2020-09-15T11:13:31Z

What advice do you have for others considering ExtraHop Reveal(x) 360?

Julia Miller - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
3

3 Answers

Maksym Toporkov - PeerSpot reviewer
Real User
Top 5
2023-11-16T13:12:54Z
Nov 16, 2023

I recommend prioritizing demos over POCs when engaging with vendors. Organizing POCs involves significant time and resource investments for both parties. Instead, invest time in multiple demo sessions, exploring the product in various scenarios and comparing capabilities against a predefined list of success criteria. Create a detailed success criteria list initially. Identify a top vendor based on these criteria, saving time and resources. Overall, I would rate it nine out of ten.

Search for a product comparison
SS
Real User
Top 5
2023-02-03T20:55:08Z
Feb 3, 2023

If a company wants to build a security operations center, this solution may help. I'd rate the solution eight out of ten.

BY
Reseller
2020-09-15T11:13:31Z
Sep 15, 2020

In Korea, game companies, telecom companies, and retail companies usually use cloud deployment. The finance and manufacturing companies use on-premises deployment. Korean customers have a nice impression of this product. ExtraHop is a leading vendor in Korea. It may be number one in the Network Purpose Monitoring (NPM) market in Korea. They, however, are not a large cloud company. They don't have enterprise customers. They also don't have a large customer base in the cloud environment in countries like the USA. I would recommend this solution. ExtraHop is a technical company. ExtraHop CEO, CMO, and CTO are technical people. They are oriented towards technology and are developing their product features for customers. They have very good skills in providing product functionality to customers. I would rate ExtraHop Reveal(X) Cloud an eight out of ten.

Find out what your peers are saying about ExtraHop Networks, Zscaler, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,234 professionals have used our research since 2012.
Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more