0% found this document useful (0 votes)
76 views20 pages

ExtraHop Revealx Point

ExtraHop Reveal(x) provides advanced network detection and response capabilities through machine learning and real-time analytics, offering complete visibility into network traffic and assets. It enables streamlined threat hunting and incident response with features like SSL/TLS decryption and extensive behavioral metrics. The platform integrates with existing enterprise tools to enhance security operations and improve response times.

Uploaded by

Andi Dwi Wahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views20 pages

ExtraHop Revealx Point

ExtraHop Reveal(x) provides advanced network detection and response capabilities through machine learning and real-time analytics, offering complete visibility into network traffic and assets. It enables streamlined threat hunting and incident response with features like SSL/TLS decryption and extensive behavioral metrics. The platform integrates with existing enterprise tools to enhance security operations and improve response times.

Uploaded by

Andi Dwi Wahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Reveal(x) BLUE CHIP CUSTOMERS

Network Detection and Response


Applying Machine Learning for
Network Behavioral Detection

INDUSTRY ACCOLADES
NETWORK TRAFFIC ANALYSIS
COMPLETE EAST-WEST VISIBILITY
COMPLETE VISIBILITY
Continuous auto-discovery and classification of assets
Line-rate decryption of SSL/TLS 1.3 encrypted traffic
Full L2-L7 payload analysis of wire data for complete context
Petabytes of analysis per day at line rate (up to 100 Gbps) Traffic
25%
REAL-TIME DETECTION 75%
Full-spectrum detection via advanced ML, rules, and custom models
4,700+ metrics for precise and contextual behavioral analysis
Complete transaction-level detail
Real-time analytics provide high-fidelity alerts with few false positives

G U I D E D I N V E S T I G AT I O N
Streamlined, guided workflows help any user hunt threats like an
expert
1-click investigation: detection to transaction to packet in seconds
Corroborative evidence via live activity maps & global search
Integration with enterprise tools and policies to automate response
How ExtraHop Reveal(x) Detects Threats

The Source for Real-Time Analytics

WIRE DATA
• Instant
• Empirical and Definitive
• Complete Context

Wire data — radically rethought and used in new ways — ...will prove to be the most GARTNER RESEARCH NOTE

critical source of data for availability and performance management over the next five *Source: Gartner, "Use Data- and Analytics-Centric Processes With a Focus
on Wire Data to Future-Proof Availability and Performance Management,"
years.* Vivek Bhalla and Will Cappelli, March 10, 2016
Good Detections & Incident Response Start with Visibility

Incident Response
Forensic Investigation / Threat Hunting

Real-Time Detection
ML-based Behavioural, Rule/Signatures, Threat Intel

Security Hygiene
CVEs, Expired Certs, Self-Signed Cert, Weak Cipher

Visibility
Scalability (up to 100 Gbps) Protocol Fluency
SSL/TLS Decryption Critical Asset Classification
Visibility At Scale
Fluent in the Technologies That Run Your Business

https://assets.extrahop.com/datasheets/ExtraHop-Protocol-Modules-Datasheet.pdf
Network Visibility
Flow vs DPI vs Full Stream Reassembly of Wire Data
Network Detection & Response for Enterprise
What Sets ExtraHop Apart Why It Matters
Distributed Architecture at Scale No gaps or compromises in coverage,
Petabytes of data analyzed each day from edge to core to cloud

Real-time Decryption See threats hiding within encrypted traffic—up to


Decrypt SSL/TLS-encrypted traffic 70% of datacenter communications

4600+ Metrics More robust data for ML


Application-fluent in 50 enterprise protocols models and more accurate detections

Critical Asset Lens


Accurate monitoring, prioritized focus
Dynamic and continuous

Investigation and Automation Superior SOC analyst productivity


Supports enterprise IR runbooks and faster time to resolution

Integration and Customization Operationalizes with existing tools and


Open APIs and a programmable parsing engine unique requirements
COMPLETES THE SOC VISIBILITY TRIAD

• Combine network, agent and log data


NDR for complete visibility

• Achieve holistic security approach


The Cyber Triad
• Eliminate risk of undetected attacks
and lateral movements
SIEM EDR
TOOL CONSOLIDATION
SecOps Tools & NetOps Tools
Network
Performance
Monitoring and Network Detection
Diagnostics and Response
Network Change (NPMD) Network
and Configuration (NDR) Forensics
Network Management Tools NAC
Configuration Firewall Policy
Automation Rule Management

SHARED
NetOps TOOLS SecOps
Tools SHARED Tools
INSTRUMENTATION

Source: Align NetOps and


SecOps Tool Objectives
With Shared Use Cases, Device Network Application
Gartner, July 2018
Discovery Packets Protocols
TOOL CONSOLIDATION
SecOps Tools & NetOps Tools
SECURITY OPERATION TOOLS
Asset Inventory
Inv Comprehensive inventory of all assets including unmanaged and IoT
https://www.youtube.com/watch?v=2KBF0EKcEXM

Lateral Movement
Lm Detect post-compromise reconnaissance and lateral movement to stop the threat before the breach
https://www.youtube.com/watch?v=dP3TKi6iSP0

Monitor Sensitive Data


Msd Detect unauthorized movement of sensitive data
https://www.youtube.com/watch?v=tNQcAdx5mRY

