Abstract Security and SentinelOne Partner to Deliver Faster, Smarter, AI-Driven Security Operations

Posted in Commentary with tags on July 17, 2025 by itnerd

Abstract Security and SentinelOne have joined forces to deliver a powerful new integration between Abstract’s real-time security data pipeline and SentinelOne’s AI-powered Singularity Platform—reshaping how security teams detect, analyze, and respond to threats. 

This partnership addresses one of cybersecurity’s biggest challenges: how to find true threats in a sea of irrelevant data. Together, Abstract and SentinelOne® provide a scalable, intelligent solution that filters out noise, reduces cost, and accelerates response times across the enterprise. 

The Power of Two: Intelligence at the Edge, Clarity at the Core 

SentinelOne brings market-leading autonomous protection to endpoints, cloud workloads, and identities—combining behavioral and agentic AI, real-time threat detection, and automated response across the attack surface. With Singularity AI SIEM, organizations gain fast, searchable access to ‘hot’ security data—critical for reducing MTTD (mean time to detect) and MTTR (mean time to respond). 

Abstract Security complements this with a streaming-first, AI-enhanced data pipeline built specifically for security use cases. It ingests from any source, normalizes data to open standards (OCSF), applies advanced filtering, and routes high-value data into the Singularity platform. 

What This Partnership Delivers 

  • Noise Reduction at Scale 
    Abstract filters out irrelevant data before it reaches SentinelOne’s Singularity™ AI SIEM, removing noise and reducing alert fatigue. 
  • Real-Time Analytics and Threat Detection 
    By combining Abstract’s in-stream threat enrichment with SentinelOne’s threat detection capabilities, teams can detect and respond to threats faster and with greater accuracy. 
  • No-Code Integration & Easy Migration to SentinelOne 
    With Abstract’s easy to use drag-and-drop pipeline creation, security teams can deploy in minutes without engineering effort and migrate from legacy SIEMs to SentinelOne’s Singularity™ AI SIEM with zero downtime—thanks to prebuilt connectors and automatic data normalization. 
  • Unified Security Architecture 
    Together, the platforms create a streamlined, modern security stack—eliminating data silos, blind spots, and manual workflows. 

Why It Matters Now 

Organizations are under pressure to reduce risk, lower costs, and modernize outdated security infrastructure. This partnership offers a practical, high-impact path forward—unlocking value from existing data and enabling security teams to operate at machine speed. 

For security teams looking to move beyond the limitations of legacy SIEMs, this opportunity delivers a modern security operations platform built for today and ready for what’s next.

KnowBe4 Research Reveals That Fake Internal Emails Dominate Phishing Simulation Clicks

Posted in Commentary with tags on July 17, 2025 by itnerd

KnowBe4 today released its Q2 2025 Simulated Phishing Roundup report. The roundup highlights a continued trend of employee susceptibility to social engineering techniques that exploit familiarity and trust, as seen in dominant interactions with internal communications and well-known brands, making up 98% of top email subject lines. All data for this roundup was taken from the KnowBe4 HRM+ platform between April 1, 2025, and June 30, 2025. 

Key Findings from the Roundup Report: 

  • Consistency with Previous Quarter
    • Phishing simulation trends remained largely consistent with Q1 2025 (January 1 – March 31, 2025).
  • Internal Topics Dominate
    • Internal-themed topics made up 98.4% of the top 10 most-clicked email templates.
    • Among these, HR was cited in 42.5% of phishing failures and IT in 21.5%.
  • Branded Landing Pages
    • 71.9% of malicious landing page interactions involved branded content.
    • Microsoft was the most common, accounting for 26.7%, followed by LinkedIn, X, Okta, and Amazon.
  • Top Clicked Hyperlinks
    • 80.6% of the top 20 clicked links came from internally-themed simulations.
    • 68.2% of these used domain spoofing techniques.
  • Attachment Interactions
    • PDF attachment clicks rose by 8.1% compared to Q1.
    • PDFs comprised 61.1% of the top 20 attachments, followed by HTML files (20.9%) and Word documents (18.0%).

Download a copy of the Q2 2025 KnowBe4 Simulated Phishing Roundup report, here. 

Companies are at Risk of Filtering Out “the Rick Rubins of the World” 

Posted in Commentary with tags on July 17, 2025 by itnerd

Today’s Wall Street Journal published an article titled, “It’s Time to Rethink the One-Page Résumé” that argues the traditional one-page résumé rule is outdated in the age of AI-driven hiring, and job seekers may improve their chances by providing more detailed, keyword-rich submissions, as long as the content remains relevant and well-structured. 

Evan Reiss, VP, Head of Marketing, Foxit, had this to say: 

“As AI systems evolve toward deeper semantic understanding and contextual analysis, there’s a growing risk of inadvertently introducing bias into high-stakes processes like hiring,” said Evan Reiss, VP, Head of Marketing at Foxit. “Over-reliance on AI to screen candidates can filter out unconventional thinkers. But businesses need the ‘Rick Rubins’ of the world, individual creatives and innovative thinkers whose value lies precisely in what makes them hard to quantify. If AI-first screening mindset spreads across the enterprise, we risk building systems that reward conformity over creativity.”

Reiss continued, “The decline of the one-page résumé reflects a broader shift in the information economy. AI is redefining how we assess candidacy, but also how we extract meaning from content.”

“At Foxit, we’re seeing this shift across sectors like legal, HR, and finance,” Reiss added. “Documents are being designed with intelligent systems in mind.  For professionals and job seekers alike, this means rethinking how content is designed, so it can be easily parsed, understood, and surfaced by AI. Designing for machine comprehension is no longer optional for job seekers.”

So when Evan says companies risk filtering out “the Rick Rubins of the world,” he’s referring to people whose value can’t be easily measured by keywords or conventional metrics — people who bring breakthrough thinking precisely because they don’t follow standard templates. The kind of breakthrough thinking that only humans (not AI) can deliver. In other words, the kinds of candidates AI might overlook, but companies desperately need. 

However, that doesn’t mean that you can/should ignore the growing prevalence of AI across HR, and virtually every other functional area.

Given the state of the job market, it would be wise for people to adjust their job hunting strategies to match the fact that AI is more and more common to deal with resumes. That way it gives a much better chance of scoring an interview at the very least, or in the best case a job. And I would say that companies need to adjust as well to avoid missing out on the perfect candidate because the AI that they use is filtering that person out.

Kyndryl unveils Agentic AI Framework that dynamically evolves to drive enhanced business performance

Posted in Commentary with tags on July 17, 2025 by itnerd

Kyndryl, a leading provider of mission-critical enterprise technology services, today launched the Kyndryl Agentic AI Framework, a new approach to deploying agentic AI to augment human teams. The enterprise-grade Framework orchestrates and dispatches a portfolio of specialized, self-directed, self-learning AI agents that dynamically respond to shifting conditions and keep humans in the loop for oversight. 

The Kyndryl Agentic AI Framework enables enterprises to adopt, deploy and scale agentic AI-powered solutions — whether on-premises, in the cloud or in a hybrid IT setting — to transform and improve their business operations. In deploying the Framework, Kyndryl leverages its expertise from thousands of infrastructure deployments and its experience with generating over 12 million AI-driven insights monthly via Kyndryl Bridge. The Framework combines advanced algorithms, self-learning, optimization and secure-by-design AI agents that translate complex data into clear, understandable insights.

Kyndryl’s new Agentic AI Framework deploys intelligent agents that act, learn and collaborate with humans to drive positive outcomes across complex workflows.

