The updated version of Reveal(x) 360 applies AI to layers of network telemetry to detect and stop threats including double-extortion ransomware and software supply chain attacks, according to the company.
Reveal(x) 360's native integration with Amazon VPC traffic mirroring has been extended to VPC flow logs and additional protocol analysis,.
VPC flow logs provide a broad cloud security data, but according to ExtraHop using them for real-time analysis has been challenging, and required multiple products and user interfaces.
ExtraHop Reveal(x) 360 now combines real-time analysis of flow logs, packets, and protocols, with a unified interface.
|
Other benefits include real-time visualisation of threat hotspots across workloads so security teams can investigate any incident down to root cause, agentless deployment and broad coverage to assist SecOps and DevOps teams, and lower total cost of ownership.
"We live in an era of large attack surfaces and frequent business compromise. Organisations need to assume that attackers are actively operating inside their cloud environment, moving laterally and evading traditional security controls," said ExtraHop co-founder and CTO Jesse Rothstein.
"ExtraHop Reveal(x) 360 was purpose-built to covertly and reliably detect malicious behaviour. With the introduction of a new subscription tier for AWS, we're expanding our high-fidelity detection, threat hunting, and investigation capabilities in cloud environments without adding friction for dev teams or the organisations that need to innovate with speed and agility."