ExtraHop RevealX

ExtraHop RevealX

ExtraHop Networks
+

Related Products

  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine OpManager
    1,628 Ratings
    Visit Website
  • Site24x7
    907 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    484 Ratings
    Visit Website
  • Auvik
    675 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • TelemetryTV
    275 Ratings
    Visit Website
  • Eldermark
    40 Ratings
    Visit Website
  • DataHub
    10 Ratings
    Visit Website

About

Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.

About

Fight advanced threats with a covert defense. ExtraHop eliminates blindspots and detects threats that other tools miss. ExtraHop gives you the perspective you need to understand your hybrid attack surface from the inside out. Our industry-leading network detection and response platform is purpose-built to help you rise above the noise of alerts, silos, and runaway technology so you can secure your future in the cloud.

About

In cybersecurity, speed is critical, and Intrusion helps you understand your environment’s biggest threats, fast. See the real-time list of all blocked connections, drill down on an individual connection to see more details like why it was blocked, risk level, etc. An interactive map shows you what countries your business is communicating with the most. Quickly see which devices have the most malicious connection attempts to prioritize remediation efforts. If an IP is trying to connect, you’ll see it. Intrusion monitors traffic bidirectionally in real time, giving you full visibility of every connection being made on your network. Stop guessing which connections are actual threats. Informed by decades of historical IP records and reputation in the global threat engine, it instantly identifies malicious or unknown connections in your network. Reduce cyber security team burnout and alert fatigue with autonomous real-time network monitoring and 24/7 protection.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Network evidence, investigation, triage, and hunting platform for everyone

Audience

IT departments

Audience

Enterprises looking for a solution for protecting their companies from digital threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Corelight
Founded: 2013
United States
www.corelight.com

Company Information

ExtraHop Networks
Founded: 2007
United States
www.extrahop.com

Company Information

Intrusion
United States
www.intrusion.com/products/on-premise-network-protection/

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security

Alternatives

Alternatives

NetworkMiner

NetworkMiner

Netresec
Arista NDR

Arista NDR

Arista
ExtraHop RevealX

ExtraHop RevealX

ExtraHop Networks
Zeek

Zeek

The Zeek Project
AdRem NetCrunch

AdRem NetCrunch

AdRem Software
GREYCORTEX Mendel

GREYCORTEX Mendel

GREYCORTEX

Categories

Categories

Categories

Application Performance Monitoring (APM) Features

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Database Monitoring Features

Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting

Network Monitoring Features

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting

Integrations

AWS Marketplace
Axonius
Azure Marketplace
CYREBRO
Chronicle
CrowdStrike Falcon
Cybraics
Devo
Elastic Cloud
Forcepoint Behavioral Analytics
GigaSECURE
Gigamon
Google Cloud Platform
Humio
Palo Alto Networks DNS Security Service
Proofpoint Emerging Threat (ET) Intelligence
Sumo Logic
appNovi
cPacket

Integrations

AWS Marketplace
Axonius
Azure Marketplace
CYREBRO
Chronicle
CrowdStrike Falcon
Cybraics
Devo
Elastic Cloud
Forcepoint Behavioral Analytics
GigaSECURE
Gigamon
Google Cloud Platform
Humio
Palo Alto Networks DNS Security Service
Proofpoint Emerging Threat (ET) Intelligence
Sumo Logic
appNovi
cPacket

Integrations

AWS Marketplace
Axonius
Azure Marketplace
CYREBRO
Chronicle
CrowdStrike Falcon
Cybraics
Devo
Elastic Cloud
Forcepoint Behavioral Analytics
GigaSECURE
Gigamon
Google Cloud Platform
Humio
Palo Alto Networks DNS Security Service
Proofpoint Emerging Threat (ET) Intelligence
Sumo Logic
appNovi
cPacket
Claim Corelight and update features and information
Claim Corelight and update features and information
Claim ExtraHop RevealX and update features and information
Claim ExtraHop RevealX and update features and information
Claim Intrusion and update features and information
Claim Intrusion and update features and information