Try our new research platform with insights from 80,000+ expert users
ExtraHop Reveal(x) 360 Logo

ExtraHop Reveal(x) 360 Reviews

4.3 out of 5

What is ExtraHop Reveal(x) 360?

Featured ExtraHop Reveal(x) 360 reviews

ExtraHop Reveal(x) 360 mindshare

As of August 2025, the mindshare of ExtraHop Reveal(x) 360 in the Intrusion Detection and Prevention Software (IDPS) category stands at 0.9%, up from 0.5% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Market Share Distribution
ProductMarket Share (%)
ExtraHop Reveal(x) 3600.9%
Darktrace18.8%
Vectra AI10.7%
Other69.6%
Intrusion Detection and Prevention Software (IDPS)
 
 
Key learnings from peers

Valuable Features

Room for Improvement

ROI

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Top industries

By visitors reading reviews
Financial Services Firm
10%
Computer Software Company
8%
Manufacturing Company
8%
Comms Service Provider
8%
Insurance Company
7%
Government
7%
University
5%
Performing Arts
5%
Outsourcing Company
5%
Transportation Company
5%
Healthcare Company
4%
Construction Company
4%
Retailer
4%
Energy/Utilities Company
4%
Educational Organization
4%
Media Company
3%
Non Profit
2%
Recreational Facilities/Services Company
2%
Logistics Company
1%
Real Estate/Law Firm
1%
Aerospace/Defense Firm
1%
Wholesaler/Distributor
1%
Individual & Family Service
1%
Legal Firm
1%
Agriculture
1%
 
ExtraHop Reveal(x) 360 Reviews Summary
Author infoRatingReview Summary
Head of Research And Development at Quipu GmbH4.5I was seeking enhanced network security visibility and found ExtraHop Reveal(x) 360 effective with its intuitive interface and robust detection capabilities. However, it needs improvement in payload analysis, as storage constraints hinder thorough investigations compared to competitors.
Business Development Manager at Westcon-Comstor4.0I primarily use ExtraHop Reveal(x) 360 for network detection and response, benefiting from its easy setup, scalability, and stability. It effectively detects unauthorized port connections with machine learning, though more protocol support would enhance its utility.
Works at jin networks4.0No summary available