ExtraHop IDS

Comprehensive Detection Coverage with
High-Fidelity Network Signatures

THE NEXT EVOLUTION OF
IDS

Intrusion detection systems (IDS) were popularized in the 1990s and continue to be a major part of PCI DSS and other compliance programs. Unfortunately, legacy IDS tools lack the visibility needed to keep up with today’s modern threats.

ExtraHop IDS is the next evolution of intrusion detection technology. Powered, high-risk CVE exploit identification, contextual threat hunting, and streamlined incident response with forensics capabilities, ExtraHop IDS analyzes both east-west and north-south traffic, performs out-of-band SSL/TLS decryption, and can better address compliance requirements set by PCI DSS, HIPAA, NIST, and more.

Deeper Detection Coverage

  • Real-time detections of known malware and exploits with tens of thousands of signatures.

  • High-fidelity detections curated by the ExtraHop Threat Research team.

  • Detect known threats in encrypted network traffic that target web servers and email.

STRENGTHENED RESPONSE

  • Enhanced response capabilities with integrated Reveal(x) workflows.

  • Advanced triage with integrated risk scoring, correlation, and investigation.

  • Native and turnkey integrations with CrowdStrike, Splunk, Palo Alto Networks, and other leading security providers.

EXCEED COMPLIANCE REQUIREMENTS

  • Deploy and manage IDS sensors from the same ExtraHop NDR console.

  • Automated cloud updates including sensor health and rule updates.

  • Stay ahead of security governance and compliance requirements from PCI DSS, NIST, and more.

Quote Icon

The real value in ExtraHop Reveal(x) is the time we see returned to our engineers so they can focus on the things that matter, like projects, strategic initiatives, and — most importantly — innovation.

DIANNE BROWN

CISO, ULTA BEAUTY

Reveal(x) with
IDS Adds Critical
Capabilities

ExtraHop IDS Legacy IDS
Critical CVE exploit detection
Protocol abuse
Static threshold rules
Application ID
Decryption -
Insider threat detection -
East-west visibility -

Automated Security Workflows

Standalone IDS stops at alerts, leaving time-strapped analysts searching for root cause with other investigation tools. NG-IDS accelerates incident responses with an optimized workflow that integrates detection, incident response, and network forensic evidence collection into a single tool.

Reveal(x) Workflow Powered with IDS

teal arrow with the title security hygiene written in black

Passive Asset Inventory

Discover Weak and Expired Cypher

teal arrow with the title detection written in black

Known Threats

Unknown Threats

teal arrow with the title incident response written in black

90 days of traffic lookback

Correlated attacker timeline

Threat briefings

teal arrow with the title forensics written in black

Continuous PCAP evidence repository

Legacy IDS

teal arrow with the title security hygiene written in black

-

gray arrow with the title detection written in black
Known Threats
gray arrow with the title incident response written in black

-

gray arrow with the title forensics written in black

-

Reveal(x) Workflow
Powered with IDS

Legacy IDS

Security Hygiene

Passive Asset Inventory

Discover Weak and Expired Cypher

-

Detection

Known Threats

Unknown Threats

Known Threats

Incident Response

90 days of traffic lookback

Correlated attacker timeline

Threat briefings

-

Forensics

Continuous PCAP evidence repository

-