MAY 2014
Hi!

The Heartbleed bug was a nightmare scenario for IT. But after the scramble to patch servers and reissue certificates, what can IT learn from this episode? This month, we offer three stories to answer that question, including how Bri Hatch, IT Director at ExtraHop, used our product to conclusively verify that no Heartbleed attempts had occurred prior to patching our servers.

We’ll be at Citrix Synergy, Microsoft TechEd, and Cisco Live in May. If you attend any of these shows, stop by and pick up a For Whom the SYN ACKs poster!

– The ExtraHop Team

We Eat Our Own Dog Food, and It's Delicious

When the Heartbleed bug was announced on April 7, the first thing ExtraHop’s IT department did was patch its servers. The next thing they did was conduct an audit of every SSL transaction for the previous two years, searching for Heartbleed activity using the ExtraHop platform.

Read the post from Bri Hatch, ExtraHop IT Director  

DevOps' Hearts Race While CISO Looks for Heartbleed

Field Engineer Vihar Chokshi wows a CISO by showing him how easily the ExtraHop platform detects Heartbleed attempts. Meanwhile, his DevOps team sits on edge as he kicks off a multi-day network scan of their entire environment.

Listen in on Vihar's conversation with the CISO   

ExtraHop’s Free-Forever Discovery Edition Detects Heartbleed

Interested in trying out ExtraHop for yourself? With either the full version or Discovery Edition, you can see all SSL transactions by content type and sender/recipient, including the heartbeat messages used in the Heartbleed exploit.

Watch the video or read the blog post to learn more, and then download the Discovery Edition virtual appliance.

Target's Data Breach: What IT Pros on LinkedIn Had to Say

After the Target data breach last November, we posted an update to our LinkedIn page, asking “What’s the lesson from Target’s data breach?” We received 52 responses from IT professionals and summarized them in a blog post.

Read the best responses from the LinkedIn community.   

Experts: Heartbleed Will Affect Security for Years

The priority in fixing Heartbleed vulnerabilities is public-facing web properties, but the bug will plague enterprise IT groups for years because of unpatched internal devices, according to security experts interviewed by InformationWeek’s DarkReading.com.

You should be worried about FTP over SSL, VPN servers and clients, legacy systems, VOIP phones, and even printers. Our take: All the more reason to analyze SSL transactions, including heartbeat messages, using ExtraHop. If it’s on the wire, we’ll see it.

Read the full article.   

Try ExtraHop FREE Download Now

EVENTS

May 6-8
Citrix Synergy

May 7
SplunkLive! Washington DC

May 12-15
Microsoft TechEd

May 15
SplunkLive! New York

May 18-22
Cisco Live!

May 20
SplunkLive! Seattle

May 21
SplunkLive! London

May 22
SplunkLive! Phoenix

June 9-11
Gartner IOM Conference

FROM OUR BLOG

How Our IT Team Performed a Heartbleed Audit Going Back Years

Tears of Joy: Fixing Retail Web Application Performance

How Retailers Can Protect Themselves from POS Malware

Monitoring at Scale: Questions You Should Ask Your Vendor

RESOURCES

Whitepaper:
ExtraHop Overview and How It Works

Whitepaper:
Enabling Real-Time Healthcare Systems

Ovum Analyst Report:
ExtraHop Platform v3.10

UNTIL NEXT TIME

We hope you enjoyed this issue of the ExtraHop newsletter. Consider forwarding it to your colleagues!

Get a free ExtraHop virtual appliance capable of monitoring 1,000+ devices at 1Gbps speeds. Request your ExtraHop Discovery Edition.