<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

ExtraHop Reveal(x) Enterprise

extrahop reveal(x) enterpriseExtraHop Reveal(x) Enterprise is the large-scale solution for network detection and response (NDR), providing complete east-west visibility, real-time threat detection inside the perimeter, and intelligent response at scale.

For a full feature breakdown of the Reveal(x) platform, visit our feature review here.


Differences between Reveal(x) 360 and Enterprise Deployment

The enterprise deployment differs in that it is tailored to meet an organization’s security requirements. The offering includes data feed design, prioritization of critical assets, integration with threat intelligence data, and knowledge needed to see results fast.

  • Includes a trusted advisor to offer on-site expertise from an ExtraHop Solutions Architect.
  • Custom dashboards set up for your team’s exact needs and preferences.
  • Project scheduling and tasks handled by a project manager.

The knowledge transfer component involves:

  • Hands-on training
  • Shoulder-to-Shoulder customization
  • 26 training credits intended for on-site Fundamentals and Advanced training


Subscriptions Explained

The enterprise solution boasts a three-tier subscription service:



Ideal for security operations teams with a modest security program and incident response.

Features: Full-stream analysis, security anomaly detection, 40+ enterprise protocols, global index and search



Ideal for mature programs with SIEM and the need to analyze encrypted data.

Features: All Standard features, unprecedented network visibility, decryption, integration with Orchestration, Automation, and other platforms.



Ideal for sophisticated, proactive programs that require complex forensic and compliance requirements.

Features: All previous features, plus full packet capture.


The Datashield Difference

Datashield has helped our clients implement ExtraHop using our proprietary orchestration tool, SHIELDVision. Our security engineers are able to architect and deploy Reveal(x) in multiple cloud and hybrid environments.

Our experts can fine tune reports and provide security reporting in a single pane of glass, 24x7x365. Learn more about our cloud-native managed detection and response (MDR) service here.

If your organization is considering Reveal(x) Enterprise, contact us for a no-cost consultation to see if Datashield is right for you.

We have experience migrating, building from scratch and hybridizing cloud security as well as serving as a complete outsourced SOC or co-managed environment.

Contact Us

Topics from this Article

Reviews, Enterprise, NDR, Network Detection and Response, ExtraHop

Cassidy Trowbridge
Cassidy Trowbridge
Cassidy is a marketing specialist at Datashield. She manages Datashield's content and social marketing strategies.

Related Posts

Job Openings at Datashield and Partner Companies

To go alongside our upcoming webinar, How to Get a Job in IT, Datashield is sharing open job positions within our company and our partners RSA, SentinelOne, Google Chronicle, ExtraHop, Microsoft, Proofpoint, Digital Shadows, and Vmware Carbon Black.

What is Penetration Testing?

A penetration test or pen test is a simulated cyber-attack against computer systems, application systems, and IT infrastructure to discover loopholes. These simulated cyber-attacks come in diverse forms with the intent of breaching a system through its servers, web or mobile applications, and other endpoints. The purpose of pen testing is to discover exploitable vulnerabilities in a controlled setting before cybercriminals take advantage of them.

What is the MITRE ATT&CK Framework?