NEW

3 Experts' Cybersecurity Predictions for 2025

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Eventschevron right
  • Resourceschevron right

ExtraHop Joins the Cyber Threat Alliance

Share blog icon

Back to top

Back to top

April 23, 2025

ExtraHop Joins the Cyber Threat Alliance

Unlocking Collective Insights to Secure the Modern Attack Surface

The cybersecurity landscape is in constant flux, driven by the ever-increasing complexity of modern IT environments. Today's organizations operate across a sprawling attack surface that extends networks from on-premises infrastructure to multi-cloud environments, and encompass a number of endpoints, applications, and identities. This complexity, while essential for business agility and innovation, presents a significant challenge: Securing the modern attack surface faster than threat actors can exploit it.

Recognizing that an effective defense requires a collaborative approach, we are excited to announce that ExtraHop has joined the Cyber Threat Alliance.

Elevating the CTA with Network Telemetry

Comprised of 38 of the most innovative organizations in cybersecurity, the CTA is a non-profit organization that provides a platform to share resources, insights, and threat intelligence. This select consortium leverages the collective knowledge of its members to drive innovation and elevate the standards of cyber defense.

Drawing on a wide range of data and expertise from the cybersecurity ecosystem, the alliance forges a deeper, more comprehensive understanding of the threat landscape. ExtraHop brings a unique and valuable perspective to the CTA through our industry-leading network detection and response (NDR) platform, RevealX.

I am very excited to welcome ExtraHop to the Cyber Threat Alliance. The company will bring a unique perspective to CTA and gain from the insights and perspectives of the other members. As we increase the diversity of our members, the strength of our network only grows.

Michael Daniel, President and CEO, Cyber Threat Alliance

By analyzing network traffic at scale, ExtraHop provides deep, real-time visibility into attacker behaviors, lateral movement, data exfiltration attempts, and other malicious activities, that can help to:

Identify emerging threats faster: Behavioral analysis of network traffic can uncover subtle indicators of compromise that might be missed by other security layers. ExtraHop analyzes network traffic at scale, providing real-time insights into attacker activities by identifying malicious activity like lateral movement, data exfiltration attempts, and command-and-control communications in real-time.

Better understand attacker tactics and techniques: Network insights provide critical context, allowing for a more complete understanding of attack campaigns. ExtraHop decrypts encrypted traffic, decodes 90+ protocols, and analyzes full network packets to reveal the full scope of attacker activity inside customers’ network, providing critical insights into post-compromise behaviors.

Leveraging the CTA to Enhance Cyber Resilience

As a member of the CTA, we gain access to a wealth of invaluable threat intelligence that unlocks significant benefits for the ExtraHop community.

Alert customers to emerging threats as soon as they appear: The CTA acts as an early warning system. Real-time information sharing across the alliance enables faster identification of new attack vectors, threat actors, and emerging campaigns. This means we’ll be among the first to know about the latest threats, allowing us to proactively update our detection engines before attacks become widespread.

Enhance alert fidelity: The CTA's members contribute diverse datasets and analytical expertise, resulting in more accurate and effective threat detection. We leverage this collective intelligence to refine our detection capabilities, leading to fewer false positives and more precise identification of malicious activity.

Disrupt attackers: A shared understanding of attacker tactics, techniques, and procedures (TTPs), as well as their infrastructure, is invaluable during incident response. Through the CTA, we gain deeper context into how attacks unfold to better scope the impact of an attack, offer effective guidance on remediation strategies, and more quickly contain malicious activity.

A Commitment to a More Resilient Future

In a world where cyber threats are becoming increasingly sophisticated, a unified defense is a necessity. Joining the CTA marks a significant step towards realizing this vision, forging a future where shared intelligence empowers us all to stay ahead of the curve and navigate the ever-evolving threat landscape with greater confidence and resilience.

blog image
Blog author
Henry Peltokangas

Director, Engineering

Share
LinkedIn logoX logoFacebook logo

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo