Network detection and response platform analyzing traffic for threat detection
ExtraHop builds a network detection and response (NDR) platform that analyzes traffic behavior to surface threats. The stack spans Python, Go, C/C++, and Kubernetes on AWS/Azure/GCP, with deep network tooling (Wireshark, tcpdump, Scapy) alongside modern observability (Prometheus, Grafana). Active projects reveal a product split between infrastructure (kernel drivers, sensor scaling, data migrations) and security operations (ML anomaly detection, custom signatures, investigation workflows), while pain points center on real-time threat detection, database scalability, and reducing mean-time-to-investigate — suggesting the platform is scaling horizontally across sensors but hitting architectural limits on query and storage.
ExtraHop is a network-centric security company based in Seattle that sells threat detection and response tools to mid-market and enterprise organizations. The platform ingests network traffic as its primary data source and applies behavioral analysis and machine learning to identify suspicious activity. The company operates across five countries (United States, India, Canada, Germany, Singapore) with a 500–1,000-person workforce split primarily between sales and engineering, indicating a sales-led go-to-market model. Current work spans customer onboarding, investigation UI, custom detection rules, and operating-system-level sensor development, alongside enterprise prospecting and demand generation.
Python, Go, TypeScript, React, Kubernetes, AWS, Azure, GCP, C/C++, Linux, Terraform, and network analysis tools including Wireshark, tcpdump, and Scapy. Observability is handled by Prometheus and Grafana.
Core projects include ML-powered anomaly detection, custom threat signatures, investigation UI improvements, operating system kernel drivers for sensors, and database scalability. Commercial work includes customer onboarding and enterprise demand generation.
Other companies in the same industry, closest in size