Story image

Gartner names ExtraHop leader in network performance monitoring

14 Feb 2019

Enterprise cyber analytics provider ExtraHop has announced it has been recognised by Gartner in the Leaders quadrant of the Magic Quadrant for Network Performance Monitoring and Diagnostics (NPMD).

“We have always viewed the network as a powerful source of data and visibility that goes beyond just network operations,” says ExtraHop CEO Arif Kareem.

“With our machine learning, decryption capability, and analysis speeds, we're putting the network to work to improve the performance of applications and to detect and investigate security threats.

“We believe our placement in the 2019 Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics recognises our leadership in the space."

As IT operations become central to every facet of enterprise operations and demand for security increases, network and security teams increasingly look for ways to align priorities and workflows to improve security posture without compromising performance.

With ExtraHop, enterprise IT Ops and SecOps teams have the visibility, real-time detection, and guided investigation they need to improve application performance, protect their investments in the cloud, and proactively hunt security threats from core to edge to cloud.

The company's differentiated approach combines an analytics-first workflow with machine learning to surface insights and threats within the enterprise, helping networking, IT, and security teams optimise performance and minimise security risk.

The report found that ExtraHop provided network-derived intelligence data that caters to groups outside network operations, including business owners.

Another strength it identified was that the company has shown commitment in advancing the use of artificial intelligence for IT operations techniques in common NPMD workflows, which is a differentiator, compared with similar NPMD vendors.

End users of the product rated ExtraHop favourably for ease of installation and upgrading, and reported spending less on implementation services (as a percentage of total NPMD spending) than for other NPMD vendors.

In terms of areas to be cautious, the report found that data centre traffic growth, along with cloud migration and virtualisation, will place additional burdens on buyers of ExtraHop to ensure that relevant packet data is accessible for analysis.

Furthermore, Gartner found that ExtraHop’s focus on both security and performance buyers may hinder its ability to keep pace with NPMD market shifts.

Finally, it pointed out that ExtraHop’s inability to capture infrastructure metrics and its relatively weak flow-monitoring capabilities may force buyers to procure additional NPMD or IT infrastructure monitoring solutions for holistic network monitoring.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.