6 Sources
6 Sources
[1]
Nvidia's agentic AI stack is the first major platform to ship with security at launch, but governance gaps remain
For the first time on a major AI platform release, security shipped at launch -- not bolted on 18 months later. At Nvidia GTC this week, five security vendors announced protection for Nvidia's agentic AI stack, four with active deployments, one with validated early integration. The timing reflects how fast the threat has moved: 48% of cybersecurity professionals rank agentic AI as the top attack vector heading into 2026. Only 29% of organizations feel fully ready to deploy these technologies securely. Machine identities outnumber human employees 82 to 1 in the average enterprise. And IBM's 2026 X-Force Threat Intelligence Index documented a 44% surge in attacks exploiting public-facing applications, accelerated by AI-enabled vulnerability scanning. Nvidia CEO Jensen Huang made the case from the GTC keynote stage on Monday: "Agentic systems in the corporate network can access sensitive information, execute code, and communicate externally. Obviously, this can't possibly be allowed." Nvidia defined a unified threat model designed to flex and adapt for the unique strengths of five different vendors. Nvidia also names Google, Microsoft Security and TrendAI as Nvidia OpenShell security collaborators. This article maps the five vendors with embargoed GTC announcements and verifiable deployment commitments on record, an analyst-synthesized reference architecture, not Nvidia's official canonical stack. No single vendor covers all five governance layers. Security leaders can evaluate CrowdStrike for agent decisions and identity, Palo Alto Networks for cloud runtime, JFrog for supply chain provenance, Cisco for prompt-layer inspection, and WWT for pre-production validation. The audit matrix below maps who covers what. Three or more unanswered vendor questions mean ungoverned agents in production. The five-layer governance framework This framework draws from the five vendor announcements and the OWASP Agentic Top 10. The left column is the governance layer. The right column is the question every security leader's vendor should answer. If they can't answer it, that layer is ungoverned. Five-layer governance audit matrix. Three or more unanswered vendor questions indicate ungoverned agents in production. [runtime enforcement] = inline controls active during agent execution. [pre-deployment] = controls applied before artifacts reach runtime. [pre-prod validation] = proving-ground testing before production rollout. [AI Factory validated design] = Nvidia reference architecture integration, not OpenShell-launch coupling. CrowdStrike's Falcon platform embeds at four distinct enforcement points in the Nvidia OpenShell runtime: AIDR at the prompt-response-action layer, Falcon Endpoint on DGX Spark and DGX Station hosts, Falcon Cloud Security across AI-Q Blueprint deployments, and Falcon Identity for agent privilege boundaries. Palo Alto Networks enforces at the BlueField DPU hardware layer within Nvidia's AI Factory validated design. JFrog governs the artifact supply chain from the registry through signing. WWT validates the full stack pre-production in a live environment. Cisco runs an independent guardrail at the prompt layer. CrowdStrike and Nvidia are also building what they call intent-aware controls. That phrase matters. An agent constrained to certain data is access-controlled. An agent whose planning loop is monitored for behavioral drift is governed. Those are different security postures, and the gap between them is where the 4% error rate at 5x speed becomes dangerous. Why the blast radius math changed Daniel Bernard, CrowdStrike's chief business officer, told VentureBeat in an exclusive interview what the blast radius of a compromised AI agent looks like compared to a compromised human credential. "Anything we could think about from a blast radius before is unbounded," Bernard said. "The human attacker needs to sleep a couple of hours a day. In the agentic world, there's no such thing as a workday. It's work-always." That framing tracks with architectural reality. A human insider with stolen credentials works within biological limits: typing speed, attention span, a schedule. An AI agent with inherited credentials operates at compute speed across every API, database, and downstream agent it can reach. No fatigue. No shift change. CrowdStrike's 2026 Global Threat Report puts the fastest observed eCrime breakout at 27 seconds and average breakout times at 29 minutes. An agentic adversary doesn't have an average. It runs until you stop it. When VentureBeat asked Bernard about the 96% accuracy number and what happens in the 4%, his answer was operational, not promotional: "Having the right kill switches and fail-safes so that if the wrong thing is decided, you're able to quickly get to the right thing." The implication is worth sitting on. 96% accuracy at 5x speed means the errors that get through arrive five times faster than they used to. The oversight architecture has to match the detection speed. Most SOCs are not designed for that. Bernard's broader prescription: "The opportunity for customers is to transform their SOCs from history museums into autonomous fighting machines." Walk into the average enterprise SOC and inventory what's running there. He's not wrong. On analyst oversight when agents get it wrong, Bernard drew the governance line: "We want to keep not only agents in the loop, but also humans in the loop of the actions that the SOC is taking when that variance in what normal is realized. We're on the same team." The full vendor stack Each of the five vendors occupies a different enforcement point the other four do not. CrowdStrike's architectural depth in the matrix reflects four announced OpenShell integration points; security leaders should weigh all five based on their existing tooling and threat model. Cisco shipped Secure AI Factory with AI Defense, extending Hybrid Mesh Firewall enforcement to Nvidia BlueField DPUs and adding AI Defense guardrails to the OpenShell runtime. In multi-vendor deployments, Cisco AI Defense and Falcon AIDR run as parallel guardrails: AIDR enforcing inside the OpenShell sandbox, AI Defense enforcing at the network perimeter. A poisoned prompt that evades one still hits the other. Palo Alto Networks runs Prisma AIRS on Nvidia BlueField DPUs as part of the Nvidia AI Factory validated design, offloading inspection to the data processing unit at the network hardware layer, below the hypervisor and outside the host OS kernel. This integration is best understood as a validated reference architecture pairing rather than a tight OpenShell runtime coupling. Palo Alto intercepts east-west agent traffic on the wire; CrowdStrike monitors agent process behavior inside the runtime. Same cloud runtime row, different integration model and maturity stage. JFrog announced the Agent Skills Registry, a system of record for MCP servers, models, agent skills, and agentic binary assets within Nvidia's AI-Q architecture. Early integration with Nvidia has been validated, with full OpenShell support in active development. JFrog Artifactory will serve as a governed registry for AI skills, scanning, verifying, and signing every skill before agents can adopt it. This is the only pre-deployment enforcement point in the stack. As Chief Strategy Officer Gal Marder put it: "Just as a malicious software package can compromise an application, an unvetted skill can guide an agent to perform harmful actions." Worldwide Technology launched a Securing AI Lab inside its Advanced Technology Center, built on Nvidia AI factories and the Falcon platform. WWT's vendor-agnostic ARMOR framework is a pre-production validation and proving-ground capability, not an inline runtime control. It validates how the integrated stack behaves in a live AI factory environment before any agent touches production data, surfacing control interactions, failure modes, and policy conflicts before they become incidents. Three MDR numbers: what they actually measure On the MDR side, CrowdStrike fine-tuned Nvidia Nemotron models on first-party threat data and operational SOC data from Falcon Complete engagements. Internal benchmarks show 5x faster investigations, 3x higher triage accuracy in high-confidence benign classification, and 96% accuracy in generating investigation queries within Falcon LogScale. Kroll, a global risk advisory and managed security firm that runs Falcon Complete as its MDR backbone, confirmed the results in production. Because Kroll operates Falcon Complete as its core MDR platform rather than as a neutral third-party evaluator, their validation is operationally meaningful but not independent in the audit sense. Industry-wide third-party benchmarks for agentic SOC accuracy do not yet exist. Treat reported numbers as indicative, not audited. The 5x investigation speed compares average agentic investigation time (8.5 minutes) against the longest observed human investigation in CrowdStrike's internal testing: a ceiling, not a mean. The 3x triage accuracy measures one internal model against another. The 96% accuracy applies specifically to generating Falcon LogScale investigation queries via natural language, not to overall threat detection or alert classification. JFrog's Agent Skills Registry operates beneath all four CrowdStrike enforcement layers, scanning, signing, and governing every model and skill before any agent can adopt it -- with early Nvidia integration validated and full OpenShell support in active development. Six enterprises are already in deployment EY selected the CrowdStrike-Nvidia stack to power Agentic SOC services for global enterprises. Nebius ships with Falcon integrated into its AI cloud from day one. CoreWeave CISO Jim Higgins signed off on the Blueprint. Mondelēz North America Regional CISO Emmett Koen said the capability lets his team "focus on higher-value response and decision-making." MGM Resorts International CISO Bryan Green endorsed WWT's validated testing environments, saying enterprises need "validated environments that embed protection from the start." These range from vendor selection and platform validation to production integration. The signal is converging across buyer types, not uniform at-scale deployment. What the five-vendor stack does not cover The governance framework above represents real progress. It also has three holes that every security leader deploying agentic AI will eventually hit. No vendor at GTC closed any of them. Knowing where they are is as important as knowing what shipped. What running five vendors actually costs The governance matrix is a coverage map, not an implementation plan. Running five vendors across five enforcement layers introduces real operational overhead that the GTC announcements did not address. Someone has to own policy orchestration: deciding which vendor's guardrail wins when AIDR and AI Defense return conflicting verdicts on the same prompt. Someone has to normalize telemetry across Falcon LogScale, Prisma AIRS, and JFrog Artifactory into a single incident workflow. And someone has to manage change control when one vendor ships a runtime update that shifts how another vendor's enforcement layer behaves. A realistic phased rollout looks like this: start with the supply chain layer (JFrog), because it operates pre-deployment and has no runtime dependencies on the other four. Add identity governance (Falcon Identity) second, because scoped agent credentials limit blast radius before you instrument the runtime. Then instrument the agent decision layer (Falcon AIDR or Cisco AI Defense, depending on your existing vendor footprint), then cloud runtime, then local execution. Running all five simultaneously from day one is an integration project, not a configuration task. Budget for it accordingly. What to do before your next board meeting Here is what every CISO should be able to say after running the framework above: "We have audited every autonomous agent against five governance layers. Here is what's in place, and here are the five questions we are holding vendors to." If you cannot say that today, the issue is not that you are behind schedule. The issue is that no schedule existed. Five vendors just shipped the architectural scaffolding for one. Do four things before your next board meeting: The scaffolding is necessary. It is not sufficient. Whether it changes your posture depends on whether you treat the five-layer framework as a working instrument or skip past it in the vendor deck.
