
ExtraHop Launches APAC Tour to Help Security Leaders Prepare for the Rise of Agentic AI in Cybersecurity
ExtraHop, a leading provider of modern Network Detection and Response (NDR) solutions, has announced a major Asia-Pacific roadshow focused on preparing enterprises for the rapidly emerging era of agentic AI in cybersecurity operations. The event series, titled “ExtraHop Reveals the Agentic Shift,” will be headlined by Raja Mukerji and aims to help business and security leaders understand how autonomous AI systems are reshaping cyber defense strategies across the region.
The APAC tour comes at a critical moment for cybersecurity teams as organizations increasingly adopt AI-powered systems while simultaneously facing a sharp rise in AI-assisted cyberattacks, sophisticated nation-state activity, and mounting regulatory pressure to modernize security operations.
According to ExtraHop, the transition into the “agentic era” represents more than simply adding AI tools into existing security workflows. Instead, it signals a structural transformation in how Security Operations Centers (SOCs) detect threats, make decisions, automate investigations, and coordinate incident response.
The company believes that many enterprises are rushing toward autonomous security operations without fully addressing a foundational issue: the quality and fidelity of the underlying data feeding these AI systems.
Through its APAC event series, ExtraHop intends to provide security leaders with practical guidance for navigating this transition while helping organizations build the operational foundations required for trustworthy agentic security.
Understanding the “Agentic Shift” in Cybersecurity
The concept of agentic AI refers to autonomous or semi-autonomous AI systems capable of making decisions, reasoning across complex datasets, coordinating workflows, and taking actions with limited human intervention.
In cybersecurity, agentic systems are beginning to influence:
- Threat detection
- Incident response
- Security orchestration
- Vulnerability management
- Threat hunting
- Network monitoring
- Policy enforcement
- Security analytics
Unlike traditional automation tools that execute fixed workflows, agentic AI systems can dynamically analyze changing conditions, prioritize risks, and adapt their responses in real time.
This evolution is expected to dramatically increase the speed and scale of cybersecurity operations. However, it also introduces major challenges around trust, governance, transparency, and data integrity.
ExtraHop argues that organizations cannot successfully deploy autonomous security systems unless those systems are grounded in accurate, high-fidelity operational telemetry.
Without trustworthy data, AI agents risk:
- Missing threats
- Generating false positives
- Misclassifying incidents
- Making poor remediation decisions
- Escalating operational disruptions
The company believes these risks are becoming particularly acute in the Asia-Pacific region due to growing geopolitical tensions and increasingly sophisticated cyber campaigns targeting critical infrastructure.
APAC Faces Escalating Cybersecurity Pressure
ExtraHop highlighted that the Asia-Pacific region has become a major focus area for nation-state cyber activity, particularly attacks targeting telecommunications providers, government infrastructure, and strategic industries.
Critical infrastructure operators across APAC are facing a rapidly evolving threat landscape characterized by:
- Advanced persistent threats (APTs)
- AI-assisted attack automation
- Supply chain compromise campaigns
- Credential abuse
- Lateral network movement
- Encrypted threat activity
- Shadow AI deployment inside enterprises
As attackers adopt AI technologies to accelerate reconnaissance, evade detection, and automate attack chains, traditional security models are increasingly struggling to keep pace.
This has accelerated interest in autonomous defense systems capable of responding to threats faster than human analysts alone.
According to ExtraHop, autonomous defense is no longer viewed as a future aspiration for many APAC organizations. Instead, it is increasingly becoming a regulatory and operational necessity.
Governments and regulators throughout the region are placing greater emphasis on cyber resilience, rapid incident response, and visibility across critical infrastructure environments.
However, organizations implementing AI-driven security operations are encountering a significant obstacle: inadequate data quality.
The Data Problem at the Center of AI Security
A major theme of the APAC tour is the growing recognition that AI security systems are only as effective as the data they receive.
ExtraHop Co-founder and Chief Scientist Raja Mukerji warned that many organizations are accelerating AI adoption without first ensuring their foundational data infrastructure is capable of supporting autonomous operations.
According to Mukerji, the cybersecurity industry has repeated a familiar pattern:
- New technologies emerge rapidly
- Organizations rush toward adoption
- Foundational infrastructure gets overlooked
- Operational weaknesses surface during real incidents
He emphasized that enterprises often do not realize the severity of these gaps until a breach occurs or an AI-driven response system fails under pressure.
In the context of agentic cybersecurity, poor-quality data can have serious consequences because autonomous systems rely heavily on contextual awareness to make decisions.
Incomplete or inaccurate telemetry may prevent AI agents from:
- Detecting hidden attack patterns
- Understanding network behavior
- Correlating anomalies
- Prioritizing incidents correctly
- Executing appropriate responses
ExtraHop argues that high-fidelity network telemetry is one of the most important inputs for successful agentic SOC operations.
Building the Foundation for the Agentic SOC
ExtraHop has spent years developing its Network Detection and Response platform to support increasingly autonomous cybersecurity environments.
The company’s NDR platform focuses on delivering:
- Real-time network telemetry
- High-fidelity behavioral data
- Deep packet analysis
- East-west traffic visibility
- Encrypted traffic analysis
- Threat correlation context
This telemetry acts as the operational foundation that AI systems use to reason about security conditions across enterprise networks.
