Try our new research platform with insights from 80,000+ expert users
ExtraHop Reveal(x) 360 Logo

ExtraHop Reveal(x) 360 Reviews

4.3 out of 5

What is ExtraHop Reveal(x) 360?

Featured ExtraHop Reveal(x) 360 reviews

ExtraHop Reveal(x) 360 mindshare

As of September 2025, the mindshare of ExtraHop Reveal(x) 360 in the Intrusion Detection and Prevention Software (IDPS) category stands at 1.0%, up from 0.5% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Market Share Distribution
ProductMarket Share (%)
ExtraHop Reveal(x) 3601.0%
Darktrace18.0%
Vectra AI10.6%
Other70.4%
Intrusion Detection and Prevention Software (IDPS)
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Top industries

By visitors reading reviews
Financial Services Firm
9%
Computer Software Company
8%
Comms Service Provider
8%
Insurance Company
7%
Government
7%
Manufacturing Company
6%
University
6%
Healthcare Company
5%
Transportation Company
5%
Performing Arts
5%
Outsourcing Company
5%
Construction Company
4%
Energy/Utilities Company
4%
Educational Organization
4%
Retailer
3%
Media Company
3%
Recreational Facilities/Services Company
3%
Non Profit
3%
Wholesaler/Distributor
1%
Aerospace/Defense Firm
1%
Logistics Company
1%
Real Estate/Law Firm
1%
Legal Firm
1%
Individual & Family Service
1%
Agriculture
1%
 
ExtraHop Reveal(x) 360 Reviews Summary
Author infoRatingReview Summary
Head of Research And Development at Quipu GmbH4.5I was seeking enhanced network security visibility and found ExtraHop Reveal(x) 360 effective with its intuitive interface and robust detection capabilities. However, it needs improvement in payload analysis, as storage constraints hinder thorough investigations compared to competitors.
Business Development Manager at Westcon-Comstor4.0I primarily use ExtraHop Reveal(x) 360 for network detection and response, benefiting from its easy setup, scalability, and stability. It effectively detects unauthorized port connections with machine learning, though more protocol support would enhance its utility.
Works at jin networks4.0No summary available