Netcrook Logo
👤 NEURALSHIELD
🗓️ 18 Feb 2026   🌍 Middle-East

Invisible Insiders: How Palo Alto Networks Is Betting $400 Million to Secure the AI Agent Wild West

Subtitle: The cybersecurity giant’s latest acquisition targets a new breed of threats lurking inside our most trusted systems - AI agents with unchecked power.

Picture this: a digital workforce of AI agents quietly sifting through your company’s most sensitive data, executing scripts, and moving files - all without tripping a single alarm. These aren’t hypothetical threats but the reality facing today’s enterprises, and Palo Alto Networks is making a bold move to confront it head-on. In a deal valued at $400 million, the cybersecurity heavyweight is acquiring Koi Security, an Israeli startup pioneering a new frontier called Agentic Endpoint Security. The aim? To rein in the “ultimate insiders” of the AI age before attackers exploit this growing blind spot.

Agentic Endpoints: The New Security Abyss

For decades, security teams have trained their sights on classic malware - executables, viruses, and suspicious network traffic. But the rise of “agentic” systems has changed the rules. Modern AI agents act with sweeping permissions, reading, writing, and moving data across systems with little oversight. They’re embedded in developer workflows, customer support bots, and automation scripts, operating with trust but outside the reach of legacy defenses like antivirus or endpoint detection and response (EDR) tools.

This new class of software - extensions, plugins, packages, scripts, and even AI model artifacts - forms what experts call the Agentic Endpoint. It’s an unmanaged, ever-expanding attack surface on every laptop, server, and cloud machine. Attackers have taken notice, exploiting authentication weaknesses, hijacking credentials, and leveraging API-based remote code execution to turn trusted automation into silent attack vectors.

Closing the Blind Spot

Koi Security’s technology was built for this challenge. Its platform automatically discovers and inventories agentic software across an organization’s IT landscape, using AI-driven risk engines to monitor code changes, runtime actions, and suspicious network flows. If a rogue agent is detected, Koi can quarantine it, revert software versions, or alert system owners in real time. A supply chain gateway even scrutinizes code from sources like GitHub and Hugging Face before it enters production.

Palo Alto Networks plans to integrate Koi’s capabilities into its flagship Prisma AIRS AI security suite and Cortex XDR endpoint solution, promising dashboards that reveal agent permissions, data flows, and behavioral anomalies. The goal is ambitious: to give enterprises the power to govern every AI agent, plugin, and script - no matter how deeply embedded or dynamic.

Lee Klarich, Palo Alto’s Chief Product and Technology Officer, calls AI agents “the ultimate insiders,” highlighting the urgent need for new guardrails. Koi CEO Amit Assaraf points out that traditional security tools are “blind” to agentic-first environments, leaving organizations exposed as AI automates everything from coding to customer service.

This acquisition isn’t just about plugging a gap; it signals a broader shift in cyber defense priorities. As endpoints become ecosystems of autonomous agents, security must evolve from static scans to continuous, agent-aware protection.

Conclusion: The Next Battlefield

The Koi acquisition marks a watershed moment: the dawn of agentic security as a boardroom concern. As AI agents proliferate, organizations must rethink what it means to trust code - especially when that code acts autonomously. Palo Alto Networks is betting big that the next major cyber battle will be fought in the shadows cast by our own digital assistants. The question now: Will the rest of the industry follow suit before the attackers do?

WIKICROOK

  • Endpoint Security: Endpoint security protects devices such as laptops, phones, and servers that connect to a company’s network from cyber threats and unauthorized access.
  • Agentic Endpoint: Agentic endpoints are AI or automated system access points that can perform actions independently, expanding the attack surface and requiring strong cybersecurity controls.
  • Remote Code Execution (RCE): Remote Code Execution (RCE) is when an attacker runs their own code on a victim’s system, often leading to full control or compromise of that system.
  • Credential Hijacking: Credential hijacking is when attackers steal login details to impersonate users, gaining unauthorized access to sensitive systems or data.
  • Supply Chain Gateway: A supply chain gateway checks and verifies third-party software components before deployment, helping prevent supply chain attacks and ensuring secure software delivery.
Palo Alto Networks AI Security Koi Security

NEURALSHIELD NEURALSHIELD
AI System Protection Engineer
← Back to news