CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◬ AI & Machine Learning Mar 19, 2026

F5 Acquires Agentic AI Security Startup Fletch - Dark Reading

Dark Reading Archived Mar 19, 2026 ✓ Full text saved

F5 Acquires Agentic AI Security Startup Fletch Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    APPLICATION SECURITY CYBERSECURITY OPERATIONS NEWS News, news analysis, and commentary on the latest trends in cybersecurity technology. F5 Acquires Agentic AI Security Startup Fletch Agentic AI technology will be integrated into the recently launched F5 Application Delivery and Security Platform. Jeffrey Schwartz,Contributing Writer June 6, 2025 3 Min Read SOURCE: MICHAEL VI VIA ALAMY STOCK PHOTO F5 this week announced the acquisition of Fletch, a San Francisco-based startup with agent-based artificial intelligence (AI) technology that analyzes massive amounts of threat intelligence data and remediates the most severe vulnerabilities in real time. Terms of the deal were not disclosed, but most of Fletch's 15 employees have joined F5, which was seeking the technology and expertise to bring agentic AI capabilities to the recently introduced F5 Application Delivery and Security Platform (ADSP). Launched earlier this year, the ADSP unifies F5's load balancing and network traffic technology with its application programming interface (API) security offerings, creating what it describes as an integrated application delivery controller (ADC) and security platform. Chris Ford, vice president of F5's AI Center of Excellence, says F5 will integrate Fletch's agentic AI services into the new F5 AI Data Fabric. Released earlier this year, the AI Data Fabric is a part of the ADSP that aims to simplify the implementation of generative AI capabilities across the F5 portfolio. Related:Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy "The Fletch technology will help accelerate our security analytics story with agentic AI," Ford says. In a blog post announcing the acquisition, Fletch founder and CEO Grant Wernick explained why the ADSP needs agentic AI. "Agentic AI can analyze this noise, correlate it with external and internal data sources, and prioritize the most critical threats, often before an indicator of compromise is found," Wenick noted. "It can also provide real-time context and assign tasks to other agents." F5 describes its new AI Data Fabric as an AI factory that combines data-processing pipelines, foundational transformer models, its ecosystem of shared modules, machine-learning operations, and access to the control plane via a software development kit. The AI Data Fabric is designed to generate and label training data, train and tune task-specific models, and package and deploy those models. Further, it monitors the models' performance and tracks any degradation of machine-learning model performance, aka "drift." However, F5 needed to enhance the AI Data Fabric with natural language processing (NLP), agentic AI, and security analytics capabilities, according to Ford. "We were looking for a property that would help us in this area, and we found them in Fletch," he says. "We're seeking to embed artificial intelligence and machine learning into the products that we deliver to customers." Security Alert Help In the coming months, F5 plans to integrate Fletch's natural language interfaces with the new AI assistants released with the AI Data Fabric. Fletch's technology will also prioritize alerts. Related:Automaker Secures the Supply Chain With Developer-Friendly Platform "The first use case, of course, is simplifying the alert noise with proactive tasks," Ford says. "But the capabilities can also generate narratives about security posture. For example, they can do dynamic visualizations on data, so we can help our customers explore their data just by asking for it in a natural language interface and generally generating more proactive insights." Fletch also offers feeds to threat intelligence sources. They scour open source intelligence sources, such as websites, Ford says. "It monitors around 10,000 sources on a daily basis, with around 100,000 different articles scanned," he notes. Ford says it uses AI to discover new sources, expire old ones, and perform semantic analysis on all the collected content to identify data, such as hard and soft indicators of compromise. "They can map to the MITRE attack framework and do things like deduplication," Ford says. "They're using AI on all this data that they collect to correlate it with alerts to lead them in the direction of the most impactful alerts." About the Author Jeffrey Schwartz Contributing Writer Jeffrey Schwartz is a journalist who has covered information security and all forms of business and enterprise IT, including client computing, data center and cloud infrastructure, and application development for more than 30 years. Jeff is a regular contributor to Channel Futures. Previously, he was editor-in-chief of Redmond magazine and contributed to its sister titles Redmond Channel Partner, Application Development Trends, and Virtualization Review. Earlier, he held editorial roles with CommunicationsWeek, InternetWeek, and VARBusiness. Jeff is based in the New York City suburb of Long Island. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like APPLICATION SECURITY Trump Administration Rescinds Biden-Era Software Guidance by Alexander Culafi JAN 29, 2026 APPLICATION SECURITY Microsoft Fixes Exploited Zero Day in Light Patch Tuesday by Jai Vijayan, Contributing Writer DEC 09, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 APPLICATION SECURITY Oracle Cloud Users Urged to Take Action by Jai Vijayan, Contributing Writer MAR 31, 2025 Latest Articles in DR Technology CYBER RISK Why Post-Quantum Cryptography Can't Wait MAR 12, 2026 IDENTITY & ACCESS MANAGEMENT SECURITY Delinea's StrongDM Acquisition Highlights the Changing Role of PAM MAR 12, 2026 ENDPOINT SECURITY Cylake Offers AI-Native Security Without Relying on Cloud Services MAR 6, 2026 THREAT INTELLIGENCE Fig Security Emerges From Stealth to Fix Broken Security Operations MAR 5, 2026 Read More DR Technology Want more Dark Reading stories in your Google search results?
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◬ AI & Machine Learning
    Published
    Mar 19, 2026
    Archived
    Mar 19, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