ExtraHop believes that accurate network-level visibility is especially important because attackers increasingly exploit:
- Authorized workflows
- Legitimate credentials
- Encrypted communications
- Cloud-native environments
- AI-integrated enterprise applications
Traditional endpoint or log-centric security tools may fail to detect these activities due to visibility gaps.
By providing detailed network context, ExtraHop says its platform enables AI agents to make more informed and reliable decisions.
Three Core Areas of Agentic Security Focus
As part of the APAC roadshow, ExtraHop plans to focus on three critical operational areas shaping the future of autonomous cybersecurity.
1. Defending Against AI-Powered Threats
Attackers are increasingly using AI to:
- Accelerate malware development
- Automate phishing campaigns
- Generate social engineering content
- Obfuscate malicious activity
- Improve lateral movement techniques
- Evade conventional detection systems
ExtraHop says AI-powered adversaries are moving faster and hiding deeper inside enterprise networks than traditional security tools were designed to handle.
The company’s NDR approach aims to expose threats concealed within:
- Authorized user activity
- Encrypted traffic
- Cloud service interactions
- Internal network communications
This visibility becomes especially important in environments where attackers blend malicious behavior into otherwise legitimate operational workflows.
2. Monitoring and Governing Enterprise AI Usage
The rapid adoption of generative AI platforms and autonomous AI agents has created a growing challenge for enterprises: understanding which AI systems are operating inside their environments.
Many organizations are now facing the rise of “shadow AI” — unsanctioned or unmonitored AI tools deployed without centralized oversight.
These systems may introduce:
- Data leakage risks
- Compliance violations
- Unsecured integrations
- Unauthorized external connections
- Operational vulnerabilities
ExtraHop plans to demonstrate how enterprises can gain visibility into AI usage across networks, identify anomalous behavior, and enforce governance policies before security incidents occur.
As AI becomes more deeply integrated into business operations, governance and observability are expected to become central pillars of enterprise cybersecurity strategy.
3. Fueling the Agentic SOC
The final major focus area involves the development of the “agentic SOC,” where AI agents assist or autonomously perform large portions of security operations.
In an agentic SOC:
- AI systems analyze telemetry continuously
- Threats are prioritized automatically
- Investigations are accelerated
- Response workflows are orchestrated dynamically
- Analysts focus on strategic oversight
However, for these systems to function effectively, they require reliable operational context.
ExtraHop says its NDR platform provides the high-fidelity network intelligence necessary for AI agents to:
- Reason accurately
- Detect relevant threats
- Avoid false positives
- Coordinate autonomous responses
- Maintain operational confidence
The company believes this foundation is essential for achieving trustworthy automation in modern security environments.
APAC Tour Will Include Live Demonstrations and Technical Sessions
The “ExtraHop Reveals the Agentic Shift” tour will travel across several major APAC cities during May 2026, including:
- Singapore
- Kuala Lumpur
- Melbourne
- Sydney
- Canberra
Each event will feature:
- Technical presentations
- Live demonstrations
- Simulations of agentic security operations
- Networking sessions for security executives
- Discussions around AI governance and operational readiness
The sessions are designed to move beyond theoretical AI discussions and instead focus on practical implementation strategies for enterprise security teams.
ExtraHop says the goal is to help organizations translate high-level AI ambitions into measurable SOC outcomes.
Why the Agentic Era Represents a Structural Shift
The rise of agentic AI may ultimately reshape nearly every aspect of cybersecurity operations.
Historically, SOCs have relied heavily on manual analyst workflows, static automation rules, and siloed security tools. As attack complexity increases, many organizations are struggling to maintain operational efficiency using traditional approaches.
Agentic systems promise to:
- Increase detection speed
- Reduce analyst workload
- Improve response times
- Correlate complex threats automatically
- Operate continuously at scale
At the same time, autonomous systems introduce new operational risks if implemented without proper governance and data integrity.
ExtraHop’s broader message throughout the APAC tour is that successful agentic security depends less on AI hype and more on foundational operational readiness.
According to the company, organizations that invest in trustworthy telemetry, network visibility, and contextual intelligence today will be better positioned to build reliable autonomous defense systems tomorrow.
The Future of AI-Driven Cyber Defense
The cybersecurity industry is rapidly entering a new operational era where AI systems will increasingly participate directly in threat detection, reasoning, and response coordination.
As both defenders and attackers adopt AI technologies, the competition between offensive and defensive automation is expected to intensify significantly.
ExtraHop believes that the organizations most likely to succeed in this environment will be those capable of building strong foundational data architectures capable of supporting intelligent autonomous systems.
Through its APAC tour, the company aims to position itself not only as an NDR provider but also as a foundational infrastructure partner for enterprises preparing for the next generation of AI-driven cyber defense.
The emergence of the agentic SOC may still be in its early stages, but the transition is already underway — and for many enterprises across Asia-Pacific, the challenge now is determining how to deploy autonomous security capabilities safely, effectively, and at scale.
Source link: https://www.businesswire.com



