{"id":26687,"date":"2026-05-04T13:12:20","date_gmt":"2026-05-04T13:12:20","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/26687\/"},"modified":"2026-05-04T13:12:20","modified_gmt":"2026-05-04T13:12:20","slug":"securing-the-agentic-workforce-cisco-announces-intent-to-acquire-astrix-security","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/26687\/","title":{"rendered":"Securing the Agentic Workforce: Cisco Announces Intent to Acquire Astrix Security"},"content":{"rendered":"<p>Today, I\u2019m thrilled to announce our intent to acquire Astrix Security Ltd., a pioneer in Non-Human Identity (NHI) Security.<\/p>\n<p>We\u2019re\u00a0seeing an explosion of AI agents that\u00a0are\u00a0already reshaping the digital enterprise.\u00a0Soon, every person in an organization will be supported by a network of AI agents working continuously at machine speed,\u00a0accessing data, making decisions, and taking action on their behalf.<\/p>\n<p>These agents\u00a0represent\u00a0an entirely new class of coworker: capable of incredible productivity, but also\u00a0capable of unintended harm or malicious behavior if left unsecured.\u00a0This is the new attack surface, and it is growing faster than most organizations realize.<\/p>\n<p>As organizations\u00a0race to\u00a0adopt agentic technologies,\u00a0security teams are under\u00a0real\u00a0pressure to\u00a0enable\u00a0their teams\u00a0while\u00a0securing the use of agents.\u00a0But agent capabilities are advancing faster than most security models, creating a widening gap in visibility, governance, and response.\u00a0According to Cisco\u2019s\u00a0<a href=\"https:\/\/www.cisco.com\/c\/m\/en_us\/solutions\/ai\/readiness-index\/realizing-the-value-of-ai.html\" target=\"_blank\" rel=\"noopener nofollow\">AI Readiness Index<\/a>, only 24% of organizations can control agent actions with proper guardrails and live monitoring, and just 31% feel fully capable of securing their agent AI systems.<\/p>\n<p>That gap between agentic capability and organizational readiness continues to widen. With the emergence of AI models,\u00a0like Mythos,\u00a0we\u2019re\u00a0seeing threat actors reshape the risk landscape in ways that are impossible to ignore.\u00a0Security teams\u00a0are now\u00a0confronting\u00a0a new class of high-impact, AI-accelerated risks.<\/p>\n<p>At Cisco, we are deeply focused on helping customers\u00a0address\u00a0this gap. This is the work that drives us every day.<\/p>\n<p>Meeting the Moment: Our Commitment to AI Security\u00a0<\/p>\n<p>Cisco has been\u00a0moving quickly\u00a0to\u00a0<a href=\"https:\/\/blogs.cisco.com\/news\/reimagining-security-for-the-agentic-workforce\" target=\"_blank\" rel=\"noopener nofollow\">enable the safe\u00a0and secure\u00a0use of AI.<\/a><\/p>\n<p>AI Defense\u00a0helps organizations safely build AI applications\u00a0by\u00a0protecting the models and\u00a0agents\u00a0built internally.\u00a0We\u2019ve\u00a0also\u00a0extended\u00a0our Zero Trust\u00a0Access\u00a0architecture with\u00a0Cisco Secure Access\u00a0and Duo\u00a0Agentic\u00a0Identity\u00a0capabilities to discover and authorize every agent and every action.<\/p>\n<p>Beyond this,\u00a0we continue to build the broader foundation for secure AI:\u00a0open source\u00a0models, tools\u00a0to scan\u00a0and make\u00a0models safer,\u00a0guidance for secure AI\u00a0development, MCP gateways, and\u00a0<a href=\"https:\/\/blogs.cisco.com\/security\/double-defense-secure-firewall-10-0-confronts-encrypted-traffic-emerging-attack-challenges\" target=\"_blank\" rel=\"noopener nofollow\">new capabilities<\/a>\u00a0across our\u00a0firewall\u00a0portfolio to recognize and inspect AI traffic.<\/p>\n<p>We\u2019ve\u00a0also\u00a0been deeply\u00a0engaged in\u00a0<a href=\"https:\/\/blogs.cisco.com\/news\/rising-to-the-era-of-ai-powered-cyber-defense\" target=\"_blank\" rel=\"noopener nofollow\">Project Glasswing<\/a>,\u00a0using it to harden our products against increasingly capable threat actors.\u00a0We\u2019ve\u00a0doubled down on\u00a0<a href=\"https:\/\/blogs.cisco.com\/news\/doubling-down-on-resilient-infrastructure\" target=\"_blank\" rel=\"noopener nofollow\">Resilient Infrastructure<\/a>\u00a0and\u00a0introduced\u00a0<a href=\"https:\/\/blogs.cisco.com\/security\/cisco-liveprotect-bringing-ebpf-powered-protection-into-network-infrastructure\" target=\"_blank\" rel=\"noopener nofollow\">Live Protect<\/a>\u00a0to close critical gaps in vulnerability defense.<\/p>\n<p>And through Splunk, we are automating the SOC so organizations can respond at machine speed, while expanding observability to discover AI, including the <a href=\"https:\/\/blogs.cisco.com\/news\/cisco-announces-the-intent-to-acquire-galileo\" target=\"_blank\" rel=\"noopener nofollow\">recent acquisition of Galileo<\/a>.<\/p>\n<p>But we are nowhere near finished.<\/p>\n<p>Enter\u00a0Astrix\u00a0Security\u00a0<\/p>\n<p>Since\u00a0its\u00a0founding five years ago,\u00a0Astrix\u00a0Security\u00a0has focused on securing the identities and credentials that power modern systems \u2014 API keys, service accounts, and OAuth tokens \u2014 the very credentials that AI Agents are now using (and abusing) to gain access and execute work at scale.<\/p>\n<p>The addition of\u00a0Astrix\u00a0Security\u00a0brings deep capability to discover and secure every AI agent and non-human identity (NHI), including excessive privileges and real-time threats,\u00a0enabling organizations to adopt AI securely and at scale.<\/p>\n<p>Astrix\u00a0Security\u2019s capabilities include:<\/p>\n<p>Discovery &amp; Governance for AI Agents:\u00a0Provide a map of the org\u2019s agentic activity,\u00a0vet policy to resolve hygiene issues, reduce attack surfaces and prevent compliance violations.<br \/>\nAgentic Access &amp; Lifecycle Management:\u00a0Manage AI agents and their NHIs from provisioning to decommissioning.