AI

Identity becomes the control plane for enterprise AI security

Become a member of the event that is trusted by business leaders for almost two decades. VB Transform brings together the people who build the real Enterprise AI strategy. Leather


Stolen references are responsible for 80% of the breaches of the company. Each major security seller is merged with the same conclusion: Identity is now the control surface for AI security. Scale only requires this shift. Enterprises that manage 100,000 employees will handle more than a million identities when AI agents enter the production.

Traditional Identity Access Management (IAM) Architectures cannot scales to secure the proliferation of agentic AI. They were built for thousands of human users, not millions of autonomous agents who work quickly with permissions at human level. The response of the industry represents the most important security transformation since the application of Cloud Computing.

Provision -based authentication replaces Hardwaretokens

Use leading sellers now Bluetooth low energy (BLE) between devices and laptops to prove physical proximity. Combined with cryptographic identities and biometrics, this four-factor creates authentication without the need for hardwaretokens.

Cisco’s duo demonstrates this innovation to scale. Their proximity verification supplies phishing-resistant authentication with the help of BLE-based proximity in combination with biometric verification. This possibility, unveiled Cisco Live 2025represents a fundamental shift in authentication architecture.

Microsoft’s Entra ID Handles 10,000 AI agents in a few pilot programs and processes 8 billion authentications every day. “Traditional directory services were not archived for autonomous systems that work at this speed,” says Alex Simons, CVP of Identity at Microsoft.

Ping Identities Davinci -orchestration platform pushes further. The system processes more than 1 billion authentication events every day, where AI agents are good 60% of the traffic. Each verification is completed in fewer than 200 milliseconds while retaining cryptographic evidence.

Catching behavioral analyzes in real -time compromised agents

Crowdstrike Treats AI agents like any other identity threat. Their Falcon platform determines behavioral bases for each agent within 24 hours. Activate deviations within a few seconds of automated inclusion.

See also  OpenAI aims to ship its first device in 2026, and it could be earbuds

“When an AI agent suddenly has access to systems outside the established pattern, we treat it identically on a compromised employee reference,” Adam Meyers, head of opponents at Crowdstrike, told Venturebeat. The platform follows 15 billion AI-related events in customer environments every day.

That speed is important. Crowdstrike 2025 Global threat report Documents that opponents reach initial access in less than 10 minutes. They move laterally over 15 systems within the first hour. AI agents who work with compromised identities reinforce this damage exponentially.

Identity file prevents catastrophic failures

Companies on average 89 different identity stores in cloud and on-premises systems, according to Gartner. This fragmentation creates blind spots that opponents operate daily. The solution applies network principles to identity infrastructure.

Oktas Advanced Servert access implements redundancy, load balancing and automated failover with identity providers. When primary authentication failed, activate secondary systems within 50 milliseconds. This is mandatory when AI agents perform thousands of operations per second.

“Identity is security,” said Todd McKinnon, CEO of OKTA, on Octane 2024. “When you move AI to production, you give agents access to real systems, real data and your customer data. One affected agent identity cascades about millions of automated actions.”

Zero trust scales for agent’s proliferation

Palo Alto Networks’ Cortex Xsiam completely leaves the perimeter defense. The platform works in the assumption of continuous compromise. Each AI agent undergoes verification before any action, not just with the first authentication.

Mike Riemer, Field Ciso on IvantiStrengthened the zero confidence approach in a recent interview with Venturbeat: “It works according to the principle of ‘Never Trust, always check’. By adopting a zero trust architecture, organizations can ensure that only verified users and devices have access to sensitive data and applications.”

Cisco’s Universal ZTNA Expands this model to AI agents. The platform is expanding zero confidence outside man and IoT devices to include autonomous AI systems, offering automated discovery and delegated authorization to scale.

See also  Naked woman removed from the southwest of the plane in Houston, on video

Automated Playbooks immediately respond to identity abnormalities. When malware causes irregularities authentication, Xsiam attracts access and launches forensic analysis without human intervention. This zero-late sponge becomes the operational basic line.

Zscaler CEO Jay Chaudhry identified the core vulnerability Zenith Live 2025: “Network protocols are designed to allow trusted devices to communicate freely. AI arms these legacy architecture on a scale. Opponents make phishing campaigns that compromise the identities of the agent faster than people can respond.”

Universal ZTNA frameworks make the implementations of million agent possible

The architectural requirements are clear. Universal Zero Trust Network Access (ZTNA) Frameworks in the industry offer four options that are essential for AI environments.

The implementation of Cisco shows the required scale. Their universal ZTNA platform performs automated discovery scans every 60 seconds and catalogs new AI implementations and authorization sets. This eliminates blind spots on which attackers focus. The delegated authorization engine of Cisco maintains the least-privilege limits by policy engines that process 100,000 decisions per second.

Extensive audit paths record every agent action for forensic research. Security teams use platforms such as Cisco’s can reconstruct incidents about millions of interactions. Native support for standards such as the Model context protocol Ensures interoperability as the ecosystem evolves.

Ivanti’s approach complements these possibilities with AI-driven analyzes. Daren Goeson, SVP of product management at Ivanti, emphasizes: “AI-driven end point security aids can analyze enormous amounts of data to detect anomalies and predict potential threats faster and more accurately than any human analyst. These tools offer a clear visibility of devices, users and networks, users and networks.”

Cisco’s AI security architecture sets the industrial direction

The AI ​​Secure Factory from Cisco positions them as the first non-Nvidia silicon provider in Nvidia’s reference architecture. By combining post-quantum coding with new devices, Cisco builds up infrastructure to protect against threats that do not yet exist. The Enterprise Takeaway: Security is not optional; It is architectural.

See also  Tim Cook reportedly tells employees Apple 'must' win in AI

At Cisco Live 2025, the company unveiled an extensive identity and AI security strategy that tackles each layer of the stack:

AnnouncementCore problem solved / strategic valueTechnical detailsAvailability
Hybrid mesh firewall (incl. Hypershield)Distributed, substance-native security; Moves security from the circumference to the network fabricEBPF-based enforcement; Hardware –New firewalls: October 2025
Live protectClose the “45-day patch versus 3-day exploit” gap with rapid vulnerability at kernel-level shieldingReal-time patching without rebootsNexus OS: September 2025
Splunk: free firewall log intakeReduces the SIEM costs to 80%; stimulates the adoption of Cisco FirewallUnlimited Log -Innea in Cisco FirewallsAug 2025 August
Splunk: Positability for AIOffers critical visibility in AI pile performanceMonitors GPU use and model performanceSept 2025
Duo IAMEvolves from MFA to a complete security-first IAM platformUser directory, SSO, identity routering engineNow available
DUO: Nearbyity verificationSupplies phishing-resistant authentication without hardware chefsBle-based proximity, biometric verificationPart of the new Duo IAM
DUO: Identity ResilienceFocus on critical IDP risksRedundancy, load balancing and automated failoverIn development
Cisco Universal ZTNAExpands zero confidence to people, IoT/OT devices and AI agentsAutomated discovery, delegated authorizationConstant evolution
Open-sourced security AI modelDemocratizes AI defense; 8b parameters correspond to 70b model performanceRuns on CPU; 5B Security Tokens TrainingAvailable (hugging face)
AI Defense and Nvidia PartnershipProtects AI -Development pipelineNVIDIA NIM MicroServices OptimizationNow available
Security after the quantumFuture -proof against quantum attacksMacsec and IPSEC codingNew devices (June 2025)
Identity intelligenceContinuous behavioral monitoringAI-driven anomalia detectionPart of Security Cloud
Security of accessConverge VPN and ZTNA possibilitiesWolk-delivered secure access service EdgeNow available

Cross-liver-collaboration accelerates

The Cloud Security Alliance Zero Trust Advancement Center Now includes every major security seller. This unprecedented cooperation makes uniform security policy on various platforms possible.

“Security suppliers must agree against common threats,” emphasized George Kurtz, CEO of Crowdstrike, during a recent platform strategy discussion. “The data -oriented approach wins, given how fast opponents and threats are evolving.”

Cisco President and CPO Jeetu Patel repeated this sentiment in an interview with Venturebeat: “Security is a condition for the approval of AI. If people do not trust the system, they will not use it.”

The organizational challenge remains. Robert Grazioli, CIO at Ivanti, identifies the critical barrier: “CISO and CIO coordination will be crucial in 2025. This cooperation is essential if we have to protect modern companies effectively. Executives must consolidate resources – budgets, personnel, data and technology – to improve the security attitude of an organization.”

The identity account

When Cisco, Okta, Zscaler, Palo Alto Networks and Crowdstrike draw independently to identical conclusions about identity architecture, the confirmation is no coincidence.

Identity infrastructure determines security results. Organizations are confronted with two options: architectural identity such as the control surface or accept breaches as inevitable. The gap between AI implementation speed and the maturity of identity protection narrower daily.

Three promotions can’t wait. Audit the identity and permissions of each AI agent within 30 days. Implement continuous verification for all non-human identities immediately. Set up 24/7 identity security activities to prevent opponents from exploiting gaps.

The seller’s consensus sends a clear and unmistakable signal. Identity has become the control surface for AI security. Companies that do not adapt will spend 2025 managing infringements instead of innovation.


Source link
Back to top button