ExtraHop extends XDR partnership with CrowdStrike

New capabilities build on existing detection, investigation, and response integrations between ExtraHop Reveal(x) and CrowdStrike Falcon, adding highly-targeted, intelligence-backed response to best-of-breed XDR alliance.

ExtraHop has introduced an 'industry-first' integration with CrowdStrike that takes security analysts from detection to quarantine to investigation with a single click. The new push-button response integration expands the best-of-breed extended detection and response (XDR) partnership between the two companies, enabling users to quarantine individual assets from a detection directly within Reveal(x) and then pivot seamlessly into an investigation workflow. Armed with this capability, defenders can act with speed and precision, accelerating response times and minimizing the impact to the business. 

The new native push-button response feature within ExtraHop Reveal(x) gives defenders the tools they need to dramatically accelerate containment while minimizing disruption to the organization. Unlike automated response offerings, push-button response gives security analysts the ability to control how and when assets are quarantined based on high-fidelity detections and intelligence that extends from the network to the endpoint. By integrating this capability into the security analyst workflow, security teams can conduct efficient forensic investigation.

“Over the past five years, the security pendulum has started to swing more meaningfully towards a detect-and-respond model that assumes even the best perimeter defenses will eventually be breached,” said Jesse Rothstein, co-founder and CTO, ExtraHop. “But many organizations remain reluctant to invest more in this approach due to the complexity of playbook-driven response. With our new native push-button response, we’re continuing to build on our partnership with CrowdStrike and existing response integration capabilities to give defenders the ability to rapidly and precisely quarantine compromised devices without causing massive disruption to the organization.” 

“This new capability enables faster remediation and faster time to respond, letting teams focus

on critical assets and resources,” said Chris Kissel, research director, security and trust, IDC.

“The focus on streamlining the work of the overburdened SOC analyst adds real value for

defenders.”

The push-button response integration builds upon ExtraHop’s existing partnership with CrowdStrike which offers integrations into CrowdStrike Falcon X, Threat Graph, and Falcon Real Time Response to deliver best-of-breed XDR to their joint customers around the world. 

Unified Threat Intelligence: Reveal(x) 360 correlates threat intelligence indicators of compromise (IOCs) from CrowdStrike Falcon X automated threat intelligence and endpoint security data from Threat Graph with network details about IOC hosts and domains for complete coverage. The data is correlated and contextualized in the Reveal(x) console.

Real-time Detection: Rapidly detect threats observed on the network such as network privilege escalation, lateral movement, suspicious VPN connections, and data exfiltration. It also helps thwart those occurring on the endpoint, including ransomware, local file enumeration, directory traversal, and code execution. This provides complete coverage across the entire attack surface.

Instant Response: With the new push-button response, security analysts can use the Crowdstrike Falcon integration to instantly quarantine a device from within the Reveal(x) platform. This approach cuts off access to network resources and endpoints, stopping an attack in progress without disrupting an analyst’s investigation workflow.  

Continuous Endpoint Visibility: With automatic device discovery and classification, Reveal(x) continuously updates and maintains a list of devices impacted by threats, even on devices where the CrowdStrike agent is not yet present. This alerts CrowdStrike customers to newly connected and potentially compromised devices that need instrumentation for device-level visibility. It also extends edge visibility to include IoT, bring your own device (BYOD), and devices incompatible with agents.

A survey of 650 global CISOs examines how security leaders are navigating AI adoption, expanding...
Veracode's latest report highlights the widening gap between rapid software development and slower...
Veeam has launched Agent Commander, a solution designed to combine data resilience with AI...
Infinigate UK & Ireland partners with OpenOrigins to combat deepfakes, enhancing trust in digital...
The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats,...
Tata Group and OpenAI agree partnership spanning AI innovation, infrastructure and workforce...
Large enterprises express concern that AI may not deliver the resilience and business continuity...
While hybrid work models gain traction, mid-market firms face connectivity and security challenges...