• bitcoinBitcoin(BTC)$76,526.00-1.67%
  • ethereumEthereum(ETH)$2,282.20-1.70%
  • tetherTether(USDT)$1.00-0.02%
  • rippleXRP(XRP)$1.39-1.99%
  • binancecoinBNB(BNB)$623.08-0.83%
  • usd-coinUSDC(USDC)$1.00-0.01%
  • solanaSolana(SOL)$83.69-2.06%
  • tronTRON(TRX)$0.323211-0.54%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.24%
  • dogecoinDogecoin(DOGE)$0.0992340.97%
  • whitebitWhiteBIT Coin(WBT)$54.12-1.44%
  • USDSUSDS(USDS)$1.000.01%
  • HyperliquidHyperliquid(HYPE)$40.20-5.06%
  • leo-tokenLEO Token(LEO)$10.37-0.09%
  • cardanoCardano(ADA)$0.246107-0.65%
  • bitcoin-cashBitcoin Cash(BCH)$447.29-0.18%
  • moneroMonero(XMR)$379.12-3.23%
  • chainlinkChainlink(LINK)$9.23-1.18%
  • CantonCanton(CC)$0.148993-0.22%
  • zcashZcash(ZEC)$336.69-5.51%
  • stellarStellar(XLM)$0.163619-2.84%
  • MemeCoreMemeCore(M)$3.51-14.90%
  • USD1USD1(USD1)$1.000.05%
  • daiDai(DAI)$1.000.06%
  • litecoinLitecoin(LTC)$55.11-0.59%
  • avalanche-2Avalanche(AVAX)$9.16-1.09%
  • hedera-hashgraphHedera(HBAR)$0.088921-2.26%
  • Ethena USDeEthena USDe(USDE)$1.00-0.01%
  • suiSui(SUI)$0.92-0.65%
  • shiba-inuShiba Inu(SHIB)$0.000006-0.15%
  • RainRain(RAIN)$0.0073480.00%
  • paypal-usdPayPal USD(PYUSD)$1.000.01%
  • the-open-networkToncoin(TON)$1.30-0.03%
  • crypto-com-chainCronos(CRO)$0.069225-1.39%
  • Circle USYCCircle USYC(USYC)$1.120.00%
  • tether-goldTether Gold(XAUT)$4,606.47-1.76%
  • Global DollarGlobal Dollar(USDG)$1.00-0.01%
  • BittensorBittensor(TAO)$248.14-0.79%
  • World Liberty FinancialWorld Liberty Financial(WLFI)$0.073051-0.62%
  • BlackRock USD Institutional Digital Liquidity FundBlackRock USD Institutional Digital Liquidity Fund(BUIDL)$1.000.00%
  • pax-goldPAX Gold(PAXG)$4,605.59-1.86%
  • mantleMantle(MNT)$0.63-1.32%
  • polkadotPolkadot(DOT)$1.22-1.29%
  • SkySky(SKY)$0.0881213.68%
  • uniswapUniswap(UNI)$3.23-0.50%
  • Pi NetworkPi Network(PI)$0.1925987.07%
  • Falcon USDFalcon USD(USDF)$1.00-0.09%
  • okbOKB(OKB)$83.61-0.45%
  • nearNEAR Protocol(NEAR)$1.35-2.05%
  • HTX DAOHTX DAO(HTX)$0.0000020.81%
TradePoint.io
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop
No Result
View All Result
TradePoint.io
No Result
View All Result

CrowdStrike, Cisco and Palo Alto Networks all shipped agentic SOC tools at RSAC 2026 — the agent behavioral baseline gap survived all three

March 31, 2026
in AI & Technology
Reading Time: 7 mins read
A A
CrowdStrike, Cisco and Palo Alto Networks all shipped agentic SOC tools at RSAC 2026 — the agent behavioral baseline gap survived all three
ShareShareShareShareShare

CrowdStrike CEO George Kurtz highlighted in his RSA Conference 2026 keynote that the fastest recorded adversary breakout time has dropped to 27 seconds. The average is now 29 minutes, down from 48 minutes in 2024. That is how much time defenders have before a threat spreads. Now CrowdStrike sensors detect more than 1,800 distinct AI applications running on enterprise endpoints, representing nearly 160 million unique application instances. Every one generates detection events, identity events, and data access logs flowing into SIEM systems architected for human-speed workflows.

