Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

ExtraHop Recognized as a Leader in the Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics

February 2019 by Marc Jacob

ExtraHop, provider of enterprise cyber analytics from the inside out, announced it has been recognized by Gartner, Inc. in the Leaders quadrant of the "Magic Quadrant for Network Performance Monitoring and Diagnostics." After being recognized for the past two consecutive years in the report, ExtraHop is positioned in the Leaders quadrant in 2019.

“We have always viewed the network as a powerful source of data and visibility that goes beyond just network operations” said Arif Kareem, CEO, ExtraHop “With our advanced machine learning, industry-leading decryption capability, and unmatched analysis speeds, we’re putting the network to work to improve the performance of critical applications and to rapidly detect and investigate security threats. We believe our placement in the 2019 Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics recognizes our visionary leadership in the space."

As IT operations become central to every facet of enterprise operations and demand for security increases, network and security teams increasingly look for ways to align priorities and workflows to improve security posture without compromising performance. With ExtraHop, enterprise IT Ops and SecOps teams have the complete visibility, real-time detection, and guided investigation they need to improve application performance, protect their investments in the cloud, and proactively hunt security threats from core to edge to cloud. The company’s differentiated approach combines an analytics-first workflow with machine learning to surface insights and threats within the enterprise, helping networking, IT, and security teams optimize performance and minimize security risk.




See previous articles

    

See next articles