{"id":13235,"date":"2023-09-16T18:30:06","date_gmt":"2023-09-16T23:30:06","guid":{"rendered":"https:\/\/texascyber.org\/?post_type=sponsor_post&p=13235"},"modified":"2023-09-16T18:30:46","modified_gmt":"2023-09-16T23:30:46","slug":"extrahop","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/extrahop\/","title":{"rendered":"Extrahop"},"content":{"rendered":"
\n

Your Network Knows the Cybertruth<\/span><\/h1>\n

Are you listening?<\/h2>\n
\n

Reveal the Unknown,<\/span> Unmask the Attack.<\/strong><\/h3>\n

The network is the most powerful source of truth and transparency across all assets in your enterprise\u2014from cloud, to on-premises, to endpoints. It sees everything, shows everything, and leaves attackers with nowhere to hide. ExtraHop gives you the full-scale network visibility you need to bring the cybertruth to light.<\/p>\n<\/div>\n

\"\"<\/p>\n<\/div>\n

Reveal(x)<\/strong><\/h2>\n

The industry’s only network detection and response platform that delivers the 360-degree visibility needed to uncover the cybertruth.<\/p>\n

\n
\n

Reveal the Unknown,<\/span> Unmask the Attack.<\/strong><\/h3>\n

The network is the most powerful source of truth and transparency across all assets in your enterprise\u2014from cloud, to on-premises, to endpoints. It sees everything, shows everything, and leaves attackers with nowhere to hide. ExtraHop gives you the full-scale network visibility you need to bring the cybertruth to light.<\/p>\n<\/div>\n<\/div>\n","protected":false},"featured_media":13236,"template":"","sponsor_level":[9],"sponsored_year":[],"acf":[],"yoast_head":"\nExtrahop - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/sponsor\/extrahop\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extrahop - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"Your Network Knows the Cybertruth Are you listening? Reveal the Unknown, Unmask the Attack. The network is the most powerful source of truth and transparency across all assets in your enterprise\u2014from cloud, to on-premises, to endpoints. It sees everything, shows everything, and leaves attackers with nowhere to hide. ExtraHop gives you the full-scale network visibility […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/sponsor\/extrahop\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-16T23:30:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/extrahoplogowhite-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1093\" \/>\n\t<meta property=\"og:image:height\" content=\"183\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/extrahop\/\",\"url\":\"https:\/\/texascyber.org\/sponsor\/extrahop\/\",\"name\":\"Extrahop - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2023-09-16T23:30:06+00:00\",\"dateModified\":\"2023-09-16T23:30:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/sponsor\/extrahop\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/sponsor\/extrahop\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/extrahop\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extrahop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extrahop - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/sponsor\/extrahop\/","og_locale":"en_US","og_type":"article","og_title":"Extrahop - Texas Cyber","og_description":"Your Network Knows the Cybertruth Are you listening? Reveal the Unknown, Unmask the Attack. The network is the most powerful source of truth and transparency across all assets in your enterprise\u2014from cloud, to on-premises, to endpoints. It sees everything, shows everything, and leaves attackers with nowhere to hide. ExtraHop gives you the full-scale network visibility […]","og_url":"https:\/\/texascyber.org\/sponsor\/extrahop\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-09-16T23:30:46+00:00","og_image":[{"width":1093,"height":183,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/extrahoplogowhite-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/sponsor\/extrahop\/","url":"https:\/\/texascyber.org\/sponsor\/extrahop\/","name":"Extrahop - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2023-09-16T23:30:06+00:00","dateModified":"2023-09-16T23:30:46+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/sponsor\/extrahop\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/sponsor\/extrahop\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/sponsor\/extrahop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"Extrahop"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post\/13235"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/sponsor_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/13236"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=13235"}],"wp:term":[{"taxonomy":"sponsor_level","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_level?post=13235"},{"taxonomy":"sponsored_year","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsored_year?post=13235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}