2020-09-15T11:13:31Z

What do you like most about ExtraHop Reveal(x) 360?

Julia Miller - PeerSpot reviewer
  • 0
  • 2
PeerSpot user
3

3 Answers

Maksym Toporkov - PeerSpot reviewer
Real User
Top 5
2023-11-16T13:12:54Z
Nov 16, 2023

It stands out for its intuitive and efficient user interface, robust detection capabilities with minimal false positives, and the ability to handle encrypted traffic, making it a valuable asset for network security and management.

Search for a product comparison
SS
Real User
Top 5
2023-02-03T20:55:08Z
Feb 3, 2023

It is scalable.

BY
Reseller
2020-09-15T11:13:31Z
Sep 15, 2020

It is very easy to collect and handle data in ExtraHop Reveal(X) Cloud. Integration with Big Data is also easy. Many of our customers integrate it with Big Data platforms like Splunk or Elastic.

It is also easy to handle and easy to understand.

Find out what your peers are saying about ExtraHop Networks, Zscaler, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,386 professionals have used our research since 2012.
Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more