ExtraHop has introduced expanded Reveal(x) Advisor services that provide threat detection and hunting capabilities alongside network assurance analysis. Reveal(x) Advisor provides dedicated ExtraHop threat analysts and security advisors that deliver timely and precise analysis of priority detections, hunt the network for indicators of current or future compromise, and continually probe for vulnerabilities, such as outdated protocol use or shadow IT.
Security teams are overwhelmed by threat volume and staff shortages. They barely have time to respond to priority alerts, let alone think proactively about their cybersecurity hygiene strategy. The Ponemon Institute shared that 60% of organizations that had a breach found the root cause to be a known vulnerability with a patch available. Reveal(x) Advisor addresses these challenges by helping customers assess their cybersecurity maturity, clear their alert queues, and proactively hunt for threat activity across workloads.
The sophistication of attacks combined with fierce competition for security talent has convinced many organizations to turn to professional and managed services. Services like Reveal(x) Advisor from ExtraHop can help organizations increase their cybersecurity maturity, especially when combined with customizable network assurance and threat hunting, as well as proactive advisory services around security posture and approach," said Christina Richmond, Program Vice President for Security Services, IDC.
“Reveal(x) Advisor accelerates threat readiness and response through enhanced identification, protection, detection, and network preparation,” said Mark Bowling, VP of Security Services, ExtraHop. “It prevents network intrusions and compromises by working with the enterprise to take action before the first alert to provide threat-free network assurance. If there are indications of intrusion, Reveal(x) Advisor provides a near-immediate response based on network indicators.”
New services include:
• Network assurance: Proactive analysis and review of critical assets to identify known vulnerabilities, SSL hygiene, exposure risks, unauthorized devices, shadow applications, and anomalous network behaviors that could be exploited.
• On-demand expertise from Security Advisors: Custom working sessions with ExtraHop Security Advisors teach users to reduce attack surfaces, identify high-risk protocols, and optimize system efficiency while maturing cybersecurity posture.
• Proactive threat hunting: ExtraHop threat analysts, using the MITRE ATT&CK framework, search and explore the network, system alerts, and transmission data to identify malicious, suspicious, and at-risk actions that have, thus far, avoided detection.