{"id":11966,"date":"2026-04-09T14:36:34","date_gmt":"2026-04-09T19:36:34","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11966"},"modified":"2026-04-09T14:38:59","modified_gmt":"2026-04-09T19:38:59","slug":"silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/","title":{"rendered":"4 ways AI agents change the way we approach Identity Security"},"content":{"rendered":"\n<p>As if gaining visibility into all human and non-human identities&nbsp;wasn\u2019t&nbsp;a big enough task for security teams, adding AI agents into the mix takes identity complexity to a new level. Organizations of all sizes are tackling this new reality, where it feels premature to confidently say they know about all the AI agents running in their environment.&nbsp;<\/p>\n\n\n\n<p>That uncertainty is not a knowledge gap. It is&nbsp;an&nbsp;attack surface.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.silverfort.com\/landing-page\/campaign\/gartner-report-iam-for-agents\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Gartner's Report\">Gartner\u2019s new report on IAM for AI agents<\/a>&nbsp;names the real&nbsp;nugget of truth: \u201cPurpose\/intent cannot be discovered after the fact by monitoring and observability capabilities.\u201d<\/p>\n\n\n\n<p><strong>That is not just&nbsp;analyst&nbsp;language. It is a fundamental shift in how we need to think about governing agents. You cannot govern agents by watching them after-the-fact. You&nbsp;must&nbsp;know who they are, what they are for, and who is accountable&nbsp;<em>before<\/em>&nbsp;they run.&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The numbers that should change your priorities<\/h2>\n\n\n\n<p>Gartner\u2019s data reinforces the urgency. By 2029, over 50% of successful attacks against AI agents will exploit access control weaknesses.&nbsp;By the year before, 90% of organizations that share credentials between humans and agents will need to make significant investments to undo that design.<img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"296\" src=\"blob:https:\/\/www.carahsoft.com\/0891bd97-737e-443f-aefd-43c79f896dbd\" alt=\"Gartner IAM for AI agents stat graphic-18 (1)\"><\/p>\n\n\n\n<p>Those numbers are consequences, not causes. The root cause is structural: IAM maturity for agents is uneven. The Gartner lifecycle maturity assessment makes this visible. Authentication and monitoring capabilities are relatively mature. Identity registration and authorization are not.&nbsp;That gap is the story.&nbsp;<\/p>\n\n\n\n<p>Weak identity registration means the agent was never properly onboarded as an identity. No defined owner. No declared purpose. No documented scope. It has credentials and it is running, but nobody can tell you who built it, what it is supposed to do, or what happens when it breaks. When registration is weak, ownership is unclear. And when ownership is unclear, accountability does not exist.&nbsp;<\/p>\n\n\n\n<p>Weak authorization means the agent has more access than it needs. It can reach databases, APIs, and workflows that have nothing to do with its intended function. Nobody scoped it down because nobody defined what \u201cdown\u201d looks like. When authorization is weak, privilege is excessive.<\/p>\n\n\n\n<p><strong>Now combine excessive privilege with autonomy.&nbsp;<\/strong><a href=\"https:\/\/www.silverfort.com\/blog\/the-identity-layer-missing-from-the-ai-kill-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Silverfort Blog AI Kill Chain\"><strong>An agent that can reason, chain tools, and act on its own<\/strong><\/a><strong>, with more access than it should have, and no one clearly accountable for what it does. That is the exploitable attack surface. That is the chain revealed in Gartner\u2019s data.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">You cannot protect what you cannot see<\/h2>\n\n\n\n<p>Before you can govern agents, you need to find them. All of them. Not just the ones your platform team sanctioned. The ones&nbsp;that&nbsp;developers spun up to solve&nbsp;an&nbsp;issue. The ones contractors built. The ones that exist because someone needed to \u201cjust get this working.\u201d&nbsp;<\/p>\n\n\n\n<p>We hear this consistently from security teams. As one InfoSec manager at a professional services firm put it: \u201cWe do not find out about it until someone goes and does an actual audit of the system.\u201d&nbsp;<\/p>\n\n\n\n<p>Gartner\u2019s assessment confirms it: identity registration is one of the least mature IAM capabilities for AI agents.&nbsp;Most organizations cannot answer the basics: What is this agent supposed to do? Who owns it? What happens when it breaks?&nbsp;<\/p>\n\n\n\n<p><strong>Discovery is not a checkbox. It is the foundation. Without it, every policy you write is based on assumptions, and assumptions do not survive first contact with autonomous agents operating at machine speed.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The identity registration gap<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_Embedded-in-Blog-300x300-1.jpg\" alt=\"\" class=\"wp-image-11969\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_Embedded-in-Blog-300x300-1.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_Embedded-in-Blog-300x300-1-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Most organizations are trying to govern agents with the wrong tools. They are&nbsp;monitoring. They are logging. But monitoring tells you what happened. Identity registration tells you what should happen. Authorization enforces the boundary between them.&nbsp;<\/p>\n\n\n\n<p>If your governance model depends on catching problems after they occur, you are always going to be behind.&nbsp;<\/p>\n\n\n\n<p>This is where many organizations&nbsp;reach for&nbsp;familiar tools. IGA platforms can help with registration and lifecycle management. IAM solutions like Okta or Entra ID can register agent identities. These are necessary steps. But they&nbsp;stop&nbsp;there. They can tell you an agent exists and who requested it. They cannot&nbsp;enforce&nbsp;anything at the moment that agent acts.&nbsp;<\/p>\n\n\n\n<p><strong>That is the gap: governance on paper versus enforcement in production.<\/strong>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Agents are identities, but not like any you have managed before<\/h2>\n\n\n\n<p>The way I read Gartner\u2019s recommendations, there is a unifying thread: treat AI agents like you would treat any identity in your organization. They authenticate. They access resources. They act on behalf of someone. That is not a tool. That is an identity.&nbsp;<\/p>\n\n\n\n<p>But agents are more complex than traditional identities. They are what we call composite identities. They combine the blast radius of service accounts with the unpredictability of human decision-making at machine speed.<\/p>\n\n\n\n<p>Four reasons that make them different:&nbsp;<\/p>\n\n\n\n<ul>\n<li>They act autonomously, unlike service accounts that execute predefined operations.<\/li>\n\n\n\n<li>They may inherit human delegation, creating privilege escalation risk.<\/li>\n\n\n\n<li>They may chain multiple machine identities in a single task.<\/li>\n\n\n\n<li>They may operate across trust boundaries your IAM system was not designed to handle.<\/li>\n<\/ul>\n\n\n\n<p>Think about how you onboard an employee. You do not give them admin access on day one.&nbsp;<strong>You define their role, their manager, their&nbsp;scope. You review their access as responsibilities change. Agents need&nbsp;that&nbsp;same lifecycle. But right now, most organizations are skipping straight to \u201cgive them credentials and hope for the best.\u201d<\/strong>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What runtime enforcement actually looks like<\/h2>\n\n\n\n<p>Gartner calls out the authorization gap. But what does&nbsp;closing&nbsp;that gap look like in practice?&nbsp;<\/p>\n\n\n\n<p>Even modern IAM systems, including conditional access and continuous evaluation, were designed primarily to evaluate who is signing in and what that identity is&nbsp;generally allowed&nbsp;to do. Agents introduce&nbsp;a different problem. They do not just sign in.&nbsp;<strong>They execute.<\/strong>&nbsp;They invoke tools dynamically. They operate across multiple identity contexts within a single task.&nbsp;<\/p>\n\n\n\n<p>Traditional conditional access evaluates&nbsp;<em>who<\/em>&nbsp;is signing in and under&nbsp;<em>what<\/em>&nbsp;conditions. Agent governance must also evaluate what is being&nbsp;<em>executed<\/em>,&nbsp;<strong>at the moment&nbsp;of execution.<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>Here is what that looks like:&nbsp;<\/strong>an agent is about to call a tool, read from a database, trigger an API, or execute a workflow. Before that happens, there is a decision point. Runtime enforcement evaluates the composite identity: the human owner, the agent itself, the tool credentials, and the defined purpose, all at execution time. Is this agent authenticated? Does it have permission for this specific action? Is this behavior consistent with its intended function?&nbsp;<\/p>\n\n\n\n<p><strong>That is runtime enforcement. Not configuration-time policies that assume the agent will behave as designed. Decisions at execution time, every time.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"328\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/image.jpg\" alt=\"\" class=\"wp-image-11967\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/image.jpg 624w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/image-300x158.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/image-500x263.jpg 500w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What Silverfort does differently<\/h2>\n\n\n\n<p>If the failure pattern is identity immaturity, then the control point must also be identity. Most AI agent security approaches start at the model or application layer.&nbsp;<a href=\"https:\/\/www.silverfort.com\/platform\/ai-agent-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Identity Layer\">We start at the identity layer<\/a>. Because if identity is uncontrolled, everything&nbsp;above&nbsp;is fragile.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Human accountability by design<\/h2>\n\n\n\n<p>Every AI agent is explicitly tied to&nbsp;a real human&nbsp;owner in policy. Not&nbsp;informally. Not in documentation. In enforcement logic.