Separator

SentinelOne Launches New Identity Portfolio

Separator

img

SentinelOne, the leader in AI-driven security, today launched new identity solutions aimed at protecting human identities and addressing the swift increase of AI agents and non-human identities in the workplace.

Identity attacks have historically been a preferred method for both nation-state actors and cybercriminals. Security and identity firms have primarily concentrated on preventing these attacks at the entry point: the authentication and permissions layer.

Nevertheless, these attacks persist, as threat actors refine their tactics, techniques, and procedures (TTPs) aimed at evading these defenses. A malicious individual who accesses a system as an authorized worker and utilizes approved IT tools for lateral movement and data exfiltration can inflict considerable damage without detection.

The emergence of autonomous agents performing independent tasks introduces a new layer of identity-related risks, as these agents are responsible for engaging with systems and acting without human oversight.

SentinelOne's method aims to prevent identity attacks by adhering to one fundamental principle: authorization by itself is inadequate. Access needs to be constantly verified and, if required, revoked during execution. Execution must always be constrained by real-time behavioral guardrails, whether it occurs on the endpoint, in the browser, or within an AI workflow.

Also Read: A Brief History of India's Transformation Under PM Narendra Modi

Jeff Reed, CTO of SentinelOne says, “The rise of AI as autonomous, non-human identities is expanding the attack surface and creating new governance challenges. Identity risk no longer begins and ends at authentication, and attackers are increasingly operating within authorized workflows.

SentinelOne is uniquely positioned to lead this evolution with our AI-native platform that was built to correlate identity, endpoint, and workload signals, enabling security teams to analyze behavioral intent and autonomously contain both human and machine-driven misuse as it unfolds.”

Also Read: 5 Latest CHRO Appointments in Global Corporations

Contemporary identity assaults occur through browsers, endpoints, AI applications, and automated tasks. Maintaining authorized routes necessitates ongoing verification throughout each of them. Conventional identity platforms were created for human users and fixed service accounts, not for autonomous agents that perform tasks and vanish in milliseconds.

 

Also Read: How This Techie Turned Visa Struggles into Startup Success

Human identity necessitates ongoing confirmation of user authenticity, whereas non-human identity demands persistent validation of intent via behavior. Authorization by itself cannot ensure that validation, and the behavior of the agent may stray from its intended role.

 

In Print




Most Viewed



🍪 Do you like Cookies?

We use cookies to ensure you get the best experience. Read more…