top of page

SailPoint Research Highlights Rapid AI Agent Adoption, Driving Urgent Need for Evolved SecurityShare

  • 96% of tech professionals view AI agents as a growing security risk, yet 98% of organizations plan to expand adoption

  • AI agents are viewed as a greater security risk than traditional machine identities

  • Lack of governance and visibility over AI agents is putting sensitive enterprise data at risk

  • Experts urge AI agents be managed like human identities, with clear access controls and accountability



According to the report, 82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them. The report also presented a striking paradox: 96% of technology professionals consider AI agents a growing risk, even as 98% of organizations plan to expand their use of them within the next year.


The terms “AI agent” or “agentic AI” broadly encompass autonomous systems that perceive, make decisions, and take action to achieve specific goals within an environment. These agents often require several different machine identities to access needed data, applications and services, and they introduce additional complexities like self-modification and the potential to generate sub-agents. Notably, 72% state AI agents pose a greater risk than machine identities. Factors contributing to AI agents as a security risk include:


  • AI agents’ ability to access privileged data (60%)

  • Their potential to perform unintended actions (58%)

  • Sharing privileged data (57%)

  • Making decisions based on inaccurate or unverified data (55%)

  • Accessing and sharing inappropriate information (54%)


“Agentic AI is both a powerful force for innovation and a potential risk,” said Chandra Gnanasambandam, EVP of Product and CTO at SailPoint. “These autonomous agents are transforming how work gets done, but they also introduce a new attack surface. They often operate with broad access to sensitive systems and data, yet have limited oversight. That combination of high privilege and low visibility creates a prime target for attackers. As organizations expand their use of AI agents, they must take an identity-first approach to ensure these agents are governed as strictly as human users, with real-time permissions, least privilege and full visibility into their actions.”


Today, AI agents have access to customer information, financial data, intellectual property, legal documents, supply chain transactions, and other highly sensitive data. Yet respondents reported deep concerns over the ability to control the data AI agents can access and share, with an overwhelming 92% stating that governing AI agents is critical to enterprise security. Alarmingly, 23% reported their AI agents have been tricked into revealing access credentials. Additionally, 80% of companies say their AI agents have taken unintended actions, including:


  • Accessing unauthorized systems or resources (39%)

  • Accessing or sharing sensitive or inappropriate data (31% and 33%)

  • Downloading sensitive content (32%)


AI agents are not just part of systems; they are a distinct identity type. With nearly universal plans (98%) to expand their use of agentic AI in the next year, comprehensive identity security solutions that not only govern human identities but also AI and machine identities are essential. These solutions must have the ability to discover all AI agents within the environment, provide unified visibility, enforce zero standing privilege and ensure auditability—helping organizations strengthen security and meet regulatory requirements. In an era of widespread data breaches, poorly governed AI agents only increase risk.




Methodology


IT professionals responsible for AI, security, identity management, compliance, and operations at enterprise companies representing all seniority levels were invited to participate in a survey on their company’s use of AI agents. A total of 353 qualified participants completed the survey, which was conducted by Dimensional Research, an independent third-party. All participants had enterprise security responsibilities. Participants were from 5 continents, providing a global perspective.

Comments


connexion_panel_edited.jpg
CXO_8-in-1.png
subscribe_button.png

Disclaimer: The "Industry Events" section in Inno-Thought website serves as a platform for event organizers and vendors to list their events for free. Ho Hon Asia reserves the right, at its discretion, to not proceed with publication/posting at any time or to remove the content following publication.

 

By providing your email address and submitting this form, you agree to receive updates about the event listed, including schedule changes, reminders, and important information.

 

The event information contained in the listing above is for reference only. While we have made every attempt to ensure that the info has been obtained from reliable sources, we are not responsible for any errors or omissions, or for the results obtained from the use of this info. In no event will Ho Hon Asia Limited, its related partnerships or corporations, or the partners, agents or employees thereof be liable to you or anyone else for any decision made or action taken in reliance on the information in this site or for any consequential, special or similar damages, even if advised of the possibility of such damages.

 

Information subject to change; check official sources. The Organisers reserve the right to modify the Event program, schedule, speakers, and activities without prior notice.

 

Also, the event organizers reserve the right to accept or reject any registration application at its sole discretion, without providing reasons or explanation. Submission of a registration does not guarantee participation in the event.

2026 @ Inno-Thought and its affiliates. All rights reserved.

bottom of page