<\/p>\n\n\n\n<p>Every action can be traced back to a real chain of accountability: which human owns this agent, what identity the agent is operating under, and what credentials it uses to access resources. That is what we mean by composite identity. And it is what makes enforcement possible before monitoring even begins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Runtime enforcement at the identity layer<\/h2>\n\n\n\n<p>Silverfort&nbsp;enforces at&nbsp;the identity decision point at runtime. For MCP-connected agents, that means sitting&nbsp;in line&nbsp;between the agent and the MCP server. For platform-native agents, enforcement is delivered through native integration, directly within the platform.&nbsp;<\/p>\n\n\n\n<p><strong>Before a tool call executes, we evaluate identity, context, delegation, and policy in real time. If the action exceeds scope, it does not execute. This is not&nbsp;configuration-time IAM. This is execution-time identity enforcement. That distinction matters.<\/strong>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Least privilege that survives autonomy<\/h2>\n\n\n\n<p>Static least privilege assumes predictable behavior. Agents break that assumption. They reason. They chain tools.&nbsp;They drift from what they were originally authorized to do.&nbsp;Least&nbsp;privilege must be&nbsp;validated&nbsp;at runtime, not just set at provisioning.&nbsp;<\/p>\n\n\n\n<p>That means if an agent tries to access a resource outside its declared purpose, it gets blocked. If delegated privileges start expanding beyond what was originally scoped, they are&nbsp;contained. This is the same enforcement model we apply to humans and service accounts, now extended to AI agents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">One Identity Security Platform<\/h2>\n\n\n\n<p>AI Agent Security is not a standalone product. Agents sit at the intersection of human identities, non-human identities, service accounts, cloud resources, SaaS applications, and protocol layers like MCP. If those domains are secured separately, agents will exploit the seams.&nbsp;<\/p>\n\n\n\n<p>Silverfort unifies this. One policy framework.&nbsp;<a href=\"https:\/\/www.silverfort.com\/blog\/introducing-ivip-identity-is-a-system-its-time-we-observed-it-like-one\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Observability Layer\">One observability layer<\/a>. One enforcement architecture. Across humans, machines, and AI. That is the architectural difference.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enabling AI innovation without slowing it down<\/h2>\n\n\n\n<p>Security leaders are not trying to stop AI adoption. They are trying to make sure it does not outrun their ability to govern it. The organizations moving fastest with AI agents are the ones that figured out early: the right security model is a speed advantage, not a drag.&nbsp;<\/p>\n\n\n\n<p>Cars have brakes so you can drive fast. The same principle applies here.&nbsp;<\/p>\n\n\n\n<p>But, the brakes only work if they\u2019re connected to the same system. Today, most organizations secure human identities in one tool, service accounts in another, and AI agents (if at all) in a third. If those domains are secured separately, agents will exploit the seams.&nbsp;<\/p>\n\n\n\n<p>That\u2019s the reason teams need a unified&nbsp;<a href=\"https:\/\/www.silverfort.com\/platform\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Identity Security Platform\">Identity Security Platform<\/a>.&nbsp;<\/p>\n\n\n\n<ul>\n<li>One policy framework means a CISO can define \u201cno agent accesses production data without human approval\u201d once and have it&nbsp;applied&nbsp;across every agent, every platform, every protocol. No per-tool configuration. No coverage&nbsp;gaps.<\/li>\n\n\n\n<li>One observability layer means when an agent acts, you see the full chain: which human triggered it, which NHI it authenticated with, which tool it called, and what data it touched. Not three dashboards stitched together after the fact, but a single view that makes incident response possible in minutes instead of days.<\/li>\n\n\n\n<li>One enforcement point means policy is applied at runtime,&nbsp;at the moment&nbsp;of action, not retroactively through quarterly access reviews. When an agent requests access, the decision happens&nbsp;inline. Allow, deny, or&nbsp;<a href=\"https:\/\/www.silverfort.com\/blog\/six-capabilities-every-identity-security-platform-must-have\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Silverfort Blog Identity Security\">step up<\/a>. Before the action&nbsp;executes, not after.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This is what shifts AI agent security from a governance exercise to an operational capability. Discovery tells you what exists. Registration tells you who owns it. Runtime enforcement tells agents what they\u2019re actually allowed to do,&nbsp;in&nbsp;the moment, every time.&nbsp;<\/p>\n\n\n\n<p>AI agents represent the next frontier of identity. Identity Security must evolve accordingly, from governance alone to&nbsp;<a href=\"https:\/\/www.silverfort.com\/platform\/#rap\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Silverfort Platform 2\">continuous, runtime enforcement<\/a>. Discover what is running. Register who owns it. Enforce at the moment of execution. That is the path.&nbsp;<\/p>\n\n\n\n<p><em><strong>The Gartner report is worth reading in full. :<\/strong>&nbsp;<a href=\"https:\/\/www.silverfort.com\/landing-page\/campaign\/gartner-report-iam-for-agents\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Gartner Report\">https:\/\/www.silverfort.com\/landing-page\/campaign\/gartner-report-iam-for-agents\/<\/a>.