Skip to main content

The Shift Toward Agentic Security: Addressing the Identity Blind Spot

As enterprises aggressively integrate autonomous agents into their operational stacks, a critical security gap has emerged. Traditional identity and access management (IAM) systems were designed for human users or static machine accounts. They were never architected to handle the non-deterministic, high-velocity logic inherent in agentic AI.

Permiso Security Inc. is moving to close this exposure by introducing specialized runtime security capabilities for AI agents. By focusing on deep visibility, the platform moves beyond the common industry trend of static posture management, addressing instead the chaotic reality of how AI agents interact with infrastructure, data, and sub-agents in real-time.

Moving Beyond Posture to Real-Time Observability

Much of the current cybersecurity market is fixated on posture—a static snapshot of where an agent lives and what permissions it theoretically holds. However, posture management fails when an agent begins its execution cycle. Because agents operate at machine speed and make context-dependent decisions in milliseconds, a policy set that looks secure at rest can become a massive liability during runtime.

Permiso’s approach treats the agent as a dynamic entity rather than a static piece of code. This is a crucial distinction for CISOs. By treating agentic identities with the same scrutiny as human users, the platform forces observability into the specific tool calls, sub-agent spawning, and data access requests that define agent behavior. This visibility is essential for auditing, especially as complex agents begin to interact with external Model Context Protocol (MCP) servers and sensitive downstream data stores.

The Non-Deterministic Risk Factor

Jason Martin, co-founder and co-CEO of Permiso, highlights a fundamental friction point in modern security: the impossibility of applying deterministic, rule-based security to a non-deterministic, LLM-driven brain. When an AI agent performs an unintended action, security teams often lack the forensics to understand why that decision was made or which human identity initiated the process.

Permiso attempts to mitigate this by mapping runtime identity attribution, which links tool calls back to the specific human or non-human identity that launched the agent. This capability is vital for managing the risk of LLMjacking and malicious agent skills, which have become increasingly prevalent. By providing kill switches and approval gates, the platform gives security teams the control they currently lack, moving from reactive mitigation to active runtime governance.

Industry Implications and Adoption

The validation provided by Autodesk, which is utilizing Permiso to secure its global workforce and AI infrastructure, signals a shift in enterprise requirements. Organizations that are deploying AI at scale are no longer content with black box agent deployments. They require granular oversight that spans from standard code environments like Lambda functions and containers to the complexities of SaaS-integrated agents.

Technically, Permiso’s decision to utilize an API-based, agentless architecture is a strategic advantage. By avoiding the need for infrastructure modifications, they reduce the barrier to entry for security teams currently struggling to inventory their shadow AI landscape. As enterprises transition from basic chatbots to autonomous agents that hold increasing levels of authority, the visibility layer offered by Permiso represents a necessary evolution in cloud-native defense, prioritizing behavioral analysis over static policy.