Customers across industries are already working with Kyndryl to explore and understand how they can leverage the Agentic Framework’s sophisticated capabilities, including:

  • A national government evaluating the Kyndryl Agentic AI Framework for a large-scale deployment across their complex IT estate. The government aims to enhance citizen experiences, improve public service, ensure compliance and reduce regulatory risks by leveraging the Framework and Kyndryl’s expertise in transparent and responsible AI. This will empower government stakeholders to align policies with best practices and operate efficiently for the benefit of their constituents. The capability will enable government employees to view real-time, up-to-date insights on metrics such as traffic congestion, hospital bed availability and school attendance.
  • As part of an ongoing modernization program, a leading financial institution is working with Kyndryl Consult to assess how it can apply Kyndryl’s Agentic AI Framework to introduce AI agents for automating compliance, optimizing IT and accelerating service delivery. By leveraging this solution, the institution aims to enhance agility, strengthen cyber resilience, meet regulatory standards, and drive long-term innovation and operational efficiency.

This new Framework comes at a critical moment for enterprise leaders who are struggling to see benefits from AI use cases. In fact, according to Kyndryl’s recently published 2025 People Readiness Report, only 4 in 10 leaders report using AI-powered insights to enhance decision-making or unlock business growth. In addition, only one-fifth of business leaders say the primary use case of AI in their organization is to develop new products and services for customers.

The Kyndryl Agentic AI Framework can help organizations confidently deploy AI with trust and security in mind. The Framework was built with industry-standard encryption protocols, privacy-by-design principles and zero-trust security — fostering trust in AI-driven processes and assurances that agent actions are traceable, interpretable and continuously improved with human oversight. It can also be tailored to meet enterprises’ needs and adapt to industries through self-directed learning, enabling organizations to apply the Framework to a wide range of use cases and projects with speed and confidence.

Kyndryl Consult experts will work side-by-side with customers to assess, design, engineer and plan deployments of the Framework that are tailored to individual customer business requirements.

Learn more information about Kyndryl’s Agentic AI Framework.

Guest Opinion: Do we really want our chatbots driving our Teslas?

Posted in Commentary with tags on July 17, 2025 by itnerd

By Karolis Arbaciauskas, head of business product at NordPass

Google recently announced it enabled Gemini AI to access and interact with third-party apps on Android — so far, only a handful, including Phone, Messages, WhatsApp, and utilities on your phone. But I’m sure the scope will expand. 

Elon Musk also recently took to his X account to announce that xAI’s chatbot is coming to Teslas. The announcement came after quite a rough week for Grok, which experienced a sort of meltdown, praising Adolf Hitler and instructing users on how to commit sexual assault.

In the early years of large language models (LLMs), when discussing language models vs. artificial general intelligence (AGI), I remember people joking that you wouldn’t want your chatbot driving your Tesla. It’s not funny anymore. The sight of people saying, “Grok, park my car and keep it cool till I come back,” is probably not that far away. 

Agents and passwords

It’s only a matter of time before our aspirations to further empower AI agents emerge. The use case where AI agents use password managers and even banking apps on behalf of the user is probably in the very near future. Prompt “calculate and pay the utility bills while I go for a run” sounds appealing, doesn’t it?

In principle, we can already send agents to password vaults, allow them to retrieve passwords, and perform certain operations. There are ways to do that, and they work. However, at this point it is extremely unsafe.

In the near future, AI agents (operators) will likely be able to retrieve passwords or other secrets from password vaults through API integrations without compromising their own login credentials. Such a model of machine-to-machine authentication is already working in other scenarios. It is also secure in principle. The only questions are how much control will the AI have and if it or  threat actors will be able to somehow exploit this access further?

We were promised robots but got social networks instead

Do we want this to happen? I think we do. Pop culture – especially books, movies and games – has long created expectations for this. And in recent years businesses, with the help of the media, have been fueling these expectations. So people in general, or should I say we as a humanity, seem to be waiting for AGI, even though we worry about our privacy and are a little afraid of it. Agentic AI is the closest thing we have right now, so I’m sure the technology will catch on and evolve further. 

Especially seeing how much money venture capital is pouring into AI startups. According to PitchBook, in the first half of 2025 more than half of all venture capital dollars globally, and 64% in the US, went to AI startups. Over the same period, AI helped 36 tech companies achieve unicorn status. 

I won’t go into technology adoption theories (such as Diffusion of innovation or TAM), but KPMG is right in saying that agentic AI deployment will accelerate despite its risks. Why? Because if businesses want it, and people want it, it will happen. We just need to be careful about potential  vulnerabilities and how much control we give away to AI agents. We still don’t know what might happen when the real AGI emerges.

Let’s not forget that passwords to all our accounts (via access to password managers) and banking data are among the most important and most valuable, to us, to AI agents (because when we give them access to our credentials, their capabilities grow significantly), and to criminals. At the same time, the metadata of our interactions with AI agents is very valuable for companies that created those agents.

ABOUT NORDPASS

NordPass is a password manager for both business and consumer clients. It’s powered by the latest technology for the utmost security. Developed with affordability, simplicity, and ease of use in mind, NordPass allows users to securely access their passwords on desktop, mobile, and browsers. All passwords are encrypted on the device, so only the user can access them. NordPass was created by the experts behind NordVPN – the advanced security and privacy app trusted by more than 14 million customers worldwide. For more information: nordpass.com.

Printer Firmware Gaps Leave Organizations Exposed

Posted in Commentary with tags on July 17, 2025 by itnerd

New research from HP Wolf Security reveals that printer platform security – firmware and hardware protection – is being neglected, exposing organizations to security threats that can exfiltrate critical data and hijack devices.

Printers are now smart, connected devices storing sensitive data and operating on long refresh cycles. If left unsecured, they become long-term entry points for data breaches and firmware-based attacks.

The global study, based on 800+ ITSDMs, shows only 36% of IT and security decision-makers apply printer firmware updates promptly, even though IT teams spend an average of 3.5 hours per printer each month managing security issues.

The report also found security gaps across the other stages of the printer’s lifecycle, including:

  • Supplier Selection & Onboarding: Just 38% of ITSDMs say procurement, IT, and security teams collaborate on printer security standards, with 60% warning that lack of collaboration increases risk.
  • Remediation: 70% of ITSDMs are now more worried about offline print risks, like sensitive documents being printed or mishandled by employees.
  • Decommissioning: 86% of ITSDMs say data security concerns block printer reuse or recycling, even as approximately eighty printers per organization sit idle or near end-of-life.

The link to the live report from HP is here: https://www.hp.com/content/dam/sites/garage-press/press/press-kits/2025/hp-wolf-security-study-reveals-gaps-in-print-security-leaving-devices-vulnerable-to-risk/Print%20Lifecycle%20Short%20Report.pdf

Healthcare Ransomware on the decline in 2025, but why? 

Posted in Commentary with tags on July 17, 2025 by itnerd

Comparitech researchers have released a study looking at the impact of healthcare ransomware in H1 2025, finding a decline in attacks compared to H1 2024. 

While the healthcare sector hasn’t seen the same influx in attacks as other industries (a recent 2025 H1 report saw a 50 percent increase across the board from 2024), this could be due to several factors.

Ransomware attacks on healthcare companies continue to have devastating consequences. This became only too evident recently when a patient’s death was linked to the June 2024 attack on Synnovis in the UK.

Key findings include:

  • 211 attacks in total – 125 in Q1 and 86 in Q2
  • 68 confirmed attacks – 45 in Q1 and 23 in Q2
  • 143 unconfirmed attacks – 80 in Q1 and 63 in Q2
  • 2,372,777 records are known to have been breached in the confirmed attacks
  • Average ransom demand of $479,000
  • The most prolific ransomware strains with the highest number of claims against healthcare companies were INC (34), Qilin (25), SafePay (14), RansomHub (13), and Medusa (13)
  • INC and Qilin had the most confirmed attacks (10 each), followed by Medusa (7), RansomHub (6), and SafePay (4)

The research can be viewed at this link: https://www.comparitech.com/news/healthcare-ransomware-roundup-h1-2025/

Guest Post: From beaches to breaches: Summer work habits put enterprise data at risk

Posted in Commentary with tags on July 17, 2025 by itnerd

As more companies embrace remote work and “workations” during the summer,  a cybersecurity expert warns that swapping the office for scenic views could put corporate data at serious risk

Businesses are adopting mixed work models, and summer is the perfect time to embrace greater workplace flexibility. However, when employees swap the office for a more relaxing setting, it can expose enterprises to additional cybersecurity risks — and, without proper measures, increase the likelihood of a data breach.