<\/em><\/p>\n\n\n\n<p><strong><em>Want to learn how Silverfort discovers and protects AI agent identities? <\/em><\/strong><a href=\"https:\/\/demo-w1.silverfort.com\/player\/?demoId=e0af2d0a-29a4-4263-b00a-85beb39c955d&amp;openGuidesToolbar=false&amp;showGuide=true&amp;showGuidesToolbar=true&amp;showHotspots=true&amp;_gl=1*16a3qsi*_gcl_au*NjkxMjQ3MjgyLjE3NzM4Mzc4Mjk.*_ga*NDIyNjE0Njg4LjE3NzM4Mzc4Mjg.*_ga_4052YMBRRZ*czE3NzM4NjI1OTkkbzMkZzAkdDE3NzM4NjI1OTkkajYwJGwwJGgw\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Bottom CTA\"><strong><em>See AI agent Security in action.<\/em><\/strong><\/a><\/p>\n\n\n\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including&nbsp;Silverfort, we deliver\u202f<\/em><a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Carahsoft Solve\"><em>solutions<\/em><\/a><em>\u202ffor Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the&nbsp;<\/em><a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Carahsoft Blog\"><em>Carahsoft Blog<\/em><\/a><em>&nbsp;to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n\n<p><em>This post originally appeared on&nbsp;<a href=\"https:\/\/www.silverfort.com\/blog\/4-ways-ai-agents-change-the-way-we-approach-identity-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Silverfort AI Agents Blog 2026 - Bottom CTA\">Silverfort.com<\/a>, and is re-published with permission.<\/em><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>As if gaining visibility into all human and non-human identities&nbsp;wasn\u2019t&nbsp;a big enough task for security teams, adding AI agents into the mix takes identity complexity to a new level. Organizations of all sizes are tackling this new reality, where it &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,1493],"tags":[1666,605,1693,1694],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 ways AI agents change the way we approach Identity Security | Carahsoft<\/title>\n<meta name=\"description\" content=\"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 ways AI agents change the way we approach Identity Security | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-09T19:36:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T19:38:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"4 ways AI agents change the way we approach Identity Security\",\"datePublished\":\"2026-04-09T19:36:34+00:00\",\"dateModified\":\"2026-04-09T19:38:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\"},\"wordCount\":2037,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg\",\"keywords\":[\"Agentic AI\",\"Artificial Intelligence\",\"Identity Security\",\"Silverfort\"],\"articleSection\":[\"Artificial Intelligence\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\",\"name\":\"4 ways AI agents change the way we approach Identity Security | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg\",\"datePublished\":\"2026-04-09T19:36:34+00:00\",\"dateModified\":\"2026-04-09T19:38:59+00:00\",\"description\":\"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 ways AI agents change the way we approach Identity Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 ways AI agents change the way we approach Identity Security | Carahsoft","description":"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/","og_locale":"en_US","og_type":"article","og_title":"4 ways AI agents change the way we approach Identity Security | Carahsoft","og_description":"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/","og_site_name":"| Carahsoft","article_published_time":"2026-04-09T19:36:34+00:00","article_modified_time":"2026-04-09T19:38:59+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"4 ways AI agents change the way we approach Identity Security","datePublished":"2026-04-09T19:36:34+00:00","dateModified":"2026-04-09T19:38:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/"},"wordCount":2037,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg","keywords":["Agentic AI","Artificial Intelligence","Identity Security","Silverfort"],"articleSection":["Artificial Intelligence","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/","url":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/","name":"4 ways AI agents change the way we approach Identity Security | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg","datePublished":"2026-04-09T19:36:34+00:00","dateModified":"2026-04-09T19:38:59+00:00","description":"Discover 4 ways AI agents are reshaping identity security, and why visibility, intent and access control must come before agents run.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/4-ways-AI-agents-change-the-way-we-approach-Identity-Security_-Post-Preview-875x635-1.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/silverfort-4-ways-ai-agents-change-the-way-we-approach-identity-security-blog-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"4 ways AI agents change the way we approach Identity Security"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11966"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11966"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11966\/revisions"}],"predecessor-version":[{"id":11974,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11966\/revisions\/11974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11968"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}