ExtraHop Reveal(x) vs GoSecure Network Detection and Response comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ExtraHop Reveal(x) and GoSecure Network Detection and Response based on real PeerSpot user reviews.

Find out what your peers are saying about Darktrace, Vectra AI, Cisco and others in Network Detection and Response (NDR).
To learn more, read our detailed Network Detection and Response (NDR) Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "I would rate the price a three out of five. It could be less expensive."
  • "I rate ExtraHop Reveal(x) six out of 10 for affordability. We pay for an annual license. It's always one of those trade-offs. You get a lot of value, but ExtraHop isn't exorbitantly priced. You can pay extra for additional features like the ability to decode HL7 traffic, which is crucial for EMR environments."
  • "The solution is based on an annual subscription model and is expensive."
  • "I rate the price of ExtraHop Reveal(x) a seven on a scale of one to ten, where one is a high price, and ten is a low price."
  • More ExtraHop Reveal(x) Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We just did an assessment for our 47 datacenters around North America. The top two enterprise-level network monitoring solutions were ExtraHop first, Riverbed SteelCenter second. Their negotiated cost… more »
    Top Answer:One I am looking closely at is AppNeta. They have an appliance that can digest the flow and do a better job than Netflow The other one we are using is ExtraHop.  This has both a Datacenter… more »
    Top Answer:With ExtraHop Reveal(x), it gives me more visibility into the packets. It doesn't provide the entire packet capture, but it offers more information on how connections are made at the network layer… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    2,974
    Comparisons
    2,166
    Reviews
    9
    Average Words per Review
    543
    Rating
    8.6
    Views
    54
    Comparisons
    36
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Reveal(x), Revealx
    GoSecure NDR
    Learn More
    Overview

    ExtraHop Reveal(x) is a highly effective network traffic analysis (NTA) solution that leverages a cloud-native architecture to empower organizations to overcome a world filled with increasingly sophisticated threats. It identifies 25% more threats than its competitors. Additionally, organizations that employ Reveal(x) say they resolve issues 77% percent faster than they would if they were using other similar solutions.

    ExtraHop Reveal(x) Benefits

    Some of the ways that organizations can benefit by choosing to deploy ExtraHop Reveal(x) include:

    • Total network visibility. Reveal(x) gives users the ability to view every component of their network and devices connected to it in real time. It can automatically recognize and classify the devices that are communicating across an organization’s network. These devices are scanned by powerful decryption software that reveals hidden threats and the details of critical transactions without compromising privacy or compliance rules. Organizations are given full East-West visibility across both physical data centers and cloud environments. Threats that are on the periphery are brought to the attention of the administrators tasked with watching out for them.
    • Identify threats in real time. Reveal(x) extracts more than 5,000 features from the L2-L7 security layers at any given time, feeds them into its machine learning engine, and presents them to its rule-based detection feature. These features make it possible for the solution to identify the most severe threats. Users can conduct a threat triage and address the threats that their system detects in the order of severity that these threats represent.
    • Ease of use. Users of Reveal(x) can easily make full use of its event remediation features without expending long periods of time learning them. Its workflows are designed so that administrators can go from a security event to the cause of the event in only a couple of clicks. What would normally take hours can be completed in moments.

    ExtraHop Reveal(x) Features

    • Integration suite. Reveal(x) enables users to utilize a robust suite of integrations. If users feel they are missing important capabilities, they can bolster their security feature toolbox with those offered by third-party solutions. Phantom, Splunk, and Palo Alto are three examples of solutions that Reveal(x) enables users to connect to in order to fill in a gap in their security capabilities.
    • Automated inventory. Reveal(x) automatically creates a detailed inventory of all of the devices that it discovers and classifies. This keeps an always up-to-date record of all of the devices that are communicating in a given network.

    • Machine learning. Reveal(x)’s real-time application analytics is driven by a machine learning engine. It detects anomalies in an organization’s network traffic, thus enabling users to keep ahead of any and all threats while reducing the number of false positives that administrators have to sort through.

    Reviews from Real Users

    ExtraHop Reveal(x) is a solution that stands out when compared to many other similar solutions. Two major advantages that it offers are its versatility and its ability to quickly identify the root cause of an application’s issues.

