Download PDF version Contact company

ExtraHop, a pioneer in cloud-native network detection and response (NDR) announced that it is the first NDR provider to be showcased in World Wide Technology (WWT)’s Advanced Technology Center (ATC).

Zero Trust adoption

The billion-dollar centre of excellence will showcase the ExtraHop and CrowdStrike partnership, demonstrating the combined power of the two market pioneers' platforms, which together help to significantly improve organisations’ security postures and accelerate Zero Trust adoption across the cybersecurity industry.

Serving more than 70 Fortune 100 companies, WWT’s ATC is a collaborative ecosystem that enables customers to evaluate new technologies in sandbox environments and determine if they are a fit for their organisation.

Real-time solutions

By testing the ExtraHop and CrowdStrike integrations in the ATC, they can realise the advantages"

We’ve seen a growing demand for NDR solutions as organisations better understand the breadth of information they can garner from the network,” said Bob Olwig, EVP, of Global Partner Alliances, WWT.

As the attack landscape rapidly expands, customers are looking for ways to take their endpoint and log data to the next level. By testing the ExtraHop and CrowdStrike integrations in the ATC, they can put the power of these two real-time solutions to the test and realise the advantages network insights provide.” 

Visibility

The ExtraHop and CrowdStrike partnership helps organisations correlate network and endpoint data faster and with greater visibility into the threat landscape. The ExtraHop NDR platform, Reveal(x), reveals the path an attacker has taken while moving laterally across the network.

The CrowdStrike Falcon platform offers visibility and protection of endpoints with actionable insights into attacker activity within an environment. When implemented together, customers can confidently qualify or disqualify threats, and identify the scope of any compromise, which data has been transmitted, and if it was encrypted.

Applications 

Through WWT’s ATC, customers can explore the ExtraHop and CrowdStrike integrations in a private sandbox lab at scale and the level of quality global organisations require. 

Highlighted use cases include:

  • Unified Threat Intelligence: Correlate and contextualise indicators of compromise (IOCs) and security telemetry from the CrowdStrike Falcon platform with network details and behavioral insights from ExtraHop Reveal(x) 360™.
  • Push Button Response: Quickly cut off attacker access to network resources and endpoints. Trigger the CrowdStrike Falcon agent to quarantine threatened or compromised hosts with a single click inside the Reveal(x)™ interface.
  • Continuous Endpoint Visibility: Gain a comprehensive, always-up-to-date inventory of all devices with Reveal(x), which alerts customers to newly connected and potentially compromised devices.

Force multiplier

Our products empower organisations to focus on the threats and take on today’s adversaries"

Working with ExtraHop and WWT will bring our integration to life for prospective customers who are looking to create a force multiplier with their combined security investments,” said Michael Rogers, Vice President of Alliances, CrowdStrike.

Together, our products empower organisations to focus on the threats that truly matter, take on today’s sophisticated adversaries, and stop breaches.

Cybersecurity

WWT’s ATC and cybersecurity ecosystem offer ExtraHop a unique opportunity to engage with organisations looking to take their cybersecurity defences to the next level,” said Raja Mukerji, Co-Founder, and Chief Customer Officer, ExtraHop.

As more customers look to accelerate the adoption of strategies like Zero Trust, a private sandbox lab where they can see the power and impact of comprehensive visibility across the endpoint and network is an absolute requirement.

Download PDF version Download PDF version

In case you missed it

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

What are the benefits, and drawbacks, of AI in security?
What are the benefits, and drawbacks, of AI in security?

Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthrou...

ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety
ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety

Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is...