Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

New study reveals how many people are using AI for companionship — and the results are surprising

Meltwater Ponds May Have Cradled Complex Life When Earth Froze Over

Retail Resurrection: David’s Bridal bets its future on AI after double bankruptcy

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • Amazon (Titan)
    • Anthropic (Claude 3)
    • Cohere (Command R)
    • Google DeepMind (Gemini)
    • IBM (Watsonx)
    • Inflection AI (Pi)
    • Meta (LLaMA)
    • OpenAI (GPT-4 / GPT-4o)
    • Reka AI
    • xAI (Grok)
    • Adobe Sensi
    • Aleph Alpha
    • Alibaba Cloud (Qwen)
    • Apple Core ML
    • Baidu (ERNIE)
    • ByteDance Doubao
    • C3 AI
    • DataRobot
    • DeepSeek
  • AI Research & Breakthroughs
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Education AI
    • Energy AI
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Media & Entertainment
    • Transportation AI
    • Manufacturing AI
    • Retail AI
    • Agriculture AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
Facebook X (Twitter) Instagram
Advanced AI News
VentureBeat AI

Identity becomes the control plane for enterprise AI security

Advanced AI EditorBy Advanced AI EditorJune 26, 2025No Comments8 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more

Stolen credentials are responsible for 80% of enterprise breaches. Every major security vendor has converged on the same conclusion: Identity is now the control plane for AI security. Scale alone demands this shift. Enterprises managing 100,000 employees will handle more than one million identities when AI agents enter production.

Traditional identity access management (IAM) architectures can’t scale to secure the proliferation of agentic AI. They were built for thousands of human users, not millions of autonomous agents operating at machine speed with human-level permissions. The industry response represents the most significant security transformation since the adoption of cloud computing.

Proximity-based authentication replaces hardware tokens

Leading vendors now use Bluetooth Low Energy (BLE) between devices and laptops to prove physical proximity. Combined with cryptographic identities and biometrics, this creates four-factor authentication without the need for hardware tokens.

Cisco’s Duo demonstrates this innovation at scale. Their proximity verification delivers phishing-resistant authentication using BLE-based proximity in conjunction with biometric verification. This capability, unveiled at Cisco Live 2025, represents a fundamental shift in authentication architecture.

Microsoft’s Entra ID handles 10,000 AI agents in single pilot programs while processing 8 billion authentications daily. “Traditional directory services weren’t architected for autonomous systems operating at this velocity,” states Alex Simons, CVP of identity at Microsoft.

Ping Identity’s DaVinci orchestration platform pushes further. The system processes more than 1 billion authentication events daily, with AI agents accounting for 60% of the traffic. Each verification completes in under 200 milliseconds while maintaining cryptographic proof.

Behavioral analytics catch compromised agents in real time

CrowdStrike treats AI agents like any other identity threat. Their Falcon platform establishes behavioral baselines for each agent within 24 hours. Deviations trigger automated containment within seconds.

“When an AI agent suddenly accesses systems outside its established pattern, we treat it identically to a compromised employee credential,” Adam Meyers, head of counter adversary operations at CrowdStrike, told VentureBeat. The platform tracks 15 billion AI-related events daily across customer environments.

That speed matters. CrowdStrike’s 2025 Global Threat Report documents that adversaries are achieving initial access in less than 10 minutes. They move laterally across 15 systems within the first hour. AI agents operating with compromised identities amplify this damage exponentially.

Identity resilience prevents catastrophic failures

Enterprises average 89 different identity stores across cloud and on-premises systems, according to Gartner. This fragmentation creates blind spots that adversaries exploit daily. The fix applies networking principles to identity infrastructure.

Okta’s Advanced Server Access implements redundancy, load balancing and automated failover across identity providers. When primary authentication fails, secondary systems activate within 50 milliseconds. This becomes mandatory when AI agents execute thousands of operations per second.

“Identity is security,” Todd McKinnon, CEO of Okta, said at Oktane 2024. “When you move AI into production, you give agents access to real systems, real data and your customer data. One compromised agent identity cascades across millions of automated actions.”

Zero trust scales for agent proliferation

Palo Alto Networks’ Cortex XSIAM completely abandons perimeter defense. The platform operates on the assumption of continuous compromise. Every AI agent undergoes verification before each action, not just at initial authentication.

Mike Riemer, Field CISO at Ivanti, reinforced the zero trust approach in a recent interview with VenturBeat: “It operates on the principle of ‘never trust, always verify.’ By adopting a zero trust architecture, organizations can ensure that only authenticated users and devices gain access to sensitive data and applications.”

Cisco’s Universal ZTNA extends this model to AI agents. The platform expands zero trust beyond humans and IoT devices to encompass autonomous AI systems, providing automated discovery and delegated authorization at scale.

Automated playbooks respond instantly to identity anomalies. When malware triggers authentication irregularities, XSIAM revokes access and launches forensic analysis without human intervention. This zero-latency response becomes the operational baseline.

Zscaler CEO Jay Chaudhry identified the core vulnerability at Zenith Live 2025: “Network protocols were designed to allow trusted devices to communicate freely. AI weaponizes this legacy architecture at scale. Adversaries craft phishing campaigns that compromise agent identities faster than humans can respond.”

Universal ZTNA frameworks enable million-agent deployments

The architectural requirements are clear. Universal zero trust network access (ZTNA) frameworks across the industry provide four capabilities essential for AI environments.

Cisco’s implementation demonstrates the scale required. Their Universal ZTNA platform performs automated discovery scans every 60 seconds, cataloging new AI deployments and permission sets. This eliminates blind spots that attackers target. Cisco’s delegated authorization engine enforces least-privilege boundaries through policy engines processing 100,000 decisions per second.

Comprehensive audit trails capture every agent action for forensic investigation. Security teams using platforms like Cisco’s can reconstruct incidents across millions of interactions. Native support for standards like the Model Context Protocol ensures interoperability as the ecosystem evolves.

Ivanti’s approach complements these capabilities with AI-powered analytics. Daren Goeson, SVP of product management at Ivanti, emphasizes: “AI-powered endpoint security tools can analyze vast amounts of data to detect anomalies and predict potential threats faster and more accurately than any human analyst. These tools provide clear visibility across devices, users and networks, proactively identifying potential security gaps.”

Cisco’s AI security architecture sets industry direction

Cisco’s AI Secure Factory positions them as the first non-Nvidia silicon provider in Nvidia’s reference architecture. By combining post-quantum encryption with new devices, Cisco is building infrastructure to protect against threats that don’t yet exist. The enterprise takeaway: Securing AI isn’t optional; it’s architectural.

At Cisco Live 2025, the company unveiled a comprehensive identity and AI security strategy that addresses every layer of the stack:

AnnouncementCore problem solved / strategic valueTechnical detailsAvailabilityHybrid mesh firewall (incl. HyperShield)Distributed, fabric-native security; moves security from the perimeter into the network fabriceBPF-based enforcement; hardware accelerationNew firewalls: Oct 2025Live protectCloses “45-day patch vs. 3-day exploit” gap with rapid, kernel-level vulnerability shieldingReal-time patching without rebootsNexus OS: Sept 2025Splunk: Free firewall log ingestionReduces SIEM costs up to 80%; incentivizes Cisco firewall adoptionUnlimited log ingestion from Cisco firewallsAug 2025Splunk: Observability for AIProvides critical visibility into AI stack performanceMonitors GPU utilization and model performanceSept 2025Duo IAMEvolves from MFA to a complete security-first IAM platformUser Directory, SSO, Identity Routing EngineAvailable NowDuo: Proximity verificationDelivers phishing-resistant authentication without hardware tokensBLE-based proximity, biometric verificationPart of the new Duo IAMDuo: Identity resilienceAddresses critical IDP outage risksRedundancy, load balancing and automated failoverIn developmentCisco universal ZTNAExpands zero trust to humans, IoT/OT devices and AI agentsAutomated discovery, delegated authorizationOngoing evolutionOpen-sourced security AI modelDemocratizes AI defense; 8B parameters match 70B model performanceRuns on CPU; 5B security tokens trainingAvailable (Hugging Face)AI defense and Nvidia partnershipSecures AI development pipelineNvidia NIM microservices optimizationAvailable nowPost-quantum securityFuture-proof against quantum attacksMACsec and IPsec encryptionNew devices (June 2025)Identity intelligenceContinuous behavioral monitoringAI-powered anomaly detectionPart of Security CloudSecure accessConverges VPN and ZTNA capabilitiesCloud-delivered secure access service edgeAvailable now