<br \/>\nAgentic Threat Detection &amp; Response:\u00a0Detect and respond to threats such as compromised credentials and out-of-scope agent actions.<br \/>\nSecrets Management:\u00a0Centralized secret management across vaults &amp;\u00a0cloud.<\/p>\n<p>Equally as important,\u00a0Astrix\u00a0Security\u00a0brings a world-class team of security experts who have been focused on this\u00a0problem\u00a0space from the beginning.\u00a0We\u2019re\u00a0excited to welcome the team to Cisco Security!<\/p>\n<p>How it all Fits Together:\u00a0 Zero Trust for Agents and Context for Your AI<\/p>\n<p>At RSA, we\u00a0extended\u00a0<a href=\"https:\/\/blogs.cisco.com\/security\/security-agentic-ai-how-cisco-brings-zero-trust-to-your-new-digital-workforce\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust for the agentic workforce<\/a>,\u00a0combining\u00a0identity discovery\u00a0and management,\u00a0access\u00a0enforcement, and runtime\u00a0behavioral protection\u00a0to govern how agents\u00a0operate\u00a0across enterprise systems.<\/p>\n<p>We plan to integrate\u00a0Astrix\u00a0Security\u2019s capabilities into Cisco Identity Intelligence, strengthening visibility and context across identities within the Cisco Security platform.<\/p>\n<p>We also intend to extend these capabilities into our zero trust access solutions, including Cisco Secure Access and Duo Identity and Access Management, helping organizations secure AI agents and non-human identities across a broad range of use cases.\u00a0Customers will be able to discover, authenticate, and authorize agentic identities, as well as detect and respond when they use Cisco Secure Access as well as Duo.<\/p>\n<p>What makes this\u00a0so\u00a0powerful is Cisco\u2019s visibility across identity, network, application, and infrastructure layers. We\u00a0don\u2019t\u00a0just know what an agent\u00a0is,\u00a0we understand how it behaves. This\u00a0visibility and\u00a0intelligence also\u00a0feeds\u00a0into Splunk (or any SIEM), giving security teams a unified view of agent activity with the context needed to investigate and respond at machine speed.<\/p>\n<p>Cisco: Your Partner\u00a0for\u00a0Agentic AI<\/p>\n<p>Across the enterprise, Cisco is powering, connecting, and securing AI through the infrastructure and software our customers rely on. Our position across the full stack allows us to provide visibility and enforcement beyond traditional boundaries.<\/p>\n<p>Our commitment to open standards ensures we can integrate across environments and meet customers where they are.<\/p>\n<p>Securing AI agents and non-human identities has never been more important.\u00a0We\u2019re\u00a0excited to help customers close this gap, and to welcome the\u00a0Astrix\u00a0Security\u00a0team to Cisco Security.<\/p>\n<p>\u00a0<\/p>\n<p>Forward-Looking Statements\u202f\u00a0\u00a0<br \/>\nThis blog post may be deemed to contain forward-looking statements, which are subject to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995, including statements containing the words \u201ctransform\u201d, \u201cwill,\u201d \u201cplans,\u201d \u201cexpects,\u201d \u201cintends,\u201d \u201cmay,\u201d or \u201ccontinues,\u201d or the negative of these terms or other comparable terminology, as well as similar expressions, or regarding the acquisition building leading edge protection, the expected benefits to Cisco and its customers from completing the acquisition, and plans regarding\u202fAstrix\u00a0Security\u00a0personnel. Readers should not place undue reliance on these forward-looking statements, as these statements are\u00a0management\u2019s\u00a0beliefs and assumptions, many of which, by their nature, are inherently uncertain, and outside of management\u2019s control. Additionally, readers are cautioned that these forward-looking statements are only predictions and may differ materially from actual future events or results due a variety of factors, including, among other things,\u202fthe potential impact on the business of\u00a0Astrix\u00a0Security\u00a0due to the uncertainty about the acquisition, the retention of employees of\u00a0Astrix\u00a0Security\u00a0and the ability of Cisco to successfully integrate\u00a0Astrix\u00a0Security\u00a0and to achieve expected benefits, business and economic conditions and growth trends, customer markets and various geographic regions, global economic conditions and uncertainties in the geopolitical environment and other risk factors set forth in Cisco\u2019s most recent reports on Form 10-K and Form 10-Q. Any forward-looking statements in this\u00a0blog post\u00a0are based on limited information currently available to Cisco, which is subject to change, and Cisco will not necessarily update the information.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"Today, I\u2019m thrilled to announce our intent to acquire Astrix Security Ltd., a pioneer in Non-Human Identity (NHI)&hellip;\n","protected":false},"author":2,"featured_media":26688,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[179,7493,24,17833,314,9578],"class_list":{"0":"post-26687","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-agentic-ai","8":"tag-agentic-ai","9":"tag-agentic-artificial-intelligence","10":"tag-ai","11":"tag-aquisitions","12":"tag-security","13":"tag-zero-trust"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/26687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=26687"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/26687\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/26688"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=26687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=26687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=26687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}