[2]
CrowdStrike targets AI security gap with Falcon platform expansion at RSAC Conference - SiliconANGLE
CrowdStrike targets AI security gap with Falcon platform expansion at RSAC Conference CrowdStrike Holdings Inc. today announced an expansion of its Falcon cybersecurity platform to secure artificial intelligence systems as enterprises deploy more autonomous AI agents across endpoints, software-as-a-service applications and cloud environments. The announcements, made on day one of the RSAC 2026 Conference, are being pitched as a response to a threat landscape where AI systems are increasingly software entities that can take actions, access data and operate with elevated privileges. CrowdStrike argues that the shift creates a new governance and runtime security problem that older security controls were never built to handle. Underpinning the announcements is a strategy that treats the endpoint as the control plane for AI security. CrowdStrike believes that because AI actions often ultimately execute on a device, the endpoint is the best place to observe behavior, enforce policy and stop malicious or risky activity in real time. To support its vision, CrowdStrike is offering EDR AI Runtime Protection, a capability that is designed to give security teams runtime visibility into how AI applications and agents behave on a system by tracking commands, scripts, file activity and network connections. The service allows defenders to trace suspicious behavior back to the originating process and isolate the affected endpoint before the activity spreads. CrowdStrike is also adding Shadow AI Discovery for Endpoint, a service designed to automatically identify AI applications, agents, large language model runtimes, Model Context Protocol servers and development tools running across devices. The service allows security teams to assess not just what AI is deployed, but also the potential blast radius of a compromise. Another new service, AIDR for Desktop, extends CrowdStrike's prompt-layer protections to desktop AI applications. The coverage includes support for major AI tools such as ChatGPT, Gemini, Claude, DeepSeek, Microsoft Copilot, O365 Copilot, GitHub Copilot and Cursor. CrowdStrike is also pushing security beyond the endpoint into software-as-a-service and cloud services, where AI agents are increasingly being deployed with access to business data and workflows. New features, including Shadow SaaS and AI Agent Discovery, provide visibility into shadow SaaS usage as well as agent activity, permissions and data access across platforms such as Microsoft Copilot, Salesforce Agentforce, ChatGPT Enterprise, OpenAI Enterprise GPT and Nexos.ai. CrowdStrike is also extending protections to Microsoft's Copilot ecosystem with AIDR for Copilot Studio Agents. The feature monitors prompts, data interactions and runtime behavior inside Copilot Studio agents to allow organizations to detect prompt injection attacks, policy violations and data leaks as they happen. For cloud environments, the company is introducing Shadow AI Discovery for Cloud, which identifies ungoverned AI services, risky large language models and MCP connections and sensitive data exposure across infrastructure and application layers. Another new service, called AIDR for Cloud and Kubernetes, brings runtime inspection and enforcement to containerized AI workloads and can surface malicious activity in Kubernetes environments. AI Data Flow Discovery for Cloud, also new today, offers real-time visibility into how sensitive data moves into and through AI services to help organizations spot exposure quickly and trigger automated responses through security orchestration workflows. On the SIEM front, CrowdStrike announced an expanded role for Falcon Next-Gen SIEM, particularly for organizations that use Microsoft Defender for Endpoint. The expanded offering means that Falcon can now ingest and correlate Defender telemetry without requiring additional sensors to lower friction for Microsoft-centric customers looking to modernize their security operations centers. Other SIEM-related announcements are aimed at making SIEM migration less painful, including the ability for native Falcon Onum integration to improve data streaming performance, cut storage costs and reduce ingestion overhead through filtering and in-pipeline detection. CrowdStrike is also adding third-party indicator management, which lets customers ingest and operationalize external indicators of compromise to enrich detections. A new query translation agent is designed to convert legacy SIEM queries, including Splunk searches, into CrowdStrike Query Language so security teams can preserve existing workflows while reducing retraining and migration headaches. For CrowdStrike, the overall theme is that AI adoption is creating new control problems across the enterprise and that Falcon can become the place where those problems are managed. The company is demonstrating its new offerings and enhancements at the RSAC Conference March 23-26.
[3]
5 Big CrowdStrike Launches For Next-Gen SIEM, AI Security
At RSAC 2026, the cybersecurity giant unveiled support for Microsoft Defender for Endpoint in its Falcon Next-Gen SIEM platform along with new capabilities for AI detection and response. CrowdStrike is doubling down on support for Microsoft security tools with a major update to its Falcon Next-Gen SIEM platform, along with launching enhanced new AI security capabilities, the cybersecurity giant announced Monday. In terms of Microsoft support, CrowdStrike disclosed that it will now support Microsoft Defender for Endpoint within Falcon Next-Gen SIEM, providing a significant market expansion for the SIEM (security information and event management) platform. [Related: CrowdStrike CEO George Kurtz: 2026 Is 'Breakout Year' For Agentic SOC] CrowdStrike also announced Monday it has extended its Falcon AI Detection and Response (AIDR) offering to cover more of the AI application ecosystem, while the vendor has also launched expanded "shadow AI" discovery. The announcements were made in connection with the start of RSAC 2026 in San Francisco, and will provide substantial new opportunities for solution and service provider partners, according to CrowdStrike Chief Business Officer Daniel Bernard. What follows are the details on CrowdStrike's big launches for Next-Gen SIEM and AI security. CrowdStrike has increasingly become a disrupter in the security operations market with its fast-growing Falcon Next-Gen SIEM offering, executives said. Key advantages include improved security outcomes through providing a modernized approach that makes full use of AI and cloud-native technologies, according to the company. With the addition of support for Microsoft's widely used Defender security platform, CrowdStrike is "broadening our addressable market" in a major way for Falcon Next-Gen SIEM, Bernard said during a media briefing. Falcon Next-Gen SIEM can now ingest and correlate telemetry data from Microsoft Defender for Endpoint as part of the expanded support, CrowdStrike disclosed. The announcement is also the latest collaborative move between the two companies, marking a further departure from their highly charged rivalry in years' past. "It's another watershed moment for CrowdStrike in the work we're doing with Microsoft, and in the work Microsoft is doing with us," Bernard said. Other recent moves included the February announcement that CrowdStrike's Falcon platform would be available on the Microsoft Marketplace. The newly announced support for Microsoft Defender for Endpoint creates a huge new opportunity for partners to work with Falcon Next-Gen SIEM, Bernard said. As a result of the move, "there's a whole new set of partners that get to work on our platform, with our platform and through our platform," he said. Ultimately, Falcon Next-Gen SIEM for Defender "takes us into way more environments than we're in today. And I think that's positive for channel partners," he said. The reality is that many organizations will have multiple endpoint security tools running in their environments, which in some cases will mean having both CrowdStrike's Falcon platform and Microsoft Defender, executives said. "We want to be able to provide the best possible SIEM product, regardless of what those endpoints are running," CrowdStrike CTO Elia Zaitsev said during the media briefing. CrowdStrike debuted additional new capabilities for Next-Gen SIEM including functionality integrated from the acquisition of data pipeline management startup Onum in August 2025. Those new capabilities include intelligent filtering, allowing security teams to "efficiently manage which data is being ingested into our platform -- and which may be filtered out completely or sent to other locations," Zaitsev said. Other new functionality includes real-time analytics detection and enrichment offered directly within the pipeline itself, which "dramatically accelerates our ability to detect and respond to threats," he said. Meanwhile, federated search is now available across distributed data systems, enabling rapid and flexible access to external sources of data such as ExtraHop, according to CrowdStrike. In December, CrowdStrike announced general availability for its Falcon AI Detection and Response (AIDR) offering, which delivers a massive boost to security around AI prompts and agent interactions, CrowdStrike President Mike Sentonas told CRN at the time. At RSAC 2026, CrowdStrike is debuting the next major update to AIDR with the expansion of the tool's functionality beyond browser-based AI applications, to now also serve desktop applications. This means that Falcon AIDR can now help to protect desktop versions of applications such as OpenAI's ChatGPT, Anthropic's Claude and Microsoft 365 Copilot integrations into the Microsoft 365 suite, according to Zaitsev. The tool can also secure a variety of agentic applications that connect directly to an IDE (integrated development environment) or environments such as Microsoft's Visual Studio Code, he said. Falcon AIDR can provide prompt security, such as detection of prompt injection attacks, as well as protection against data leaks and real-time policy enforcement for desktop AI applications, Zaitsev said. CrowdStrike announced several updates Monday enabling expanded discovery for unsanctioned "shadow AI" usage. Those new capabilities include Shadow AI discovery for endpoint, which provides automatic discovery of AI systems-inclding apps and agents, LLM runtimes, MCP servers and developer tools -- that are running on endpoints. CrowdStrike also debuted discovery capabilities for shadow AI agents as well as shadow SaaS applications across a number of top platforms including Microsoft Power Platform, Salesforce Agentforce and ChatGPT Enterprise. Additionally, the vendor debuted shadow AI discovery for cloud, bringing together visibility across both cloud infrastructure and application layers.