Cross-vendor collaboration accelerates

The Cloud Security Alliance Zero Trust Advancement Center now includes every major security vendor. This unprecedented cooperation enables unified security policies across platforms.

“Security vendors must unite against common threats,” George Kurtz, CEO of CrowdStrike, emphasized during a recent platform strategy discussion. “The data-centric approach wins given how fast adversaries and threats evolve.”

Cisco President and CPO Jeetu Patel echoed this sentiment in an interview with VentureBeat: “Security is a prerequisite for adoption of AI. If people don’t trust the system, they’re not going to use it.”

The organizational challenge remains. Robert Grazioli, CIO at Ivanti, identifies the critical barrier: “CISO and CIO alignment will be critical in 2025. This collaboration is essential if we are to safeguard modern businesses effectively. Executives need to consolidate resources — budgets, personnel, data and technology — to enhance an organization’s security posture.”

The identity reckoning

When Cisco, Okta, Zscaler, Palo Alto Networks and CrowdStrike independently reach identical conclusions about identity architecture, it’s confirmation, not coincidence.

Identity infrastructure determines security outcomes. Organizations face two options: Architect identity as the control plane or accept breaches as inevitable. The gap between AI deployment speed and identity security maturity narrows daily.

Three actions cannot wait. Audit every AI agent’s identity and permissions within 30 days. Deploy continuous verification for all non-human identities immediately. Establish 24/7 identity security operations to prevent adversaries from exploiting gaps.

The vendor consensus sends a clear and unmistakable signal. Identity has become the control plane for AI security. Enterprises that fail to adapt will spend 2025 managing breaches instead of innovation.

Daily insights on business use cases with VB Daily

If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.

Read our Privacy Policy

Thanks for subscribing. Check out more VB newsletters here.

An error occured.



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleYouTube adds an AI Overviews-like search results carousel
Next Article With Russia at war, MIT students work to help Ukraine remove bombs
Advanced AI Editor
  • Website

Related Posts

Retail Resurrection: David’s Bridal bets its future on AI after double bankruptcy

June 28, 2025

Catio wins ‘coolest tech’ award at VB Transform 2025

June 28, 2025

CTGT wins Best Presentation Style award at VB Transform 2025

June 28, 2025
Leave A Reply Cancel Reply

Latest Posts

How Labubu Dolls Became 2025’s Viral Fashion Trend

Why Is That Revealing Photograph of Lorde Going Viral?

Vancouver Art Gallery Lays Off 30 Unionized Employees

8 Premium Sunglasses Brands To Celebrate National Sunglasses Day

Latest Posts

New study reveals how many people are using AI for companionship — and the results are surprising

June 28, 2025

Meltwater Ponds May Have Cradled Complex Life When Earth Froze Over

June 28, 2025

Retail Resurrection: David’s Bridal bets its future on AI after double bankruptcy

June 28, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • New study reveals how many people are using AI for companionship — and the results are surprising
  • Meltwater Ponds May Have Cradled Complex Life When Earth Froze Over
  • Retail Resurrection: David’s Bridal bets its future on AI after double bankruptcy
  • Real-Time Soft Body Dynamics for Video Games | Two Minute Papers #103
  • TensorFlow Tutorial (Sherry Moore, Google Brain)

Recent Comments

No comments to show.

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

YouTube LinkedIn
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.