Threat Detection and Response


Tdr By combining rule- and behavior-based analytics, your SOC can identify real threats, faster
https://www.extrahop.com/company/blog/2020/threat-investigation-speed-run-revealx/

Intelligent Response
InR Detect unusual behavior and activity across the hybrid network
https://www.extrahop.com/use-cases/security/alert-response/
Threat Hunting
TH Streamlined Threat Hunting with rich transaction data for all analyst levels
https://www.extrahop.com/use-cases/security/threat-hunting/
SECURITY OPERATION TOOLS
Remote Access
Ra Secure remote access and troubleshoot VPN connecting and performance problems
https://www.youtube.com/channel/UCUFjHkLX0NYMx3YLoGuFx6w

Secure Decryption
Sd Out of band decryption of SSL/TLS 1.3 is needed to detect malicious behavior hiding within encrypted traffic
https://www.extrahop.com/company/blog/2018/five-reasons-secops-needs-decryption/

Behavior Analytics
Bhv https://www.extrahop.com/resources/webinars/analyzing-malicious-behavior/

Incident Response
Ir Incident response when you have 72 hours to disclose a breach under GDPR.
https://www.extrahop.com/company/blog/2019/how-to-do-incident-response-with-72-hours-to-disclose/

Forensic Investigation
Fsl Search for network evidence to identify, collect and analyze indicators of compromise
https://www.extrahop.com/company/blog/2021/sunburst-origin-story/
Advanced Persistent Threat
Apt Advanced, stealthy attackers should be fought where they are: on the inside
https://www.extrahop.com/company/blog/2020/detect-and-stop-lateral-movement/
NETWORK OPERATION TOOLS
Triage and Troubleshooting
Tt Quickly resolve performance issues
https://www.extrahop.com/use-cases/it-ops/resolve-performance-issues/#three-questions

Remote Working
Rm Support distributed workforces
https://www.extrahop.com/use-cases/it-ops/support-distributed-workforce/

NetSecOps
Ns Eliminate silos between NetOps and SecOps to improve incident response and productivity
https://www.extrahop.com/use-cases/it-ops/netops-secops-collaboration/

Cloud Operations
Cd Migrating workloads to the cloud is risky without understanding all the dependencies
https://www.extrahop.com/use-cases/it-ops/scale-to-cloud/

Application Performance Monitoring


Apm Eliminate blind spots in your app delivery chain & ensure high quality user experience without agents / logs
https://www.extrahop.com/solutions/app-analytics/
Network Hygiene and Compliance
Hyg Cons monitoring, operational awareness & automated audits gives you immediate answers to proactively
maintain hygiene and compliance at massive scale
NETWORK OPERATION TOOLS
User Experience Monitoring
Ex Improve user experience with end-to-end visibility and solve porblems before your users feel the pain.
https://www.extrahop.com/solutions/app-analytics/customer-experience-monitoring/

Remote Site Monitoring


Rsm Improve branch office and remote site visibility to proactively identify and fix issues.
https://www.extrahop.com/solutions/network/remote-site-visibility/

Remote Access Monitoring


Rma Maintain uptime and monitor resource usage to keep remote workforces productive.
https://www.extrahop.com/solutions/network/remote-access/

VPN Monitoring
Vpn Monitor traffic and performance for remote VPN users to detect unexpected or bad behaviors.
https://www.extrahop.com/customers/community/bundles/extrahop/wfh-vpn-bundle/

SSH Monitoring
Ssh Monitor Secure Shell (SSH) connections to keep users productive and prevent suspicous activity.
https://www.extrahop.com/company/blog/2020/security-in-the-wake-of-remote-access/
Infrastructure Monitoring
Inf Gain visibility into the critical systems, servers, and applications that make up business impacting experiences.
https://www.extrahop.com/use-cases/it-ops/resolve-performance-issues/
DEPLOY IN ANY ENVIRONMENT
Complete Visibility
Less Very
Granular Granular

DISCOVER (EDA) EXPLORE (EXA) TRACE (ETA)


Time-Series Metadata Transactional Metadata Raw Original Packets
Retention: Months and Years Retention: Days and Weeks Retention: Hours and Days
Operationalized ExtraHop Deployment:
Leveraging Existing Investments, Strengthening Overall Security Posture
ExtraHop Community
Bundles/Extensions

Firewall / IDS / NAC Vulnerability Scanner EDR/AV


Unstructured Wire Data
(direct or via SOAR solution)

Threat Feed / IOCs Detections, Triggered Records, etc.


3rd Party Threat ExtraHop Platform SIEM
Intelligence Feeds

Case Management
Machine Learning Real-Time Detection Dashboards Incident Ticketing System
Response & Reports CMDB
Threat Hunting
PROPOSAL DEPLOYMENT TOPOLOGY

Discover VM (EDA-1100v) - 1 node


• 1 Gbps Real-Time Traffic Analysis
• Up to 250 Critical Assets, up to 750 Endpoints
• 50+ Protocol Modules & Decryption (SSL and PFS)
• Real-Time Anomaly Detection
• 2 x 1 GbE Base-T SPAN Port, 1 x 1 GbE Base-T
Management & Access Port

Explorer VM (EXA-S) – 1 node


• Vmware EXS or ESXi 5.5 or later
• 8 vCPUs, 16 GB RAM, 8 GB Book Disk
• 500 GB datastore disk
Question .

You might also like