[4]
CrowdStrike Establishes the Endpoint as the Epicenter for AI Security
New Falcon platform innovations solidify CrowdStrike as AI's security layer - extending AI agent discovery, governance, and runtime protection across endpoints, SaaS, browser, and cloud CrowdStrike announced new capabilities across the Falcon platform that establish the endpoint as the epicenter for AI security and CrowdStrike as the market's leading AI security platform. New platform innovations extend AI agent discovery, shadow AI governance, and runtime threat detection directly from the endpoint - the point of AI execution - to every surface where AI agents operate across SaaS, browser, and cloud environments. As AI agents gain autonomy and system-level privilege, the endpoint has become the target and enforcement point for modern security. AI systems now execute commands, access sensitive data, and trigger downstream workflows directly on the endpoint, often in ways indistinguishable from legitimate user activity. This is where AI actions occur, and where they must be governed in real time. Legacy and network controls were not designed to govern this behavior. With this release, CrowdStrike closes the gap between AI adoption and security enforcement. "AI agents are fundamentally changing how technology operates and how it must be secured," said Michael Sentonas, president of CrowdStrike. "Security built for static applications can't keep up with autonomous systems. Organizations need real-time visibility and control over AI behavior wherever it runs. CrowdStrike is that new standard." Securing AI Agents on the Endpoint The endpoint is emerging as the security epicenter as AI demand surges. CrowdStrike sensors detect more than 1,800 distinct AI applications running on enterprise devices, representing nearly 160 million unique application instances across its customer base.1 AI agents execute terminal commands, modify files, access sensitive data, and trigger downstream workflows autonomously, with behavior indistinguishable from legitimate user activity. To secure where AI executes, CrowdStrike delivers: * EDR AI Runtime Protection: CrowdStrike delivers runtime visibility of AI behavior at the point of execution. The Falcon sensor captures the commands, scripts, file activity, and network connections of all applications running on the endpoint, including agentic applications. When suspicious behavior is detected, human and agentic security teams can trace activity to the originating process and act immediately, including isolating affected endpoints to contain threats before they spread. * Shadow AI Discovery for Endpoint: Automatically discovers AI applications, agents, LLM runtimes, MCP servers, and development tools running across endpoints, linking them to asset context and privilege exposure to prioritize risk to critical systems. Security teams can assess not just what AI is deployed, but also the potential blast radius of a compromise. * AIDR for Endpoint: Extends prompt-layer protection to desktop AI applications, including ChatGPT, Gemini, Claude, DeepSeek, Microsoft Copilot, O365 Copilot, GitHub Copilot, and Cursor. Delivers real-time prompt inspection and detection of injection attacks and data leaks, and surfaces access and content policy violations. Securing AI Agents Across SaaS, Browser, and Cloud Agents do not only stay on the endpoint; they also work across SaaS platforms, cloud workloads, and AI pipelines - often with permissions that were not designed for governance at machine speed. CrowdStrike's acquisition of Seraphic extends runtime protection to the browser, securing agentic activity at the point where it increasingly operates. CrowdStrike secures AI systems, data, and agents in SaaS, browser, and cloud environments with: * Shadow SaaS and AI Agent Discovery: Provides visibility into Shadow SaaS usage and AI agent activity, permissions, and data access across leading platforms, including Microsoft Copilot (Power Platform), Salesforce Agentforce, ChatGPT Enterprise, OpenAI Enterprise GPT, and Nexos.ai. * AIDR for Copilot Studio Agents: Extends runtime guardrails to Microsoft Copilot Studio agents, monitoring prompts, data interactions, and agent behavior in real time to detect injection attacks, data leaks, and policy violations. * Shadow AI Discovery for Cloud: Unifies visibility across cloud infrastructure and application layers, enabling identification of shadow AI, ungoverned LLM and MCP connections, and sensitive data exposure, as well as prioritized remediation. * AIDR for Cloud: Secures AI workloads running in containerized environments communicating with the OpenAI API specification, providing runtime inspection for AI services and detection of prompt attacks, data leaks, and policy violations.
