WebMar 18, 2024 · ExtraHop Networks has an overall rating of 3.5 out of 5, based on over 161 reviews left anonymously by employees. 58% of employees would recommend working at ExtraHop Networks to a friend and 61% have a positive outlook for the business. This rating has decreased by -14% over the last 12 months. WebJohn Matthews works as a Chief Information Officer at ExtraHop Networks, which is a Security Software company with an estimated 700 employees; and founded in 2007. They are part of the IT Operations team within the Information Technology Department and their management level is C-Level. John is currently based in Seattle, United States.
Greg Weimer (82 matches): Phone Number, Email, Address (2)
WebExtraHop sells products for Enterprise Security and IT Operations use cases. The company launched the Reveal(x) network intelligence product for Security Operations teams in … WebAug 30, 2024 · ExtraHop is the cybersecurity partner enterprises trust to reveal the unknown and unmask the truth. The company’s Reveal(x) 360 platform is the only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth. When organizations have full network transparency with ExtraHop, they see … the economist competition and innovation
ExtraHop Networks - Wikipedia
WebJun 8, 2024 · ExtraHop had raised $61.6 million to date and its last cash infusion was a $41 million Series C round led by Technology Crossover Ventures, which later exited its investment. Jesse Rothstein and Raja Mukerji founded ExtraHop in 2007 in Seattle, Washington, USA. The co-founders were formerly senior engineers at F5 Networks and architects of the BIG-IP v9 product. Early on, ExtraHop acquired $6.6 million in funding from the Madrona Venture Group and other private investors including Marc Andreessen and Ben Horowitz. In May 2014, the company closed a $41 million Series C round led by Technology Crossover Ventures (TCV). Other participants in … WebApr 10, 2024 · The ExtraHop system provides a comprehensive network detection and response solution for security threats and IT operations. You can monitor how services and devices interact with each other and how transactions flow across the data link layer (L2) to the application layer (L7) in your network. You can also perform threat hunting to look for ... the economist desk diary