    John B., the senior monitoring engineer at a financial services firm, says, “It's useful for different teams in our organization. The cybersecurity team uses it because it has got great analytics for anomaly detection, malware detection, and ransomware. It's used by the networking people because it's great to be able to get the three-way handshake between systems to see how your network is doing. The microservices for DNS use it because they like to be able to see how their DNS services are operating and how many DNS requests are being rejected, denied, or dropped. Application people love it because it fully decrypts their traffic.

    Henry S., a systems engineer at LifePoint Health, writes, "When there are performance issues with an HTTP app, ExtraHop enables us to identify the causes within a few minutes. We can see what transactions are being impacted by something that may be happening within the server environment."

    Endpoints Are the Start,
    but Lateral Movement Could Be the True Goal
    Breaches happen many ways. While endpoints are commonly thought of as the main target, in many cases they are simply the entry point to lateral movement. GoSecure Network Detection and Response identifies lateral movement to stop the breach from spreading.

    Visibility Leads to Detection
    Detection requires visibility. The better the visibility, the faster the detection. GoSecure Network Detection and Response quickly correlates endpoint and network activity, using our multi-observational analysis, to pinpoint suspicious/malicious intent and respond accordingly.

    Multiple Sources for Better Visibility
    Network Intrusion Detection System (NIDS)
    GoSecure Managed Detection and Response provides a robust NIDS which performs real-time traffic, deep packet, and behavioral analysis in search of anomalous activity. NIDS combines third-party threat intelligence with an in-house developed ruleset providing GoSecure with the ability to detect security threats in a client’s environment. Our NIDS engine is highly scalable and can support sustained network traffic speeds of 10 gigabits per second.

    Log Intrusion Detection System (LIDS)
    Once deployed within the client infrastructure, the GoSecure MDR appliance collects logs from various sources providing additional contextual information used to reduce false positives and confirm the validity of potential threat events. The appliance receives logs in the standard syslog format from multiple device types, such as Syslog-NG, IPS, Firewalls, Proxies, and Web Filtering. For the sources that do not create syslogs, additional tools are available to convert logs into this format.

    Correlation for Action
    GoSecure’s multi-observational analysis accurately generates a suspicion level based on disparate events. By combining information from endpoint and network alerts, GoSecure’s detection level is industry leading. Going beyond simple packet captures, GoSecure Network Detection and Response uses our extensive threat intelligence database to identify threats across multiple sources and correlate these actions quickly. From scanning activity that might indicate upcoming lateral movement to policy violations, an early indicator of insider threat activity, GoSecure Network Detection and Response is a vital element of our Managed Detection and Response service. Phishing, brute force attacks and communications with malicious sites are just a few of the network sources monitored and correlated by GoSecure Network Detection and Response. No source is too obscure, and no alert too trivial.

    Sample Customers
    Wood County Hospital
    Information Not Available
    Top Industries
    REVIEWERS
    Security Firm22%
    Computer Software Company22%
    Financial Services Firm22%
    Educational Organization11%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm15%
    Government7%
    Manufacturing Company6%
    No Data Available
    Company Size
    REVIEWERS
    Small Business23%
    Midsize Enterprise23%
    Large Enterprise54%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise14%
    Large Enterprise66%
    No Data Available
    Buyer's Guide
    Network Detection and Response (NDR)
    March 2024
    Find out what your peers are saying about Darktrace, Vectra AI, Cisco and others in Network Detection and Response (NDR). Updated: March 2024.
    767,847 professionals have used our research since 2012.

    ExtraHop Reveal(x) is ranked 5th in Network Detection and Response (NDR) with 12 reviews while GoSecure Network Detection and Response is ranked 21st in Network Detection and Response (NDR). ExtraHop Reveal(x) is rated 8.6, while GoSecure Network Detection and Response is rated 0.0. The top reviewer of ExtraHop Reveal(x) writes "It helps you visualize how data moves across your network". On the other hand, ExtraHop Reveal(x) is most compared with Darktrace, Vectra AI, Corelight, Cisco Secure Network Analytics and Arista NDR, whereas GoSecure Network Detection and Response is most compared with .

    See our list of best Network Detection and Response (NDR) vendors.

    We monitor all Network Detection and Response (NDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.