ExtraHop Introduces New Packet Capture Method
November 08, 2012
Share this

ExtraHop Networks announced a new policy-based, precision packet-capture method.

With the new solution, IT operations teams can identify root causes of errors and suspicious activity much faster with a concise and relevant packet capture of the exact offending application flow, while avoiding the storage requirements, complex identification, and high costs that characterize legacy packet capture techniques.

“Packet capture is a tried-and-true method of analyzing the root cause of network and application issues,” said Will Cappelli, Gartner Research Vice President. “However, traditional packet-capture tools are simply too cumbersome and expensive to handle the growing volume and speed of datacenter networks. For packet capture to remain a viable solution for IT operations, performance monitoring vendors need to enable a new, different approach that is more precise and intelligent.”

The ExtraHop method of policy-based, precision packet capture is unique and made possible by the full-stream reassembly and high-speed, real-time processing of the ExtraHop system.

With ExtraHop, IT Operations teams can surgically capture the right packets at the right time:

- Passive, real-time approach. The ExtraHop system passively processes application and network traffic in real-time, performing full-stream reassembly for millions of flows.

- Customizable for every environment with AI Triggers. Using Application Inspection Triggers (AI Triggers) technology, IT teams can set a policy for anomalous or suspicious events they would like to capture.

- Surgical precision for accurate analysis. When an event such as an application error, a malformed request, or suspicious file access occurs, ExtraHop automatically records the packets for the application and network flow that preceded and caused that event.

- Instant replay to save money and time. For the first time, IT operations teams have an exact replay of what caused a particular error or slowdown immediately after an event, saving considerable money and time.

“Finding a problem in a small packet capture is hard. Finding a problem in a large packet capture is like looking for a snowflake in an avalanche,” said Jesse Rothstein, ExtraHop CEO. “Using Application Inspection Triggers and precision packet capture, IT teams can detect an event and go back in time to record just the packets that are of interest. Much like the flux capacitor, our packet buffer is what makes time travel possible, enabling ExtraHop to provide the operational intelligence that IT teams need to drive down costs, increase productivity, and keep services running smoothly."

Share this

The Latest

August 29, 2024

The consequences of outages have become a pressing issue as the largest IT outage in history continues to rock the world with severe ramifications ... According to the Catchpoint Internet Resilience Report, these types of disruptions, internet outages in particular, can have severe financial and reputational impacts and enterprises should strongly consider their resilience ...

August 28, 2024

Everyday AI and digital employee experience (DEX) are projected to reach mainstream adoption in less than two years according to the Gartner, Inc. Hype Cycle for Digital Workplace Applications, 2024 ...

August 27, 2024

When an IT issue is not handled correctly, not only is innovation stifled, but stakeholder trust can also be impacted (such as when there's an IT outage or slowdowns in performance). When you add new technology investments and innovations into the mix, you have a recipe for disaster ...

August 26, 2024

To get a better understanding of the top issues facing IT teams in financial services, Auvik recently released its 2024 Financial Services IT Trends Report ... Not surprisingly, the experience of FinServ IT teams is significantly impacted by the onslaught of cyberattacks facing financial services organizations as well as the complex regulatory environment of this industry ...

August 22, 2024

The CrowdStrike outage serves as a potent illustration of the risks associated with complex security environments. Enterprises are increasingly advised to consider simpler, more robust solutions that do not rely heavily on reactive security measures ...

August 21, 2024

When IT leaders started telling Enterprise Management Associates (EMA™) more than a year ago that their personnel were using premium ChatGPT subscriptions to create device configs and automation scripts, we knew the industry was on the verge of a revolution ...

August 20, 2024

The rapid rise of creative "right-brain" generative AI (GenAI) has opened the door to greater adoption of the more analytical "left-brain" AI decisioning solutions by global businesses, according to new research from Pegasystems ...

August 19, 2024

The majority of executives (61%) are harnessing the power of generative AI, with at least one application in production, and among these early adopters, 86% of those reported an increase in revenue, estimated at more than 6%, according to new global research from Google Cloud ...

August 15, 2024

Optimizing the performance of applications remains a top challenge for most organizations, particularly when those applications are spread across a hybrid IT estate that includes core, public cloud, and edge. Even if there were a magic performance wand, organizations would still need to know there was a problem and then do something about it — at Internet speed ...

August 14, 2024

According to Forrester's The Top 10 Emerging Technologies In 2024 report, generative AI (genAI) for visual content, genAI for language, TuringBots, and IoT security are the top emerging technologies that will deliver the most immediate ROI for businesses in 2024 and beyond ...