ExtraHop 7.0 Released
September 19, 2017
Share this

ExtraHop announced the general availability of ExtraHop 7.0.

With this release, ExtraHop introduces live activity maps for complete 3D interaction with the hybrid IT environment; enhanced threat anomalies and machine learning-initiated workflows for performance and security; and perfect forward secrecy (PFS) decryption at scale to support next-generation security architectures.

With ExtraHop 7.0, organizations can accelerate remediation of performance and security issues by visually identifying and investigating anomalous behavior; answer audit and compliance questions via visual representations of device communications and dependencies; monitor PFS-encrypted traffic at scale so that organizations don't have to choose between security and visibility; and easily share relevant data and insights across multiple teams.

New features in ExtraHop 7.0 include:

- Live activity maps: With live activity maps, ExtraHop delivers a complete 360 degree visualization of the entire IT environment, from on-premises to the cloud. Moving beyond static block diagrams or simple network topology maps, live activity maps enables IT operations and security teams to accelerate investigations by exploring a visual map of all device and application communications, including real-time and historical views. Users can zero in on incidents and anomalies by filtering or excluding devices, and drill down into the transaction records with one click. Live activity maps also support business-critical initiatives like cloud migration, datacenter consolidation, and regulatory compliance.

- ExtraHop Decryption Suite: ExtraHop now extends SSL decryption capabilities to support PFS, the emerging standard for privacy and security encryption. With PFS decryption capability, security teams can implement best-in-class security and compliance measures without compromising critical visibility for network and IT operations teams.

- Addy security anomalies: ExtraHop Addy now automatically detects and alerts on more types of suspicious behavior, including network scans, data exfiltration, and unusual file server access.

- Anomaly-initiated workflows: ExtraHop Addy's machine learning detects and alerts on performance and security anomalies automatically, leveraging ExtraHop Open Data Stream technology to enable rapid incident response and remediation. With anomaly-initiated workflows, users can automate the response to alerts for specific events in ServiceNow, Cisco Tetration, and other third-party systems.

"IT underpins every aspect of operations, from the way employees accomplish work to the way customers interact with the organization," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With 7.0, we're empowering enterprise IT with the analytics, alerting, and automation required to manage performance at scale and address today's advanced threats. When IT can know everything about the environment, they can be fearless in accelerating and securing business transformation."

Share this

The Latest

June 25, 2020

I've had the opportunity to work with a number of organizations embarking on their AIOps journey. I always advise them to start by evaluating their needs and the possibilities AIOps can bring to them through five different levels of AIOps maturity. This is a strategic approach that allows enterprises to achieve complete automation for long-term success ...

June 24, 2020

Sumo Logic recently commissioned an independent market research study to understand the industry momentum behind continuous intelligence — and the necessity for digital organizations to embrace a cloud-native, real-time continuous intelligence platform to support the speed and agility of business for faster decision-making, optimizing security, driving new innovation and delivering world-class customer experiences. Some of the key findings include ...

June 23, 2020

When it comes to viruses, it's typically those of the computer/digital variety that IT is concerned about. But with the ongoing pandemic, IT operations teams are on the hook to maintain business functions in the midst of rapid and massive change. One of the biggest challenges for businesses is the shift to remote work at scale. Ensuring that they can continue to provide products and services — and satisfy their customers — against this backdrop is challenging for many ...

June 22, 2020

Teams tasked with developing and delivering software are under pressure to balance the business imperative for speed with high customer expectations for quality. In the course of trying to achieve this balance, engineering organizations rely on a variety of tools, techniques and processes. The 2020 State of Software Quality report provides a snapshot of the key challenges organizations encounter when it comes to delivering quality software at speed, as well as how they are approaching these hurdles. This blog introduces its key findings ...

June 18, 2020

For IT teams, run-the-business, commodity areas such as employee help desks, device support and communication platforms are regularly placed in the crosshairs for cost takeout, but these areas are also highly visible to employees. Organizations can improve employee satisfaction and business performance by building unified functions that are measured by employee experience rather than price. This approach will ultimately fund transformation, as well as increase productivity and innovation ...

June 17, 2020

In the agile DevOps framework, there is a vital piece missing; something that previous approaches to application development did well, but has since fallen by the wayside. That is, the post-delivery portion of the toolchain. Without continuous cloud optimization, the CI/CD toolchain still produces massive inefficiencies and overspend ...

June 16, 2020

The COVID-19 pandemic has exponentially accelerated digital transformation projects. To better understand where IT professionals are turning for help, we analyzed the online behaviors of IT decision-makers. Our research found an increase in demand for resources related to APM, microservices and dependence on cloud services ...

June 15, 2020

The rush to the public cloud has now slowed as organizations realized that it is not a "one size fits all" solution. The main issue is the lack of deep visibility into the performance of applications provided by the host. Our own research has recently revealed that 32% of public cloud resources are currently under-utilized, and without proper direction and guidance, this will remain the case ...

June 11, 2020

The global shift to working from home (WFH) enforced by COVID-19 stay-at-home orders has had a massive impact on everyone's working lives, not just in the way they remotely interact with their teams and IT systems, but also in how they spend their working days. With both governments and businesses committed to slowly opening up offices, it's increasingly clear that a high prevalence of remote work will continue throughout 2020 and beyond. This situation begets important questions ...

June 10, 2020
In recent years, with the emergence of newer technologies ranging from the cloud to machine learning, IT modernization has evolved from a replacement of end-of-life infrastructure to an enabler of innovation and business value. It is a complex process that can take months or even years, but a recent survey shows that the effort begins to deliver measurable results almost as soon as an organization executes the first steps on its roadmap ...