satisfaction, you need to change your metrics. The question becomes: How do I efficiently change my metrics? Then, how do you best go about it? ...

September 17, 2019

The skills gap is a very real issue impacting today's IT professionals. In preparation for IT Pro Day 2019, celebrated on September 17, 2019, SolarWinds explored this skills gap by surveying technology professionals around the world to understand their needs and how organizations are addressing these needs ...

September 16, 2019

Top performing organizations (TPOs) in managing IT Operations are experiencing significant operational and business benefits such as 5.9x shorter average Mean Time to Resolution (MTTR) per incident as compared to all other organizations, according to a new market study from Digital Enterprise Journal ...

September 12, 2019

Multichannel marketers report that mobile-friendly websites have emerged as a dominant engagement channel for their brands, according to Gartner. However, Gartner research has found that too many organizations build their mobile websites without accurate knowledge about, or regard for, their customer's mobile preferences ...

September 11, 2019

Do you get excited when you discover a new service from one of the top three public clouds or a new public cloud provider? I do. But every time you feel excited about new cloud offerings, you should also feel a twinge of fear. Because in the tech world, each time we introduce something new we also add a new point of failure for our application and potentially a service we are stuck with. This is why thinking about the long-tail cloud for your organization is important ...

September 10, 2019

A solid start to migration can be approached three ways — all of which are ladder up to adopting a Software Intelligence strategy ...

September 09, 2019

Many aren't doing the due diligence needed to properly assess and facilitate a move of applications to the cloud. This is according to the recent 2019 Cloud Migration Report which revealed half of IT leaders at banks, insurance and telecommunications companies do not conduct adequate risk assessments prior to moving apps over to the cloud. Essentially, they are going in blind and expecting everything to turn out ok. Spoiler alert: It doesn't ...

September 05, 2019

Research conducted by Aite Group uncovered more than 80 global eCommerce sites that were actively being compromised by Magecart groups, according to a new report, In Plain Sight II: On the Trail of Magecart ...

September 04, 2019

In this blog, I'd like to expand beyond the TAP and look at the role Packet Brokers play in an organization's visibility architecture. Here are 5 common mistakes that are made when deploying Packet Brokers, and how to avoid them ...