ExtraHop Introduces Layer of Cloud Threat Defense

ExtraHop, a leader in cloud-native network detection and response, announced it has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS). ExtraHop Reveal(x) 360 applies advanced AI to layers of network telemetry to create a “threat heatmap” purpose-built to detect and stop advanced attacks like double-extortion ransomware and software supply chain attacks.

Armed with this threat visibility, security teams can zero in on, investigate and remediate hotspots of malicious activity without requiring developer time or resources or slowing down business innovation.

Cloud security teams are outnumbered and the traditional approach of prevent-and-protect can’t keep pace with modern advanced attack techniques. According to the IBM-Ponemon Institute 2021 Cost of a Data Breach report, the cost of public cloud breaches far exceeds that of breaches in hybrid environments, costing, on average, $1.19 million more per incident.

Organizations with high levels of cloud migration in general experienced costlier breaches, with the average cost of a breach for cloud-mature organizations hovering at more than $5 million, compared to $3.46 million for organizations with low levels of cloud adoption.

As developers deploy assets at a breakneck pace and adversaries continue to evolve their attacks on mission-critical applications and workloads, enterprises need a low friction, high fidelity approach to defend against advanced post-compromise activities.

ExtraHop has been at the forefront of stopping modern cloud attacks through the use of network telemetry. By natively integrating with Amazon VPC Traffic Mirroring, the company pioneered a SaaS offering that delivered cloud threat detection without agents. This new offering expands this power to include VPC Flow Logs and additional protocol analysis, providing both depth and breadth of visibility for threats in AWS.

VPC Flow Logs are popular for cloud security because of the broad coverage they provide, including in areas of the cloud where capturing packets can be difficult. While flow logs are an excellent data source for monitoring and analyzing network traffic, most organizations do not leverage them for real-time analysis, limiting their efficacy.

Moreover, gaining access to multiple data sources has required using multiple products and user interfaces, which creates friction due to complexity and tool sprawl. ExtraHop Reveal(x) 360 eliminates these challenges, combining real-time analysis of flow logs, packets, and protocols in a unified interface providing long-overdue threat defense for cloud environments.

Contact your ExtraHop sales representative or channel partner for more information, or visit its website.