▾ G11 Media Network: | ChannelCity | ImpresaCity | SecurityOpenLab | Italian Channel Awards | Italian Project Awards | Italian Security Awards | ...
InnovationOpenLab

Permiso Security Brings Identity Runtime Attribution to AI Agents: Extending Discover, Protect, and Defend Across the Full Agent Lifecycle

Permiso Security, the unified identity security platform, today announced AI agent runtime security capabilities that give security teams the ability to discover every agent in their environment, mana...

Immagine

Autodesk becomes launch customer as Permiso extends its unified identity platform to cover the fastest-growing and least-governed identity class in the enterprise.

PALO ALTO, Calif.: Permiso Security, the unified identity security platform, today announced AI agent runtime security capabilities that give security teams the ability to discover every agent in their environment, managed or shadow, and maintain continuous visibility into agent runs, events, tool calls, and data access across agents, sub-agents, MCP servers, and the underlying infrastructure those agents operate on. Autodesk, a Fortune 500 design and engineering software company, is deploying the capabilities to secure AI agents operating across its products, global workforce, and cloud infrastructure.

"Autodesk is investing significantly in AI across our workforce, infrastructure, and products. Permiso Security was already our security platform for Identities, so the natural next step was to partner with them for Agentic AI Identities. Permiso gave us the ability to discover agents across our environment, maintain a full registry, attribute actions to an initiating identity, and monitor all events, runs, and tool calls touching our systems. This is non-negotiable when you’re securing enterprise AI at scale. In the agentic era, visibility and threat detection are what allows us to move fast."

- Sebastian Goodwin, Chief Trust Officer, Autodesk

Agents are making autonomous decisions, calling external tools and MCP servers, spawning sub-agents, and interacting with downstream data stores and systems at machine speed, often without human oversight. Most security teams cannot answer fundamental questions about their agent environment: how many agents are running, what identities they are using, what tools they are calling, or what data they are accessing.

Most of the market is solving for posture: where agents are, how they authenticate, what permissions they hold. Posture matters. But posture is a snapshot. Agents operate in real time, making context-dependent decisions across tools, data stores, and downstream systems in milliseconds. The security question that actually keeps security professionals up at night is not what an agent is allowed to do, it is what it is doing right now, and whether you can stop it.

Traditional identity providers lose visibility the moment an agent authenticates, and NHI security vendors are treating agents like static machine identities when agents actually behave more like humans in their credential usage, logging in as the users who deployed them and making context-dependent decisions in real time.

"The market is full of vendors claiming they can prevent AI agent security incidents. As someone who has spent decades in the security industry, I can tell you that’s not possible. You are putting a deterministic capability on a non-deterministic brain. Agents will do things they were not supposed to do. The question is whether you have visibility into every run, every tool call, and every piece of data an agent touches to detect when it happens, and the controls to contain it. That is what we built."

- Jason Martin, Co-Founder and Co-CEO, Permiso Security

How it Works: Permiso’s AI Agent Runtime Security

Purpose-built for the specific challenges agents create: non-deterministic behavior, dynamic tool usage, inherited credential chains, and runtime activity that traditional security tools were never designed to monitor. The platform delivers agent runtime identity attribution and agent behavioral anomaly detection across the full agent lifecycle, from the moment an agent is born in a code repository through deployment, runtime operation, and containment. The six core capabilities include:

  • Agent and session discovery that inventories every AI agent, sub-agent, builder, model, and user across cloud, SaaS, IdPs, and code environments, including agents running in Lambdas, containers, and VMs that traditional identity tools cannot see.
  • Identity attribution at runtime that ties every run, event, tool call, and MCP invocation to a specific human, non-human, or AI identity, visualized through Permiso's agent graph and preserved as a complete audit trail.
  • Tool, data, and infrastructure observability captures what tools an agent called, what MCP servers it connected to, what data it accessed, and what downstream systems it reached.
  • Runtime detection of over-privileged access, unused permissions, anomalous tool usage, policy violations, and high blast radius behavior, surfaced in the same alert module security teams already use for human and non-human identity threats.
  • Behavioral skill sandboxing of new and existing agent skills.
  • Identity-first controls including least privilege recommendations based on actual agent behavior, approval gates for high-risk actions, and kill switches that operate at machine speed.

These capabilities are informed by years of AI-specific threat research from Permiso's P0 Labs team, including the discovery of LLMjacking attack techniques, cross-prompt injection vulnerabilities in enterprise AI copilots, and analysis of malicious AI agent skills across public marketplaces.

"Every enterprise we talk to is deploying AI agents. Almost none of them can tell us how many agents are running, what identities those agents are using, or what MCP servers they are calling. We are not asking customers to buy a new product. We are extending the platform they already trust to cover the fastest-growing and least-governed identity class in the enterprise."

- Paul Nguyen, Co-Founder and Co-CEO, Permiso Security

Availability

Permiso’s AI agent runtime security capabilities are available today for existing and new customers. The platform connects through agentless, API-based architecture with no infrastructure changes required. To learn more about the full capabilities, read the product blog or request a demo at permiso.io

About Permiso Security

Permiso Security is an identity security platform that discovers, protects, and defends against human, non-human, and AI identity threats across cloud and on-premise environments. The platform unifies and classifies identities across cloud and on-premise environments, assessing exposure risk strengthening security posture before threats materialize. When threats do emerge, Permiso identifies suspicious and malicious identity behavior across all environments for human, non-human, and AI identities; surfacing high-fidelity detections that SIEMs, IGA, and NHI solutions miss natively. Permiso's Universal Identity Graph correlates identity behavior across IdPs, cloud accounts, on-premise environments, and infrastructure to uncover identity relationships, power risk scoring, and surface high-fidelity threats that SIEMs, IGA, and NHI/AI solutions miss natively. Permiso is the 2026 SC Award winner for Best Threat Detection Technology. Learn more at permiso.io.

Fonte: Business Wire

If you liked this article and want to stay up to date with news from InnovationOpenLab.com subscribe to ours Free newsletter.

Related news

Last News

RSA at Cybertech Europe 2024

Alaa Abdul Nabi, Vice President, Sales International at RSA presents the innovations the vendor brings to Cybertech as part of a passwordless vision for…

Italian Security Awards 2024: G11 Media honours the best of Italian cybersecurity

G11 Media's SecurityOpenLab magazine rewards excellence in cybersecurity: the best vendors based on user votes

How Austria is making its AI ecosystem grow

Always keeping an European perspective, Austria has developed a thriving AI ecosystem that now can attract talents and companies from other countries

Sparkle and Telsy test Quantum Key Distribution in practice

Successfully completing a Proof of Concept implementation in Athens, the two Italian companies prove that QKD can be easily implemented also in pre-existing…

Most read

Circle Reports First Quarter 2026 Results

Circle Internet Group, Inc. (NYSE: CRCL) today announced results for the first quarter of fiscal year 2026. Financial Highlights (Q1’26 vs. Q1’25) USDC…

Alibaba Group Announces March Quarter 2026 and Fiscal Year 2026 Results

$BABA #alibaba--Alibaba Group Holding Limited (NYSE: BABA and HKEX: 9988 (HKD Counter) and 89988 (RMB Counter), “Alibaba”, “Alibaba Group” or the “company”)…

Dynatrace Reports Fourth Quarter and Full Year Fiscal 2026 Financial Results

Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced financial results for the fourth quarter and full year ended March…

Faraday Future Announces First Quarter 2026 Earnings Release Date and…

Faraday Future Intelligent Electric Inc. (NASDAQ: FFAI) (“Faraday Future”, “FF” or the “Company”), a California-based global Embodied AI (EAI) ecosystem…

Newsletter signup

Join our mailing list to get weekly updates delivered to your inbox.

Sign me up!