ExtraHop extends Reveal(x) 360 for AWS

Network detection and response specialist ExtraHop has extended Reveal(x) 360 to provide greater threat visibility for Amazon Web Services.

The updated version of Reveal(x) 360 applies AI to the telemetry layers of the network to detect and stop threats, including double extortion ransomware and software supply chain attacks, according to the company.

Reveal(x) 360’s native integration with Amazon VPC traffic mirroring has been extended to VPC flow logs and additional protocol analysis.

VPC Flow Logs provide a wide range of cloud security data, but according to ExtraHop, using them for real-time analysis has been difficult and required multiple products and user interfaces.

ExtraHop Reveal(x) 360 now combines real-time flow log, packet, and protocol analysis with a unified interface.

Other benefits include real-time visualization of threat hotspots across workloads so security teams can investigate any incident to the root cause, agentless deployment, and broad coverage to help SecOps and DevOps teams, and reduce total cost of ownership.

“We live in an age of large attack surfaces and frequent business compromises. Organizations should assume that attackers are actively operating in their cloud environment, moving laterally and bypassing traditional security controls,” said Jesse Rothstein, co-founder and CTO of ExtraHop.

“ExtraHop Reveal(x) 360 has been specifically designed to quietly and reliably detect malicious behavior. With the introduction of a new subscription tier for AWS, we are expanding our capabilities for high-fidelity detection, threat hunting and investigation in cloud environments without adding friction for development teams or organizations that need to innovate with speed and agility.”


The last year has seen a meteoric rise in ransomware incidents around the world.

Over the past 12 months, threat researchers at SonicWall Capture Labs have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available through the SonicWall Cyber ​​Threat Report 2022, which ensures that SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the growing wave of cybercrime.

Click the button below to get the report.



It’s all about webinars.

Marketing budgets are now focused on webinars combined with lead generation.

If you want to promote a webinar, we recommend at least a 3-4 week campaign before your event.

The iTWire campaign will include numerous advertisements on our news site itwire.com and a major newsletter promotion https://itwire.com/itwire-update.html and promotional and editorial news. Plus a keynote speaker video interview on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in promotional messages on the iTWire homepage.

Now that we are coming out of Lockdown, iTWire will focus on supporting your webinars and campaigns and providing support through partial payments and extended terms, a Webinar Business Booster pack and other support programs. We can also create your advertisements and written content and coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Previous An assessment” – Middle East Monitor
Next MIL Recognized with Maryland ESGR Freedom Award