CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 19, 2026

Entro Security AGA brings governance and control to enterprise AI agents and access

Help Net Security Archived Mar 19, 2026 ✓ Full text saved

Entro Security has launched its Agentic Governance & Administration (AGA), a new pillar of the Entro platform designed to help security and identity teams govern AI agents and AI access across enterprise systems. Applied to the new realities of AI-driven access, AGA brings governance back to fundamentals of inventory, ownership, least privilege, auditability, and enforcement as organizations accelerate adoption of AI assistants, agent platforms, and locally running agents. “Enterprise AI adoptio

Full text archived locally
✦ AI Summary · Claude Sonnet


    Industry News March 19, 2026 Share Entro Security AGA brings governance and control to enterprise AI agents and access Entro Security has launched its Agentic Governance & Administration (AGA), a new pillar of the Entro platform designed to help security and identity teams govern AI agents and AI access across enterprise systems. Applied to the new realities of AI-driven access, AGA brings governance back to fundamentals of inventory, ownership, least privilege, auditability, and enforcement as organizations accelerate adoption of AI assistants, agent platforms, and locally running agents. “Enterprise AI adoption rarely starts with a strategy deck. It starts with a connection,” said Itzik Alvas, CEO of Entro Security. “A developer connects a tool to an LLM, a team installs an AI app in SaaS, or someone authenticates an agent against SharePoint, GitHub, Salesforce, or internal APIs. It works, spreads fast, and then security teams get questions they can’t answer fast enough. Who connected what, to which systems, with what permissions, and using which identities? Our AGA helps teams regain clarity and control as AI access becomes the default.” AGA extends the proven IGA playbook to a new access surface At first glance, agentic AI governance looks familiar, with permissions, owners, and access reviews. But agentic AI introduces a new access surface that traditional IAM and Identity Governance and Administration (IGA) tools were not designed to govern effectively. The user is often an AI service or locally running agent. Access paths are powered by NHIs, tokens, service accounts, API keys, and secrets. And blast radius is defined by OAuth scopes, integrations, syncing, and automation, rather than a single human login. AGA applies the same governance muscle security and IAM teams already use, adapted to a reality where agents can be connected in seconds, operate continuously, and drift quickly as adoption spreads across teams. How AGA works: Turning AI usage into governable access AGA builds a structured AI agent profile from three layers: Sources: endpoint telemetry, agent foundries, cloud environments where NHIs are used, and MCP servers Targets: the enterprise assets and applications an agent touches Identities: the human, non-human, or secret identities used to access those targets From there, AGA delivers two core capabilities: Shadow AI discovery Shadow AI is not limited to SaaS apps and LLMs. It includes the full agent footprint across endpoints, agent platforms, and cloud environments. AGA uses EDR integrations to surface AI clients and local agent runtimes on workstations, while Entro integrates natively with agent foundries (including AWS Bedrock and Copilot Studio) and cloud service providers to discover the agents being created and the NHIs they rely on, such as OAuth applications, IAM roles, and service accounts. This provides a single governed view of where an agent runs, what it can access, and which identities power it. AI agents monitoring and enforcement Discovery answers what exists. Monitoring and enforcement answers what is happening, and what is allowed. AGA provides MCP activity visibility and policy enforcement so teams can audit and govern agent behavior as it executes, including visibility into tools invoked and connected services, policy controls for sanctioned MCP targets and AI client behaviors, audit trails of allowed and blocked activity, and AI-focused controls to reduce sensitive data and secret exposure. More about Entro RSAC 2026 Share
    💬 Team Notes
    Article Info
    Source
    Help Net Security
    Category
    ◇ Industry News & Leadership
    Published
    Mar 19, 2026
    Archived
    Mar 19, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