YOU MAY ALSO LIKE

Union accuses Apple of unlawful discrimination against represented workers

Lyft to Acquire London Black Cab App Gett

Cisco found that 85% of surveyed enterprise customers have AI agent pilots underway. Only 5% moved agents into production, according to Cisco President and Chief Product Officer Jeetu Patel in his RSAC blog post. That 80-point gap exists because security teams cannot answer the basic questions agents force. Which agents are running, what are they authorized to do, and who is accountable when one goes wrong.

“The number one threat is security complexity. But we’re running towards that direction in AI as well,” Etay Maor, VP of Threat Intelligence at Cato Networks, told VentureBeat at RSAC 2026. Maor has attended the conference for 16 consecutive years. “We’re going with multiple point solutions for AI. And now you’re creating the next wave of security complexity.”

Agents look identical to humans in your logs

In most default logging configurations, agent-initiated activity looks identical to human-initiated activity in security logs. “It looks indistinguishable if an agent runs Louis’s web browser versus if Louis runs his browser,” Elia Zaitsev, CTO of CrowdStrike, told VentureBeat in an exclusive interview at RSAC 2026. Distinguishing the two requires walking the process tree. “I can actually walk up that process tree and say, this Chrome process was launched by Louis from the desktop. This Chrome process was launched from Louis’s Claude Cowork or ChatGPT application. Thus, it’s agentically controlled.”

Without that depth of endpoint visibility, a compromised agent executing a sanctioned API call with valid credentials fires zero alerts. The exploit surface is already being tested. During his keynote, Kurtz described ClawHavoc, the first major supply chain attack on an AI agent ecosystem, targeting ClawHub, OpenClaw’s public skills registry. Koi Security’s February audit found 341 malicious skills out of 2,857; a follow-up analysis by Antiy CERT identified 1,184 compromised packages historically across the platform. Kurtz noted ClawHub now hosts 13,000 skills in its registry. The infected skills contained backdoors, reverse shells, and credential harvesters; Kurtz said in his keynote that some erased their own memory after installation and could remain latent before activating. “The frontier AI creators will not secure itself,” Kurtz said. “The frontier labs are following the same playbook. They’re building it. They’re not securing it.”

Two agentic SOC architectures, one shared blind spot

Approach A: AI agents inside the SIEM. Cisco and Splunk announced six specialized AI agents for Splunk Enterprise Security: Detection Builder, Triage, Guided Response, Standard Operating Procedures (SOP), Malware Threat Reversing, and Automation Builder. Malware Threat Reversing is currently available in Splunk Attack Analyzer and Detection Studio is generally available as a unified workspace; the remaining five agents are in alpha or prerelease through June 2026. Exposure Analytics and Federated Search follow the same timeline. Upstream of the SOC, Cisco’s DefenseClaw framework scans OpenClaw skills and MCP servers before deployment, while new Duo IAM capabilities extend zero trust to agents with verified identities and time-bound permissions.

“The biggest impediment to scaled adoption in enterprises for business-critical tasks is establishing a sufficient amount of trust,” Patel told VentureBeat. “Delegating and trusted delegating, the difference between those two, one leads to bankruptcy. The other leads to market dominance.”

Approach B: Upstream pipeline detection. CrowdStrike pushed analytics into the data ingestion pipeline itself, integrating its Onum acquisition natively into Falcon’s ingestion system for real-time analytics, detection, and enrichment before events reach the analyst’s queue. Falcon Next-Gen SIEM now ingests Microsoft Defender for Endpoint telemetry natively, so Defender shops do not need additional sensors. CrowdStrike also introduced federated search across third-party data stores and a Query Translation Agent that converts legacy Splunk queries to accelerate SIEM migration.

Falcon Data Security for the Agentic Enterprise applies cross-domain data loss prevention to data agents’ access at runtime. CrowdStrike’s adversary-informed cloud risk prioritization connects agent activity in cloud workloads to the same detection pipeline. Agentic MDR through Falcon Complete adds machine-speed managed detection for teams that cannot build the capability internally.

