DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

CyberArk Introduces Secure AI Agents Solution

DigitalCIO Bureau by DigitalCIO Bureau
November 6, 2025
in Tech News
0
CyberArk Introduces Secure AI Agents Solution
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter
CyberArk  has announced the general availability of the CyberArk Secure AI Agents Solution, expanding the CyberArk Identity Security Platform with industry-first privilege controls to secure the rapidly growing class of AI agent identities. As organizations rapidly adopt AI agents to automate tasks and drive efficiency, these autonomous entities are emerging as a powerful — and privileged — new identity class. AI agents introduce novel risks, including agent hallucinations, misuse, and potential takeover by malicious actors. These risks are heightened when agents require elevated privileges. The CyberArk Secure AI Agents Solution addresses these challenges by applying the right level of privilege controls, helping to ensure that AI agents have only the access they need, when they need it, and nothing more. This approach reduces risk, helps prevent unauthorized access, and enables organizations to scale AI-driven initiatives with confidence. “As organizations embrace AI agents, both builders and defenders must understand how identity-centric risks evolve when agents require elevated privileges,” said Matt Cohen, CEO, CyberArk. “Without strong discovery, robust privilege controls, and comprehensive lifecycle management, organizations risk losing visibility and opening the door to catastrophic agentic attacks. CyberArk uniquely secures the full spectrum of identities — humans, machines and AI agents — by applying the right level of privilege controls, enabling innovation while maintaining security and compliance.” Securing AI Agents Requires a Privilege-Focused Approach According to new CyberArk CISO research, AI agent adoption is expected to reach 76% within three years, yet fewer than 10% of organizations have adequate security and privilege controls in place. The report, Securing Agentic AI: Identity as the Emerging Foundation for Defense, reveals that:
  • Nearly 40% of enterprise financial institutions and software companies already have agentic AI in production.
  • Fewer than one in ten organizations have deployed agentic security controls such as risk registries and dynamic authorization at scale.
  • Two-thirds of CISOs in financial services and software rank agentic AI among their top three cybersecurity risks, with more than one-third citing it as their top concern.
  • Most expect AI agent security to drive increased cybersecurity spending in the coming year.
The CyberArk Identity Security Platform delivers comprehensive privilege controls across the full spectrum of identities: human, machine, and AI. With the introduction of the Secure AI Agents Solution, these proven capabilities are extended to autonomous AI agents, applying the same principles of just-in-time access, least privilege, and continuous session monitoring that have defined CyberArk’s leadership in identity security. This unified, privilege-first approach ensures that every identity is governed, secured, and monitored with the same rigor — enabling innovation without compromising security or compliance. The CyberArk Secure AI Agents Solution will deliver:
  • Comprehensive Agent Discovery: Automatically detect AI agents across SaaS, cloud, and developer environments, with enriched profiles including ownership, roles, and access rights.
  • Secure Agent Access: Enforce strong authentication and least-privilege access, with zero standing privileges and agent activity auditing.
  • Real-Time Threat Detection: Continuously monitor for anomalies and unauthorized access, triggering automated alerts and rapid response.
  • Lifecycle Management and Compliance: Govern AI agent from creation through decommission, supporting evolving regulatory requirements and audit readiness.
Tags: CyberArk
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails

CrowdStrike Acquires Identity Security Startup SGNL

by DigitalCIO Bureau
January 9, 2026
0
CrowdStrike Launches on Amazon Business

CrowdStrike has signed a definitive agreement to acquire SGNL, a leader in Continuous Identity. This acquisition will accelerate CrowdStrike’s leadership in Next-Gen Identity Security, enabling access for human, non-human (NHI),...

Read moreDetails

Veeam Closes Security Vulnerabilities in Backup & Replication Software

by DigitalCIO Bureau
January 8, 2026
0
Veeam Updates Ransomware Protection and Security for Kubernetes with New Release of Kasten by Veeam K10 V6.5 

Veeam is addressing several security vulnerabilities in its Backup & Replication software. These include a critical vulnerability that could allow remote code execution. The vulnerability, designated CVE-2025-59470, has...

Read moreDetails
Next Post
Proofpoint Unveils Data Security Landscape Report

Proofpoint Unveils Data Security Landscape Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Why the Drones are Clear and Present Danger & Cybersecurity Concern

October 14, 2019
Majority Organizations View Ransomware as a Top-three Threat to the Viability of the Business

Majority Organizations View Ransomware as a Top-three Threat to the Viability of the Business

September 26, 2023
Intel Sells Majority Stake In Altera To Silver Lake For $8.75 Billion

Intel Sells Majority Stake In Altera To Silver Lake For $8.75 Billion

April 16, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?