<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

ExtraHop Reveal(x) Deployment in the Google Cloud

extrahop reveal(x) deployment on google cloud

ExtraHop's platform allows organizations to deploy Reveal(x) in the Google Cloud. Reveal(x) provides unmatched speed, scale, and visibility needed to detect and respond to threats in cloud and hybrid environments. 

Reveal(x) leverages a native integration with Google Cloud Packet Mirroring to provide agentless visibility, packet-level granularity, and security at scale. 

Google Cloud has emerged as a leading cloud infrastructure for businesses focused on serverless computing and G-Suite integrations. 

The two solutions together form the basis for a strong cloud security infrastructure. If your company is looking to implement Reveal(x) in the Google Cloud, make sure to consult with experienced security engineers who can help find the best fit for you, along with provide leading managed detection and response services. 



Complete Visibility 

ExtraHop allows security teams to discover and classify each asset across their cloud infrastructure. This is essential for detecting things like misconfigurations, insecure APIs, and unauthorized access. Reveal(x) provides visibility with full payload analysis, making it a leader in network detection and response. 


Real-Time Detection 

Detect anomalous behaviors and malicious activities in real-time with Reveal(x). Unauthorized access, misconfiguration exploits, and insecure APIs are some of the most common threats that need to be detected quickly. ExtraHop’s platform accurately identifies threats across cloud workloads, leveraging over 5,000 wire data features and over 70 protocols. 


Intelligent Response 

A network detection and response tool requires automation features to be useful to security teams. Reveal(x) automates several early steps of the investigation workflow, making it simpler to and more efficient. 



Reveal(x) can be deployed in two ways: Saas-based or self-managed Reveal(x) VM for Google Cloud. Reveal(x) VM for Google sensors offer the option to conduct machine learning-powered analysis and threat detection from inside your Google Virtual Private Cloud (VPC). 

Extrahop lists the following differences between their self-managed solution and Reveal(x) VM for Google Cloud: 


Reveal(x) 360 

Reveal(x) VM for Google Cloud 

SaaS-based deployment 



Self-managed sensor 



On-demand sensors billed hourly 



Simplified sensor deployment via Cloud Console 



Cloud-scale ML 



ExtraHop-managed record warehouse 



Control plane for unified visibility (hybrid and multicloud) 



Google Cloud Integration 




The Datashield Advantage  

Datashield has helped our clients implement ExtraHop using our proprietary orchestration tool, SHIELDVision. Our security engineers can architect and deploy Reveal(x) in multiple cloud and hybrid environments.  

Take your security to the next level with managed security services, provided by Datashield and backed by security leader ADT. Our US-based SOC has eyes on glass 24x7x365, providing clients with world-class results and white-glove service.  

Learn more about our cloud-native managed detection and response (MDR) service here 

If your organization is considering Reveal(x), contact us for a no-cost consultation to see if Datashield is right for you.  

Contact Us Today 


Topics from this Article

SIEM, Google, Google Cloud, Cloud Security, Cloud SIEM, NDR, Network Detection and Response, ExtraHop

Cassidy Trowbridge
Cassidy Trowbridge
Cassidy is a marketing specialist at Datashield. She manages Datashield's content and social marketing strategies.

Related Posts

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.