Axians Chooses Network Intelligence from ExtraHop for ‘Circle of Visibility’

ExtraHop, a leader in cloud-native network intelligence, announced security and solutions provider Axians is using ExtraHop for its core security offering, the “Circle of Visibility.” This cybersecurity offering marries three solutions — NDR, EDR, and SIEM — to help organizations detect, investigate and stop advanced attacks before they can do significant damage.

Many organizations have a strong preventative posture yet have fallen victim to a cyberattack.

Approximately 75 percent of security budgets go to preventing intrusion, and yet more than 80 percent of organizations have experienced a ransomware incident in the past five years. With its Circle of Visibility offering, Axians brings together detection and response technologies to provide streamlined, contextual visibility from the network to the endpoint to help organizations detect and stop cyberattacks before they result in significant data loss, business downtime, and reputational harm.

“Like every organization today, we have to deal with large and evolving attack surfaces, constant threats from cybercriminals, and regulation requirements. Organizations need to assume that attackers are actively operating inside their hybrid environments, moving laterally, and evading traditional security controls,” said David Maes, IT manager, Boels Rental. “We leverage ExtraHop and Axians’ Circle of Visibility to improve our overall security posture and reliably detect, investigate, and respond to malicious behavior.”

The ExtraHop Reveal(x) platform adds critical network intelligence to the Axians Circle of Visibility offering. By applying advanced AI, behavioral analytics, and strategic decryption to live network telemetry, ExtraHop Reveal(x) identifies the stealthy attack techniques and lateral movement associated with the most advanced threats. When attack activity is detected, ExtraHop Reveal(x) customers can pivot quickly to investigate down to the packet level and then respond with speed, before the attack can spread.

“ExtraHop’s network intelligence is the ground source of truth for an organization. The network does not lie,” said Roel van de Pol, solution architect at Axians. “It can tell us exactly how attackers are moving within an organization, staging data, or communicating back to their home base. It also provides visibility into endpoints where an agent can’t be installed. As enterprises shift to a detect and respond mindset, this triad of technology with ExtraHop Reveal(x) at its core will help reduce the chance that an attacker can reach its end goal.”

Axians Circle of Visibility also complies with NIS2, European Union-wide legislation on cybersecurity that strengthens the security requirements for organizations regionally.

Learn more about how ExtraHop Reveal(x) helps enterprises stop breaches 84 percent faster: www.extrahop.com/solutions/security.