AI & TechArtificial IntelligenceCybersecurityNewswireTechnology

Astrix AI security platform now governs shadow and enterprise agents

▼ Summary

– Astrix Security has expanded its platform to provide comprehensive discovery and control over AI agents across all enterprise layers, including shadow deployments.
– The platform addresses a critical gap where traditional governance processes are too slow, allowing agents to access critical systems before security reviews occur.
– It uses a four-method discovery architecture to find all AI agents and non-human identities by integrating with AI platforms, monitoring credentials, analyzing sensor data, and supporting custom services.
– The system includes a real-time Agent Control Plane with policies that allow security teams to enforce “allow, flag, and block” rules on agent actions before they execute.
– This combined approach provides continuous runtime monitoring to detect anomalous behavior and aims to move enterprises from mere visibility to active enforcement and governance.

The rapid deployment of AI agents has created a critical security gap, as traditional governance frameworks cannot keep pace. While agents can be spun up in minutes, conventional review cycles take weeks, leaving organizations vulnerable. By the time a security review is completed, an agent with access to sensitive systems may already be operational, with no record of its existence or controls over its permissions. This disconnect between visibility and actionable control defines the modern challenge of AI agent security.

To address this, Astrix Security has significantly expanded its platform to provide comprehensive governance across all enterprise AI agents, including both sanctioned and shadow AI deployments. The solution is built on a robust, four-method discovery architecture designed to uncover every agent, MCP server, and associated non-human identity (NHI) across an organization’s entire technology stack.

The first method involves direct AI platform integrations. Astrix connects to major enterprise AI environments,from assistants like Microsoft Copilot to cloud services like Amazon Bedrock and developer frameworks,to catalog every registered agent and server. The second approach, NHI fingerprinting, targets the identity layer. Since every agent authenticates using a credential like an OAuth app or API key, monitoring this layer reveals agents that were never formally registered, including those with privileged access. The third technique leverages sensor telemetry from existing security tools like CrowdStrike EDR or FortiGate network sensors, detecting locally-running agents that bypass platform integrations entirely. Finally, a Bring Your Own Service (BYOS) capability ensures proprietary or custom-built agents are also brought into the fold.

These data streams converge within the Astrix Platform, creating a dynamic inventory that maps each agent to its credentials, accessible resources, and human owner. Risk is automatically scored and prioritized based on potential impact. Crucially, discovery is not a one-time event; the platform continuously monitors runtime behavior to detect anomalous access or credential misuse as it happens, shifting security from reactive breach response to proactive threat prevention.

However, discovery alone is insufficient. Astrix has extended its Agent Control Plane (ACP) with a real-time policy engine. Security teams can now define and enforce granular “allow, flag, and block” rules based on user, department, or resource type. Policies are evaluated before an action executes, and a default rule ensures any activity from an unrecognized shadow agent is immediately flagged. This moves organizations from simply knowing what agents exist to actively governing what they are permitted to do.

“Shadow AI agents are not a theoretical problem. Before security knows an agent exists, it already has access to sensitive data and production operations with no owner on record,” said Idan Gour, President of Astrix Security. “Agents don’t just read anymore. They write, delete, and execute across systems. Discovery tells you what’s there. Policy enforcement tells you what it’s allowed to do. That full arc is what a real agent control plane looks like.”

Establishing a complete agent inventory and implementing real-time controls also unlocks enterprise AI productivity. Without clear visibility and governance, companies cannot confidently determine which agents to trust, scale, or integrate into a cohesive organizational strategy. This comprehensive approach closes the loop, providing the foundation needed to secure and strategically leverage AI at scale.

(Source: Help Net Security)

Topics

ai agent security 98% shadow ai 96% ai governance 94% agent discovery 93% non-human identity 92% agent control plane 91% ai platform integration 89% risk scoring 88% policy enforcement 87% endpoint detection 85%