“The agentic SOC is all about, how do we keep up?” Zaitsev said. “There’s almost no conceivable way they can do it if they don’t have their own agentic assistance.”

CrowdStrike opened its platform to external AI providers through Charlotte AI AgentWorks, announced at RSAC 2026, letting customers build custom security agents on Falcon using frontier AI models. Launch partners include Accenture, Anthropic, AWS, Deloitte, Kroll, NVIDIA, OpenAI, Salesforce, and Telefónica Tech. IBM validated buyer demand through a collaboration integrating Charlotte AI with its Autonomous Threat Operations Machine for coordinated, machine-speed investigation and containment.

The ecosystem contenders. Palo Alto Networks, in an exclusive pre-RSAC briefing with VentureBeat, outlined Prisma AIRS 3.0, extending its AI security platform to agents with artifact scanning, agent red teaming, and a runtime that catches memory poisoning and excessive permissions. The company introduced an agentic identity provider for agent discovery and credential validation. Once Palo Alto Networks closes its proposed acquisition of Koi, the company adds agentic endpoint security. Cortex delivers agentic security orchestration across its customer base.

Intel announced that CrowdStrike’s Falcon platform is being optimized for Intel-powered AI PCs, leveraging neural processing units and silicon-level telemetry to detect agent behavior on the device. Kurtz framed AIDR, AI Detection and Response, as the next category beyond EDR, tracking agent-speed activity across endpoints, SaaS, cloud, and AI pipelines. He said that “humans are going to have 90 agents that work for them on average” as adoption scales but did not specify a timeline.

The gap no vendor closed

What security leaders need

Approach A: agents inside the SIEM (Cisco/Splunk)

Approach B: upstream pipeline detection (CrowdStrike)

Gap neither closes

Triage at agent volume

Six AI agents handle triage, detection, and response inside Splunk ES

Onum-powered pipeline detects and enriches threats before the analyst sees them

Neither baselines normal agent behavior before flagging anomalies

Agent vs. human differentiation

Duo IAM tracks agent identities but does not differentiate agent from human activity in SOC telemetry

Process tree lineage distinguishes at runtime. AIDR extends to agent-specific detection

No vendor’s announced capabilities include an out-of-the-box agent behavioral baseline

27-second response window

Guided Response Agent executes containment at machine speed

In-pipeline detection reduces queue volume. Agentic MDR adds managed response

Human-in-the-loop governance has not been reconciled with machine-speed response in either approach

Legacy SIEM portability

Native Splunk integration preserves existing workflows

Query Translation Agent converts Splunk queries. Native Defender ingestion lets Microsoft shops migrate

Neither addresses teams running multiple SIEMs during migration

Agent supply chain

DefenseClaw scans skills and MCP servers pre-deployment. Explorer Edition red-teams agents

EDR AI Runtime Protection catches compromised skills post-deployment. Charlotte AI AgentWorks enables custom agents

Neither covers the full lifecycle. Pre-deployment scanning misses runtime exploits and vice versa

The matrix makes one thing visible that the keynotes did not. No vendor shipped an agent behavioral baseline. Both approaches automate triage and accelerate detection. Based on VentureBeat’s review of announced capabilities, neither defines what normal agent behavior looks like in a given enterprise environment.

Teams running Microsoft Sentinel and Copilot for Security represent a third architecture not formally announced as a competing approach at RSAC this week, but CISOs in Microsoft-heavy environments need to test whether Sentinel’s native agent telemetry ingestion and Copilot’s automated triage close the same gaps identified above.

Maor cautioned that the vendor response recycles a pattern he has tracked for 16 years. “I hope we don’t have to go through this whole cycle,” he told VentureBeat. “I hope we learned from the past. It doesn’t really look like it.”

Zaitsev’s advice was blunt. “You already know what to do. You’ve known what to do for five, ten, fifteen years. It’s time to finally go do it.”

Five things to do Monday morning

These steps apply regardless of your SOC platform. None requires ripping and replacing current tools. Start with visibility, then layer in controls as agent volume grows.

  1. Inventory every agent on your endpoints. CrowdStrike detects 1,800 AI applications across enterprise devices. Cisco’s Duo Identity Intelligence discovers agentic identities. Palo Alto Networks’ agentic IDP catalogs agents and maps them to human owners. If you run a different platform, start with an EDR query for known agent directories and binaries. You cannot set policy for agents you do not know exist.

  2. Determine whether your SOC stack can differentiate agent from human activity. CrowdStrike’s Falcon sensor and AIDR do this through process tree lineage. Palo Alto Networks’ agent runtime catches memory poisoning at execution. If your tools cannot make this distinction, your triage rules are applying the wrong behavioral models.

  3. Match the architectural approach to your current SIEM. Splunk shops gain agent capabilities through Approach A. Teams evaluating migration get pipeline detection with Splunk query translation and native Defender ingestion through Approach B. Palo Alto Networks’ Cortex delivers a third option. Teams on Microsoft Sentinel, Google Chronicle, Elastic, or other platforms should evaluate whether their SIEM can ingest agent-specific telemetry at this volume.

  4. Build an agent behavioral baseline before your next board meeting. No vendor ships one. Define what your agents are authorized to do: which APIs, which data stores, which actions, at which times. Create detection rules for anything outside that scope.

  5. Pressure-test your agent supply chain. Cisco’s DefenseClaw and Explorer Edition scan and red-team agents before deployment. CrowdStrike’s runtime detection catches compromised agents post-deployment. Both layers are necessary. Kurtz said in his keynote that ClawHavoc compromised over a thousand ClawHub skills with malware that erased its own memory after installation. If your playbook does not account for an authorized agent executing unauthorized actions at machine speed, rewrite it.

The SOC was built to protect humans using machines. It now protects machines using machines. The response window shrank from 48 minutes to 27 seconds. Any agent generating an alert is now a suspect, not just a sensor. The decisions security leaders make in the next 90 days will determine whether their SOC operates in this new reality or gets buried under it.

Credit: Source link

ShareTweetSendSharePin

Related Posts

Union accuses Apple of unlawful discrimination against represented workers
AI & Technology

Union accuses Apple of unlawful discrimination against represented workers

April 28, 2026
Lyft to Acquire London Black Cab App Gett
AI & Technology

Lyft to Acquire London Black Cab App Gett

April 28, 2026
SpaceX Tapped for Group Developing Golden Dome Software
AI & Technology

SpaceX Tapped for Group Developing Golden Dome Software

April 28, 2026
Tesla Sales Helped by High Gas Prices
AI & Technology

Tesla Sales Helped by High Gas Prices

April 28, 2026
Next Post
The Backrooms trailer combines creepypasta dread and A24 prestige horror

The Backrooms trailer combines creepypasta dread and A24 prestige horror

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
Morning News NOW Full Episode – April 20

Morning News NOW Full Episode – April 20

April 21, 2026
Meet the Press Full Episode — April 12

Meet the Press Full Episode — April 12

April 26, 2026
She Knows Exactly What Dave Is Talking About

She Knows Exactly What Dave Is Talking About

April 24, 2026

About

Learn more

Our Services

Legal

Privacy Policy

Terms of Use

Bloggers

Learn more

Article Links

Contact

Advertise

Ask us anything

©2020- TradePoint.io - All rights reserved!

Tradepoint.io, being just a publishing and technology platform, is not a registered broker-dealer or investment adviser. So we do not provide investment advice. Rather, brokerage services are provided to clients of Tradepoint.io by independent SEC-registered broker-dealers and members of FINRA/SIPC. Every form of investing carries some risk and past performance is not a guarantee of future results. “Tradepoint.io“, “Instant Investing” and “My Trading Tools” are registered trademarks of Apperbuild, LLC.

This website is operated by Apperbuild, LLC. We have no link to any brokerage firm and we do not provide investment advice. Every information and resource we provide is solely for the education of our readers. © 2020 Apperbuild, LLC. All rights reserved.

No Result
View All Result
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop

© 2023 - TradePoint.io - All Rights Reserved!