Save time resolving threats

Save time resolving threats

Share post

ExtraHop, the leading provider of cloud-based Network Detection and Response (NDR), today announced the results of the study "The Total Economic Impact Of ExtraHop Reveal(x) 360". The study, conducted by Forrester Consulting and commissioned by ExtraHop, shows that ExtraHop customers surveyed benefit from an 87 percent reduction in the time to remediation of threats.

At the same time, they benefit from savings of more than $590.000 in threat detection and remediation in three years and a three-year return on investment (ROI) of 193%. According to the study, ExtraHop offers measurable benefits for organizations, including faster threat detection and remediation, faster response to unplanned outages, reduced downtime due to outages, and significant savings by eliminating legacy security solutions. Forrester's analysis of benefits concluded that "Reveal(x)360 reduced time to detect threats by 83% and time to remediation by 87%."

results of the study

  • Improved time to detection, Threat Resolution and Remediation: Reveal(x)360 reduces time to detect threats by 83% and time to remediation by 87%.
  • Faster response to unplanned outages: After implementing Reveal(x) 360, unexpected outages decrease by 66%, the time it takes to resolve unplanned outages decreases by 92%, and the number of IT professionals dedicated to investigating an outage , decreases by 50%.
  • Lower costs for existing security solutions: After improving network visibility with Reveal(x) 360, organizations are able to decommission existing security solutions that they no longer need. Eliminating legacy security solutions saved almost $373.000.
  • Improved communication: Customers interviewed for the study reported that Reveal(x) 360 improved alignment and collaboration between IT and security teams.
  • Reduced risk of security breaches: Reveal(x) 360 has helped strengthen the security of customer environments, preventing potentially costly security breaches.

For this study, Forrester interviewed ExtraHop Reveal(x) 360 customers across four industries and aggregated their experiences into an overall picture. Prior to deploying Reveal(x) 360, customers deployed a combination of firewalls, endpoint detection and response (EDR) products, security information and event management (SIEM) solutions, and packet capture tools. “We did a comparison and ExtraHop outperformed all the others. They had the scale capabilities we needed and the alert accuracy, granularity and AI analytics capabilities we wanted,” said a technical director for cybersecurity operations in the communications industry interviewed for the study. "With Reveal(x) 360 we get a complete view of our entire network environment and can make the right decisions when it comes to identifying and removing malicious traffic."

In a crowded cybersecurity market, ExtraHop customers report a "significant improvement in the visibility of their network environment" to gain "instant insight into their network status across all environments," according to the study, allowing them "to detect security threats much more quickly," according to the study and respond to it." “Because we have more insight, we have a better understanding of what is happening and what we can do. The Reveal(x) 360 platform has changed our mindset from reactive to proactive,” said a director of cybersecurity at a financial services company interviewed for the study.

More at ExtraHop.com

 


About ExtraHop

ExtraHop is dedicated to helping businesses with security that cannot be undermined, outwitted or compromised. The dynamic cyber defense platform Reveal (x) 360 helps companies to identify complex threats and react to them - before they put the company at risk. We apply cloud-scale AI to petabytes of traffic per day and conduct line rate decryption and behavioral analysis for all infrastructures, workloads and data on the fly. With the complete transparency of ExtraHop, companies can quickly identify malicious behavior, hunt down advanced threats and reliably forensic investigate every incident.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more