Credit: iStock 2.1 million people over eleven counties in North Texas depend on Tarrant Regional Water District (TRWD) for their water supply and flood control measures. As a critical part of our national infrastructure, they are well aware of the rising risk of advanced persistent threats, but they also have a small network team with no dedicated in-house security staff.So how does a team like the one at TRWD master security and regain the upper hand? Should they find themselves face-to-face against sophisticated cybercriminals, it would be a true underdog story—but this small, savvy team in North Texas turned to ExtraHop Reveal(x) network detection and response (NDR) to help them prevent advanced threats.Network Architect Adam Bolden initially came to ExtraHop with a primary objective in mind: to add robust network visibility for TRWD’s complex network infrastructure. But modern networks, as it turns out, are dynamic and constantly evolving. ExtraHop Reveal(x) was designed with that in mind.The changing elements of cybersecurityWhen we first meet new customers like TRWD, it’s common for them to have one mitigating factor or a single goal that Reveal(x) can solve—but our customers also gain a lot of value by putting our machine learning-based solution to work in more ways than originally intended. While Reveal(x) was designed to be configured and customized to fit an organization’s needs, we still learn a lot about how our technology is used by listening to real-world users like TRWD.Some of today’s biggest security threats consist of advanced nation-state actors and large-scale cyber gangs who use the techniques and tactics of advanced persistent threats to evade detection. This means that broad security coverage across physical networks, cloud environments, and IoT devices is now mandatory for organizations who wish to successfully defend against today’s threat landscape.Today’s advanced threats are highly adaptive, but our machine learning-based detectors are too. Because Reveal(x) uses behavior-based detections to spot network anomalies across the entire environment, it’s a defender’s best asset against zero-day exploits and other advanced attacks, and it can easily scale to match the natural growth and change of an organization’s network.We wanted to see all the ways our customers use Reveal(x) to take back the advantage against advanced threats, so we mapped out the most common use cases across security, cloud visibility, and IT operations. It turns out, there are a lot. The Periodic table of Network Detection and Response NDR Use Cases helps visualize how a single solution can adapt to changing needs and strengthen security across nearly every element of a network to provide truly dynamic cyberdefense.Reveal(x) for security, cloud, and IT opsTarrant Regional Water District initially adopted Reveal(x) to answer a security mandate and boost visibility across their entire environment. They’ve expanded ExtraHop’s footprint to include continuous security monitoring for their critical home-grown applications and use real-time detections to help meet security compliance. Reveal(x) also serves as a bridge into IT ops by enabling performance monitoring for applications and their geographically-dispersed network environments. ExtraHopClick to zoomWhen the SUNBURST news broke, the network team had to quickly put on their security hats to investigate their DNS archives, looking for indicators of compromise. Like many organizations, they didn’t enable DNS logging on domain controllers, which might have made detecting compromise near impossible. Instead, the team was able to use records, captured and stored by Reveal(x) to easily detect whether or not they had been affected. After the SUNBURST news, Bolden remarked, “Reveal(x) really saves our hide when it comes to identifying potential incidents or a vulnerability—it just helps me sleep better!”With infinite configurations and solutions, no two Reveal(x) customers are alike, but like a lot of customers, TRWD is implementing new Reveal(x) features and capabilities as their needs evolve.To view the elements of cyberdefense and how they can help organizations like yours, check out the Periodic Table of Reveal(x) Use Cases. Related content brandpost Sponsored by ExtraHop Five Blind Spots That Leave You Open to Supply Chain Vulnerabilities It’s estimated by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chain. Is your organization prepared? By Chase Snyder Jun 13, 2022 14 mins Data and Information Security IT Leadership brandpost Sponsored by ExtraHop Assessing Network Analysis and Visibility Solutions for Zero Trust Gaining a better understanding of NAV product capabilities can jumpstart workflows and add value on the essential path to Zero Trust. By Kelsey Milligan Jun 13, 2022 5 mins Data and Information Security IT Leadership brandpost Sponsored by ExtraHop Beating Ransomware in the Midgame: Detection Best Practices in 2022 Ransomware varies in the type of encryption used, the scale of data encrypted, and their capacity to spread between computers. It has become increasingly sophisticated, with more advanced encryption, new vectors for infection, and the ability to leve By Jesse Munos Apr 14, 2022 7 mins Ransomware IT Leadership brandpost Sponsored by ExtraHop Detect and Stop Spring4Shell Exploitation On March 29, 2022, ExtraHop's Threat Research team noticed social media chatter regarding a new remote code execution (RCE) vulnerability in the Spring Core Framework and began tracking the issue. Read on to uncover their findings, and safeguard By Jeff Costlow Apr 14, 2022 4 mins Threat and Vulnerability Management IT Leadership PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe