Skip to Main Content

Stay Ahead of Attackers & Potential Cyber Threats From East to West

To successfully deflect and defend against cyber attacks, today's digital businesses need to stay one step ahead, and there are several technology-driven solutions aiming to help those in security and IT ops stay ahead of potential threats.

Real-time IT analytics solution ExtraHop has released a plug-in, ExtraHop Threat ID, which analyzes east-west traffic within the datacenter (read more on this below), looking at common threat vectors including certificates, ciphers, DNS, and scans. 

The solution then maps those threat vectors against known configurations to help IT organizations improve their "security posture," proactively identifying and managing potential threats within the environment. The new Threat ID offering from ExtraHop essentially delivers greater visibility into suspicious port scans, data exfiltration activity, or indicators of an active attack that make it past perimeter defenses. 

"Organizations recognize that perimeter and signature-based security are no longer effective on their own," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With Threat ID, ExtraHop is delivering real-time network-level visibility and threat identification that can help all security stakeholders -- from security to IT ops -- stay ahead of potential threats."

What is East-West Traffic?

East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center. The phrase "east-west" comes from network diagram drawings that usually depict local area network (LAN) traffic horizontally (left to right). In contrast, north-south traffic is client-to-server traffic that moves between the data center and a location outside of the data center network. 


Leave Your Comment

Login to Comment

Become a Member

Not already a part of our community?
Sign up to participate in the discussion. It's free and quick.

Sign Up


Leave a comment
    Load more comments
    New code