SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

ExtraHop unveils Reveal(x) 360 for unified threat detection and centralised control across remote sites, the Cloud and IoT deployments

20 May 2020

ExtraHop unveils Reveal(x) 360 for unified threat detection and centralised control across remote sites, the Cloud and IoT deployments
Contact company
Contact ExtraHop Networks Inc
icon Add as a preferred source Download PDF version

ExtraHop, the globally renowned provider of cloud-native network detection and response solutions, has announced the general availability of Reveal(x) 360, the first SaaS-based network detection and response (NDR) solution.

Reveal(x) 360 NDR solution provides on-demand, unified visibility across multi-cloud and hybrid workloads, as well as distributed workforces and operations.

Reveal(x) 360 SaaS-based NDR

With ExtraHop Reveal(x) 360, security operations teams can harness the power of the cloud to improve security posture without compromising availability or core business objectives.

Organisations around the world have experienced massive disruption as workforces rapidly transitioned to remote work and operations shifted off-premises. While the first phase of this shift focused primarily on making critical assets available to employees, the next phase will focus on how to enable that model long term and at scale.

Cloud and IoT digital transformation

Cloud, with its unlimited scale, OpEx pricing model, and global availability is suited for a distributed workforce

At the centre of that transformation are the Cloud and IoT. Cloud, with its unlimited scale, OpEx pricing model, and global availability zones, is ideally suited to enabling a distributed workforce.

At the same time, the need to support IoT has already increased exponentially as security and IT Ops teams contend with a plethora of employee devices accessing network resources.

Frictionless security

With Reveal(x) 360, ExtraHop combines the power of network data with the scale and speed of the Cloud to provide frictionless security from the data center to the Cloud to the user and device edge.

It is cloud-delivered, cloud-agnostic, and provides cloud intelligence for continuous protection across the entire attack surface.

Fully-integrated workflow

A fully-integrated workflow enables SecOps teams to manage detection, investigation, and response at scale and align to the demands of the business, even as IT and business realities continue to evolve.

  • Cloud-Native Consumption Model - Reveal(x) 360 provides on-demand consumption, enabling customers to manage peak periods like Cyber Monday, fall course registration, and insurance enrollment periods without getting locked into annual contracts. On-demand consumption for index record search is available immediately, with additional on-demand purchasing options available in July.
  • Centralised Management and Threat Visibility - A unified management pane provides complete visibility and control across multi-cloud workloads, data centers, remote sites, and users and devices all in one place. With centralised visibility, security teams can confidently detect, investigate, and respond to threats across the entire attack surface without switching between multiple point solutions trying to piece together the path of an attack.
  • AI-Powered Threat Detection - Real-time intelligence and behavioral analysis derived from petabytes of anonymised threat telemetry collected daily makes Reveal(x) 360 cloud-based machine learning uniquely reliable, all without impacting sensor performance. Cloud-scale ML provides more than 1 million predictive models for a typical enterprise deployment to identify suspicious behaviors and potential threats.
  • Real-Time Investigation - A cloud-based record store provides fully hosted and managed search capability for streamlined incident investigation with index record search and query of data from every segment of the hybrid environment.
  • Continuous Intelligence - Reveal(x) 360 automatically updates detectors, threat intelligence feeds, and IoT profiles via the cloud, eliminating the need for manual intervention to ensure that policies or software on sensors are up to date.

Securing data centres, remote sites & cloud workloads

Over the past months, remote work, digital interactions, and online services have accelerated at an unprecedented rate"

“Over the past several months, remote work, digital interactions, and online services have accelerated at an unprecedented rate,” said Jesse Rothstein, ExtraHop Co-Founder and CTO.

Jesse adds, “And there is an increasing need to address significant gaps that have been exposed around both security and availability. Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centers, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”

Reveal(x) 360 for multi-cloud and hybrid cloud environments is now available on AWS Marketplace. Flexible pricing plans include reserved instance and on-demand pricing options to align with individual customer budget requirements.

Customer reviews

“When you’re looking at investing in the rhythm of your business, there’s no other company that aligns to supporting the DevOps model—the speed, the lack of friction, than ExtraHop,” said Dan McDaniel, Chief Architect and Information Security Officer at Wizards of the Coast.

“Before ExtraHop, we had limited visibility into what was going on in the cloud, but with Reveal(x), we can quickly identify vulnerabilities and exploits and understand how our applications are performing in the cloud,” said John Kreis, Senior IT Engineer at Ulta Beauty.

Enhanced application, infrastructure security

ExtraHop makes it easy to monitor our environment and secure it, from remote desktops to cloud workloads"

“With ExtraHop, we’re able to monitor not only bandwidth and resources, but the security of our applications and infrastructure. With more and more of our workloads in the cloud, and now, with so many of our people working remotely, the level of visibility we get from ExtraHop in a single tool is just unmatched,” said a Senior Network Security Engineer for a large retail chain.

“ExtraHop makes it straightforward to monitor our environment and secure it, from remote desktops to cloud workloads,” said a Senior Manager for Security and Infrastructure at a West Coast healthcare provider firm.

Partner review

“Now that the dust has settled a bit since the initial transition to remote work, many of our customers are now looking to the future, thinking about how to support this forced transformation long term,” said Jonathan Wharton-Street, Head of Government and Education Sales, SBL.

He concludes, “Making sure you have a handle on every user and device accessing network resources is going to be critical to that. Reveal(x) 360 provides continuous visibility across every device and workload so that you never have to worry about what you don’t see.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Physical security
  • Remote security
  • Security management
  • Security access systems
  • Electronic access control
  • Hybrid security
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Related links
  • Standalone / Networked Access control systems & kits
  • Centrally managed access solution Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec