Non-Human Identity Protections

Clean the Sky - Positive Eco Trends & Breakthroughs

Cisco Acquired Astrix Security for Its Non-Human Identity Platform

Edited by Adam Harrie — May 11, 2026 — Tech
This article was written with the assistance of AI.
Cisco completed its acquisition of Israeli startup Astrix Security, a company founded in 2021 by Alon Jackson and Idan Gour, integrating Astrix’s platform into Cisco Identity Intelligence and Zero Trust products. The platform focused on visibility and control for non-human identities, featuring detection and lifecycle management for software agents, API keys, service accounts and tokens.

Astrix’s tooling was designed to monitor agent behaviour and feed telemetry into event management systems such as Splunk for faster threat detection and response. The startup raised a $45 million Series B round in December 2024 with backing from Menlo Ventures and Anthropic, and Cisco said it plans to integrate Astrix’s capabilities into Duo and Secure Access.

For enterprises, the acquisition provides greater oversight of autonomous AI agents and machine identities, helping reduce risks tied to over-privileged or compromised non-human actors. As organisations expand AI deployments, real-time agent guardrails and revocation workflows are increasingly becoming a core security requirement rather than a niche capability.

Image Credit: Astrix Security
Security for AI agents and machine accounts
Helps decide what coverage and products to prioritize around securing AI agents, API keys, and service accounts—plus how urgent readers feel this is and what capabilities they’d adopt.
1 / 3
When was the last time you reviewed API keys or service accounts at work?
2 / 3
If you were choosing a security tool, how important is non-human identity control?
3 / 3
Which feature would you be most likely to adopt for AI agents at work?

Trend Themes

  1. Non-human Identity Management — Growing demand for lifecycle visibility and policy enforcement around software agents, API keys and tokens creates potential for platforms that map, score and govern machine identities continuously.
  2. Agent Telemetry Integration — Telemetry-driven detection that correlates agent behavior with SIEM and XDR systems opens avenues for contextualized threat models and behavioral baselining of non-human actors.
  3. Real-time Revocation Workflows — Enterprises increasingly needing instantaneous credential revocation and automated remediation suggest opportunities for low-latency orchestration layers tied to identity and access controls.

Industry Implications

  1. Cybersecurity — Security vendors can expand beyond human-centric IAM to offer specialized controls, threat analytics and compliance tooling for machine and agent identities.
  2. Cloud Platform Providers — Cloud providers have scope to integrate native non-human identity governance into IAM, secrets management and service mesh offerings to reduce lateral compromise risk.
  3. Devops and Software Development — Tooling that embeds agent-aware credential lifecycle and telemetry into CI/CD and runtime environments could shift how teams manage automation and pipeline risks.
7.3
Score
Popularity
Activity
Freshness