[5]
CrowdStrike Unveils Secure-by-Design AI Blueprint for AI Agents Built with NVIDIA
Architecture will integrate protection from the Falcon platform with NVIDIA OpenShell to run safer, autonomous AI agents both locally on DGX Spark and in the cloud CrowdStrike unveiled a Secure-by-Design AI Blueprint built with NVIDIA that integrates protection from the CrowdStrike Falcon platform directly into NVIDIA OpenShell, an open-source runtime that enforces policy-based guardrails to make autonomous agents safer to deploy. The architecture integrates security natively into the AI agent stack, enabling organizations to operationalize autonomous systems with governance, visibility, and control from development through runtime, wherever agents run. As organizations shift from copilots to AI agents that think, reason, and act autonomously at machine speed, security models must evolve. AI agents introduce a fundamentally different security challenge as privileged identities with direct access to data, applications, compute resources, and other agents. Traditional static controls were not designed to govern systems that move at the speed of AI. Securing AI agents requires continuous enforcement across the AI stack, not point in time controls - delivered at machine speed. By integrating the Falcon platform directly into the NVIDIA OpenShell runtime, the Secure-by-Design AI Blueprint can embed security at the foundation of autonomous systems. Part of the NVIDIA Agent Toolkit, the open-source OpenShell runtime provides isolated sandboxes with private inference and built-in policy enforcement. The Falcon platform extends protection to local agents running on NVIDIA DGX Spark or NVIDIA DGX Station, and can also extend security to agents in the cloud that are built on the open-source NVIDIA AI-Q Blueprint for deep research. Organizations will gain unified visibility and continuous runtime monitoring and enforcement to constrain unsafe behavior, prevent prompt manipulation, and enforce policy across the full AI lifecycle. Key capabilities of the Secure-by-Design AI Blueprint include: * AI Policy Enforcement Across the Agent Stack: Falcon® AI Detection and Response (AIDR) will integrate with the OpenShell runtime to secure every prompt, response, and agent action in real time. * Endpoint Protection for Local AI Agents: Falcon® Endpoint Security will secure local agents on NVIDIA DGX Spark or DGX Station running OpenShell, enforcing host-level controls and continuous behavioral monitoring across system activity and agent execution. * Cloud Runtime Protection for AI Agent Deployments: Falcon® Cloud Security will protect agents built based on the NVIDIA AI-Q Blueprint in cloud and data center environments, delivering unified visibility and runtime controls across infrastructure and AI workloads. * Identity-Based Governance for Agent Access: Falcon® Next-Gen Identity Security will deliver dynamic identity management for local agents, enforcing access controls across data, APIs, and services so agents operate within defined privilege boundaries. CrowdStrike and NVIDIA are also advancing intent-aware controls that govern how agents plan and execute tasks, enabling flexible autonomy while limiting the blast radius of unintended or malicious behavior. "As we enter the agentic era, agents no longer simply assist - they act," said Daniel Bernard, Chief Business Officer, CrowdStrike. "This shift fundamentally changes the security equation, and security must be embedded into the AI stack itself. Together with NVIDIA, we are delivering a Secure-by-Design architecture that enables organizations to operationalize agents with confidence and control." "Autonomous agents will fundamentally reshape how we work," said Justin Boitano, Vice President, Enterprise Platforms, NVIDIA. "By integrating CrowdStrike's security platform with the NVIDIA Agent Toolkit, we're enabling enterprises to build and scale safer, autonomous AI agents to help transform their operations, empower every employee, and securely generate intelligence at the speed of business." "AI infrastructure is moving from experimentation to mission-critical production," said James Higgins, Chief Information Security Officer, CoreWeave. "As we scale GPU-accelerated environments, AI agents must be observable, governed, and resilient by design. The collaboration between CrowdStrike and NVIDIA secures AI systems at the foundation - enabling high-performance AI environments without compromising control." The Secure-by-Design AI Blueprint reinforces CrowdStrike's position as cybersecurity for enterprise AI - embedding security directly into the AI stack, wherever AI lives.
[6]
CrowdStrike Accelerates Agentic MDR with NVIDIA, Demonstrating 5x Faster Investigations and 3x Higher Triage Accuracy
CrowdStrike leverages the NVIDIA Agent Toolkit to supercharge agentic MDR investigations with higher triage accuracy and enable custom agent development through Charlotte AI AgentWorks CrowdStrike announced an expanded collaboration with NVIDIA to advance Agentic Managed Detection and Response (MDR) using the NVIDIA Agent Toolkit, featuring open NVIDIA Nemotron models and NVIDIA NeMo Data Designer to power specialized security agents and speed investigative workflows. CrowdStrike will also be expanding Charlotte AI AgentWorks with support for NVIDIA Nemotron 3 Super, enabling organizations to build custom AI agents leveraging the most efficient, intelligent open model. Early internal testing with CrowdStrike Falcon® Complete Next-Gen MDR demonstrates up to 5x faster investigations1 and more than 3x higher triage accuracy in high-confidence benign classification performance2 when powered by NVIDIA Nemotron Nano and Nemotron Super models - supercharging Agentic MDR. As adversaries increasingly leverage AI to accelerate reconnaissance, evasion, and lateral movement, security teams must operate at machine speed and scale. Teams process thousands of detections daily, often requiring manual review to separate signal from noise. With persistent talent shortages and cost constraints, improving speed and precision without increasing headcount has become a strategic imperative. Agentic MDR represents the next evolution of managed defense - where AI-native agents augment expert analysts to streamline high-volume workflows, elevate decision quality, and scale elite protection across enterprise environments. CrowdStrike and NVIDIA are also working together to boost autonomous agent security by integrating the NVIDIA OpenShell open-source runtime with the Falcon platform through a Secure-by-Design AI Blueprint. "Adversaries are already using AI to move faster and scale their operations," said Daniel Bernard, Chief Business Officer at CrowdStrike. "The future of managed defense isn't adding more analysts - it's embedding AI agents directly into SOC operations to give analysts superpowers. With Falcon Complete Next-Gen MDR, we're applying advanced reasoning models to automate investigation and triage while maintaining expert oversight. Together with NVIDIA, we're accelerating the shift toward Agentic MDR." "AI reasoning models and synthetic data are transforming how enterprises operationalize intelligence," said Justin Boitano, Vice President, Enterprise AI Products at NVIDIA. "Together with CrowdStrike, we're bringing secure, autonomous AI agents into security operations - enabling organizations to reason through threats, act in real time, and continuously strengthen their cyber resilience." "CrowdStrike's use of advanced AI reasoning in Falcon Complete Next-Gen MDR marks a significant step forward in managed defense," said David Burg, Global Group Head of Cyber and Data Resilience at Kroll. "By accelerating investigations and sharpening triage accuracy, it enables our teams to deliver faster, high-quality outcomes for clients around the world." Advancing Agentic MDR CrowdStrike evaluated NVIDIA Nemotron models across a range of potential Falcon Complete Next-Gen MDR use cases to orchestrate investigative workflows and automate high-volume Tier 1 analysis while preserving analyst oversight. The NVIDIA Nemotron models were customized with synthetic data generated with NVIDIA NeMo Data Designer. NeMo Data Designer learns data patterns from expert insights and first-party telemetry to generate high-quality synthetic data, creating structured training signals that enhance model accuracy and consistency across investigation workflows. Internal benchmarking conducted by CrowdStrike and NVIDIA of Nemotron Nano and Nemotron Super models validates measurable performance gains, including up to 5x faster investigations and more than 3x higher triage accuracy for a significant reduction in manual triage workload. Fine-tuning the NVIDIA Nemotron Nano model achieved 96% accuracy in generating investigation queries within Falcon® LogScale, delivering a natural-language interface that boosts agent investigative efficiency.
Share
Share
Copy Link
CrowdStrike unveiled major expansions to its Falcon platform at RSAC 2026, targeting the security gap created by autonomous AI agents. The company introduced runtime protection, shadow AI discovery, and a secure-by-design blueprint with NVIDIA as enterprises face threats from AI systems operating at machine speed with elevated privileges across endpoints, cloud environments, and SaaS platforms.
CrowdStrike announced a comprehensive expansion of its Falcon platform at the RSAC 2026 Conference, introducing capabilities designed to secure autonomous AI agents as enterprises confront a threat landscape where 48% of cybersecurity professionals rank agentic AI as the top attack vector heading into 2026
1
. The CrowdStrike Falcon platform now establishes the endpoint as the epicenter for AI security, extending AI agent discovery, governance, and AI runtime protection across endpoints, SaaS, browser, and cloud environments2
4
.
Source: CXOToday
The timing reflects an urgent shift in enterprise security priorities. Only 29% of organizations feel fully ready to deploy AI agents securely, while machine identities now outnumber human employees 82 to 1 in the average enterprise
1
. IBM's 2026 X-Force Threat Intelligence Index documented a 44% surge in attacks exploiting public-facing applications, accelerated by AI-enabled vulnerability scanning1
. CrowdStrike sensors now detect more than 1,800 distinct AI applications running on enterprise devices, representing nearly 160 million unique application instances across its customer base4
.The company introduced EDR AI Runtime Protection, which delivers runtime visibility of AI behavior at the point of execution. The Falcon sensor captures commands, scripts, file activity, and network connections of all applications running on the endpoint, including agentic applications
4
. When suspicious behavior is detected, security teams can trace activity to the originating process and act immediately, including isolating affected endpoints to contain threats before they spread2
.CrowdStrike's approach treats the endpoint as the control plane for AI security because AI actions often ultimately execute on a device, making it the optimal place to observe behavior, enforce policy enforcement, and stop malicious activity in real time
2
. The company also launched shadow AI discovery for Endpoint, which automatically identifies AI applications, AI agents, large language models (LLMs) runtimes, Model Context Protocol servers, and development tools running across devices2
4
.Daniel Bernard, CrowdStrike's chief business officer, explained the fundamental difference in the AI agent blast radius compared to compromised human credentials. "Anything we could think about from a blast radius before is unbounded," Bernard said. "The human attacker needs to sleep a couple of hours a day. In the agentic world, there's no such thing as a workday. It's work-always"
1
.An AI agent with inherited credentials operates at compute speed across every API, database, and downstream agent it can reach, with no fatigue or shift change
1
. CrowdStrike's 2026 Global Threat Report documented the fastest observed eCrime breakout at 27 seconds and average breakout times at 29 minutes, but an agentic adversary doesn't have an average—it runs until stopped1
. This reality demands oversight architecture that matches detection speed at machine speed.CrowdStrike extended its AI Detection and Response (AIDR) offering beyond browser-based applications to desktop versions, now covering OpenAI ChatGPT, Anthropic's Claude, Google Gemini, DeepSeek, Microsoft Copilot, O365 Copilot, GitHub Copilot, and Cursor
3
4
. The tool delivers real-time prompt inspection and threat detection of prompt injection attacks and data leaks, surfacing access and content policy violations4
.For cloud environments, CrowdStrike introduced Shadow AI Discovery for Cloud, which identifies ungoverned AI services, risky large language models, MCP connections, and sensitive data exposure across infrastructure and application layers
2
. AIDR for Cloud and Kubernetes brings runtime inspection and enforcement to containerized AI workloads, surfacing malicious activity in Kubernetes environments2
. AI Data Flow Discovery for Cloud offers real-time visibility into how sensitive data moves into and through AI services2
.CrowdStrike and NVIDIA unveiled a Secure-by-Design AI Blueprint that integrates protection from the Falcon platform directly into NVIDIA OpenShell, an open-source runtime that enforces policy-based guardrails for autonomous agents
5
. The NVIDIA partnership marks the first time on a major AI platform release that security shipped at launch rather than being bolted on months later1
.
Source: VentureBeat
NVIDIA CEO Jensen Huang emphasized the stakes during his GTC keynote: "Agentic systems in the corporate network can access sensitive information, execute code, and communicate externally. Obviously, this can't possibly be allowed"
1
. The architecture enables organizations to operationalize autonomous systems with governance, visibility, and control from development through runtime, whether agents run locally on NVIDIA DGX Spark or in cloud environments based on the NVIDIA AI-Q Blueprint5
.CrowdStrike and NVIDIA are building what they call intent-aware controls that monitor an agent's planning loop for behavioral drift, creating a different security posture from simple access controls
1
. The collaboration includes Falcon Endpoint protection on DGX Spark and DGX Station hosts, Falcon Cloud Security across AI-Q Blueprint deployments, and Falcon Identity for identity governance and agent privilege boundaries1
.Related Stories
CrowdStrike announced support for Microsoft Defender for Endpoint within Falcon Next-Gen SIEM, marking a significant market expansion
3
. The platform can now ingest and correlate telemetry data from Microsoft Defender for Endpoint, addressing environments where organizations run multiple endpoint security tools3
. Bernard called it "another watershed moment for CrowdStrike in the work we're doing with Microsoft"3
.
Source: CRN
The company also extended AIDR to Microsoft Copilot Studio agents, monitoring prompts, data interactions, and runtime behavior to detect injection attacks, policy violations, and data leaks
2
. Shadow SaaS and AI Agent Discovery provides visibility into agent activity, permissions, and data access across platforms including Microsoft Copilot, Salesforce Agentforce, ChatGPT Enterprise, OpenAI Enterprise GPT, and Nexos.ai4
.The announcements signal a fundamental shift in how enterprises must approach securing autonomous AI agents. Legacy network controls were not designed to govern systems that execute commands, access sensitive data, and trigger workflows autonomously at machine speed with behavior indistinguishable from legitimate user activity
4
. Michael Sentonas, president of CrowdStrike, stated: "Security built for static applications can't keep up with autonomous systems. Organizations need real-time visibility and control over AI behavior wherever it runs"4
.While CrowdStrike's platform addresses multiple governance layers—from endpoint security for AI to cloud runtime protection and identity-based governance—no single vendor covers all five governance layers identified in the OWASP Agentic Top 10 framework
1
. Organizations deploying autonomous agents must evaluate whether their security stack can answer critical governance questions across agent decisions, cloud runtime, supply chain provenance, prompt-layer inspection, and pre-production validation. Three or more unanswered vendor questions indicate ungoverned agents in production, creating risk that compounds at the speed of AI execution1
.Summarized by
Navi
[1]
[2]
29 Apr 2025•Technology

15 Dec 2025•Technology

17 Sept 2025•Technology
