FEBRUARY 2014
Hi!

Welcome to our redesigned newsletter!

This month, we offer up the results of Network World's APM "shootout," in which ExtraHop trounced the competition. We also consider the implications of Target's massive data breach, including lessons-learned for IT, an example of how ExtraHop detects malware, and an interesting analysis of 47,000 security incidents from Verizon.

– The ExtraHop Team

P.S. Email us at newsletter@extrahop.com to let us know what you love (or hate) about vendor newsletters. Our aim is to offer useful news and insight for ExtraHop users and the IT Operations community.

Network World APM "Shootout"

Network World tested ExtraHop and APM products from BMC, Dell Foglight, Fluke Visual, and BlueStripe. The comparison demonstrated the difference between the ExtraHop wire data analytics platform and traditional APM products.

Read the full blog post.  

Lessons from Target's Data Breach: Watch All Activity on the Wire

For 19 days during the 2013 holiday season, Target fell victim to data thieves who made away with account details on more than 70 million customers even though industry analysts say that Target had adequate security defenses and complied with PCI standards. For IT teams, this unfortunate incident underscores the need to assume you've already been hacked. Read the blog posts below to learn more.

What IT Can Learn from Target's Data Breach  

Detecting Malware Such as BlackPOS  

A Web Services Wonderland: Why Nobody Analyzes HTTP Like ExtraHop

HTTP

Many monitoring vendors claim to analyze HTTP, but the web services that are built on top of HTTP are nearly always blind spots for these tools. In this blog post, ExtraHop Sales Engineering Director Matt Cauthorn provides a brief technical overview of HTTP, lists some critical HTTP-based web services protocols, and then explains why only ExtraHop offers the flexibility to analyze any web services protocol.

Read the full blog post.  

Verizon’s RISK Team: Timeline of a Data Breach

What happens after a hacker gets a foot in the door? The 2013 Data Breach Investigations Report from Verizon analyzed more than 47,000 security incidents to find out. The report shows that once hackers are able to compromise perimeter defenses, they often spend months silently exfiltrating data before they are discovered. Moreover, most data breaches are reported by outside parties, such as customers and fraud-detection entities.

Download the full report for free here.  

Try ExtraHop FREE Download Now

EVENTS

February 23-27
HiMSS Conference

February 26
SplunkLive! Philadelphia

March 31 - April 4
Interop Las Vegas

EXTRAHOP
IN THE NEWS

Network World - Top Tools for Solving App Performance Woes

FROM OUR BLOG

Seahawks Get a Geeky Salute with ExtraHop's "Binary 12th Man"

Why I Joined ExtraHop — One Wire Data Experts Story

Lean and Mean: Our Open-Source Enhancements to RPCAP

Monitoring at Scale: Questions You Should Ask Your Vendor

RESOURCES

Video Demo:
Splunk Precision-Logging with ExtraHop

Blog Post:
Four Data Sources for IT Operations Analytics

White Paper:
ExtraHop Overview — How It Works and Real-World Results

UNTIL NEXT TIME

We hope you enjoyed this issue of the ExtraHop newsletter. Consider forwarding it to your colleagues!

Get a free ExtraHop virtual appliance capable of monitoring 1,000+ devices at 1Gbps speeds. Request your ExtraHop Discovery Edition.