JANUARY 2014
Hi!

Happy New Year!

In case you missed it, Target was recently the victim to the second-largest data breach in retail history. Our first newsletter of 2014 offers some important lessons-learned for IT regarding this massive data breach, as well as an interesting analysis of 47,000 security incidents from Verizon. In our Performance Metric of the Month, we take a close look at the many web services protocols that run on top of HTTP.

The ExtraHop Team

P.S. — We’re looking to revamp our newsletter. Email us at newsletter@extrahop.com to let us know what you love (or hate) about vendor newsletters. Our aim is to offer useful news and insight for ExtraHop users and the IT Operations community.

What IT Can Learn from the Target Data Breach

For 19 days during the 2013 holiday season, Target fell victim to data thieves who made away with credit and debit card account details on 40 million customers even though industry analysts say that Target had adequate security defenses and complied with PCI standards. For IT teams, this unfortunate incident underscores the need to assume you’ve already been hacked. In our blog, we describe how one major retailer with a dose of healthy paranoia used ExtraHop to identify and stop data exfiltration.

Read more on our blog.  

A Web Services Wonderland: Why Nobody Analyzes HTTP Like ExtraHop

HTTP

Many monitoring vendors claim to analyze HTTP, but the web services that are built on top of HTTP are nearly always blind spots for these tools. In this blog post, ExtraHop Sales Engineering Director Matt Cauthorn provides a brief technical overview of HTTP, lists some critical HTTP-based web services protocols, and then explains why only ExtraHop offers the flexibility to analyze any web services protocol.

Read the full blog post.  

Verizon’s RISK Team: Timeline of a Data Breach

What happens after a hacker gets a foot in the door? The 2013 Data Breach Investigations Report from Verizon analyzed more than 47,000 security incidents to find out. The report shows that once hackers are able to compromise perimeter defenses, they often spend months silently exfiltrating data before they are discovered. Moreover, most data breaches are reported by outside parties, such as customers and fraud-detection entities.

Download the full report for free here.  

Try ExtraHop FREE Download Now

EVENTS

February 23-27
HiMSS Conference
February 26
SplunkLive! Philadelphia

EXTRAHOP
IN THE NEWS

High Profile IT Projects Will See Explosive Demand for Visibility in 2014

Trouble Seeing What AWS Workloads Are Doing? ExtraHop Wants to Help

RESOURCES

Video Demo:
Splunk Precision-Logging with ExtraHop

Blog Post:
Four Data Sources for IT Operations Analytics

White Paper:
ExtraHop Overview — How It Works and Real-World Results

UNTIL NEXT TIME

We hope you enjoyed this issue of the ExtraHop newsletter. Consider forwarding it to your colleagues!

Get a free ExtraHop virtual appliance capable of monitoring 1,000+ devices at 1Gbps speeds. Request your ExtraHop Discovery Edition.