ExtraHop
Adds Application-Level Visibility to Cisco Tetration
Adds Application-Level Visibility to Cisco Tetration
New
Integration Brings ExtraHop Real-Time Network Traffic Analytics to Cisco
Tetration Analytics to Rapidly Detect Advanced Security Threats Like Ransomware
Integration Brings ExtraHop Real-Time Network Traffic Analytics to Cisco
Tetration Analytics to Rapidly Detect Advanced Security Threats Like Ransomware
Singapore – June 27, 2017 – Today
at CiscoLive, ExtraHop announced it has completed integration efforts with
Cisco Tetration AnalyticsTM, adding essential
threat detection and security policy enforcement from the datacentre to the
cloud to the edge.
at CiscoLive, ExtraHop announced it has completed integration efforts with
Cisco Tetration AnalyticsTM, adding essential
threat detection and security policy enforcement from the datacentre to the
cloud to the edge.
Through this integration, ExtraHop and Cisco
customers can now realise the benefits of network traffic analysis for
security. By combining industry-leading behavioural analytics, machine
learning, and application layer visibility, Cisco and ExtraHop now deliver the
industry’s most targeted, accurate, and rapid security policy enforcement,
helping customers thwart major threats. Cisco and ExtraHop will demo the new
integration during CiscoLive, June 25-29, 2017 in Las Vegas. Visit ExtraHop Booth 329 or the Cisco Solutions showcase to learn more.
customers can now realise the benefits of network traffic analysis for
security. By combining industry-leading behavioural analytics, machine
learning, and application layer visibility, Cisco and ExtraHop now deliver the
industry’s most targeted, accurate, and rapid security policy enforcement,
helping customers thwart major threats. Cisco and ExtraHop will demo the new
integration during CiscoLive, June 25-29, 2017 in Las Vegas. Visit ExtraHop Booth 329 or the Cisco Solutions showcase to learn more.
Cisco Tetration provides security policy
enforcement for zero-trust implementations, detecting anomalous network
behavior and automatically triggering enforcement policies. ExtraHop adds a new
layer of valuable context through real-time application-level visibility,
revealing the specific activity behind abnormal traffic patterns. This
integration delivers both powerful insight, as well as the ability to detect
incidents including:
enforcement for zero-trust implementations, detecting anomalous network
behavior and automatically triggering enforcement policies. ExtraHop adds a new
layer of valuable context through real-time application-level visibility,
revealing the specific activity behind abnormal traffic patterns. This
integration delivers both powerful insight, as well as the ability to detect
incidents including:
- Brute
Force Logins: With this new ExtraHop integration, Tetration users can now detect
a spike in database traffic and determine whether the traffic spike is due
to brute-force login attempts, along with the specific - tables
that are being queried. ExtraHop applies Tetration annotations to identify
the clients and servers involved. Tetration then executes security
policies to isolate at-risk clients and servers. - Ransomware: Tetration customers can now
detect Ransomware attacks in real-time with the ExtraHop platform’s deep
analysis of CIFS traffic and then take action to stop it. When ExtraHop
detects a Ransomware attack, Tetration annotations are applied to identify
the compromised hosts, which are then instantly quarantined with the
application of security policies. - Certificate
and Cipher Audits: ExtraHop audits the network to identify rogue
and expired certificates and weak ciphers, and applies Tetration
annotations to identify affected servers so that users can take remedial
action.
“The powerful combination of Cisco Tetration and
ExtraHop provides customers with a high degree of network security and
manageability,” said Raja Mukerji, co-founder and Chief Customer Officer
at ExtraHop. “IT and security operations teams now have the visibility they
need to understand the who, the what, and the where, and automatically enforce
crucial security policies based on that real-time insight.”
ExtraHop provides customers with a high degree of network security and
manageability,” said Raja Mukerji, co-founder and Chief Customer Officer
at ExtraHop. “IT and security operations teams now have the visibility they
need to understand the who, the what, and the where, and automatically enforce
crucial security policies based on that real-time insight.”
To learn more about the power of ExtraHop and
Cisco, visit our technology partner page: https://www.extrahop.com/company/tech-partners/cisco-systems/.
Cisco, visit our technology partner page: https://www.extrahop.com/company/tech-partners/cisco-systems/.
About ExtraHop
ExtraHop makes data-driven IT a reality.
By applying real-time analytics and machine learning to all digital
interactions, ExtraHop delivers instant and unbiased insights. IT leaders turn
to ExtraHop first to help them make faster, better-informed decisions that
improve security, performance, and digital experience. Just ask the hundreds of global ExtraHop customers,
including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience
the power of ExtraHop, explore our interactive online
demo. Connect with us on Twitter, LinkedIn, and Facebook.
By applying real-time analytics and machine learning to all digital
interactions, ExtraHop delivers instant and unbiased insights. IT leaders turn
to ExtraHop first to help them make faster, better-informed decisions that
improve security, performance, and digital experience. Just ask the hundreds of global ExtraHop customers,
including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience
the power of ExtraHop, explore our interactive online
demo. Connect with us on Twitter, LinkedIn, and Facebook.
All product and company names herein may be trademarks of their
registered owners.
registered owners.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!