A survey by DayForce has found that 41% of employees feel they’re less productive in the summer, and 58% stated that their employer offers some type of flexibility during this time, including increased work-from-home or work-from-anywhere options. According to Andrius Buinovskis, a cybersecurity expert at NordLayer, a toggle-ready cybersecurity platform for business, while employees might appreciate the added benefits, enterprises mustn’t underestimate the risks behind such perks.

“Many companies offer mixed working models, such as remote or hybrid working. Work from anywhere or ‘workations’ allowing employees to work from abroad have also gained popularity,” says Buinovskis. “This additional flexibility is a great bonus for employees. However, businesses mustn’t offer it to employees without knowing the risks. Remote work opens the door for an array of security vulnerabilities, which, if exploited, can lead to devastating data breaches, resulting in reputational and financial loss.”

The main cybersecurity risks

Buinovskis explains that the most common threat from remote work comes from using unsecured public networks. Cybercriminals can intercept Wi-Fi to steal employee credentials, install malware, or hijack accounts.

“Employees that change their routines are more likely to reduce VPN usage due to distractions. Due to their unfamiliarity with the environment, they’re also an attractive target for scammers, and their lack of vigilance can make them more likely to fall for phishing scams in general,” says Buinovskis. “Additionally, employees may be asked to share more personal data in countries with fewer GDPR restrictions, increasing the risk of misuse. Another major concern is that if they use  personal devices, those devices lack centralized security, may run outdated software, and are more vulnerable to attacks.”

He emphasizes that personal devices offer less physical security than company-issued hardware since friends and family members can access them. While travelling, work devices are also at a greater risk, as they may be lost or stolen. If that happens, the information stored on these devices could be misused, and according to Buinovskis, just one compromised device or account is enough to trigger a significant data breach.

How to ensure cybersecurity while maintaining flexibility

Even though remote work models come with cybersecurity challenges, it doesn’t mean that businesses should abandon these perks altogether. According to Buinovskis, the main cybersecurity measures companies should implement to ensure that their data is protected include:

●       Strong network encryption. It secures data in transit, transforming it into an unreadable format and safeguarding it from potential attackers.

●       Password management policies. Hackers can easily target and compromise accounts protected by weak, reused, or easy-to-access passwords. Enforcing strict password management policies requiring unique, long, and complex passwords, and educating employees on how to store them securely minimizes the possibility of falling victim to cybercriminals.

●       Multi-factor authentication. Access controls, like multi-factor authentication, make it more difficult for cybercriminals to access accounts with stolen credentials, adding a layer of protection.

●       Zero trust architecture. The constant verification process of all devices and users trying to access the network significantly reduces the possibility of a hacker successfully infiltrating the business.

●       Network segmentation. If a bad actor does manage to infiltrate the network, ensuring it’s segmented helps to minimize the potential damage. Not granting all employees access to the whole network and limiting it to the parts essential for their work helps reduce the scope of the data an infiltrator can access.

“High observability into employee activity and centralized security are crucial for defending against remote work-related cyber threats, especially because personal devices and unauthorized applications greatly expand a company’s attack surface,” Buinovskis says. “Given the real risk of data breaches and the financial and reputational damage they could potentially cause, overlooking security gaps is a serious gamble that isn’t worth taking.”

Buinovskis also emphasizes that employees are often the weakest link in a company’s cybersecurity. Cybersecurity awareness training is essential to minimize the risk of data breaches — regardless of the work model. This training should cover how to recognize phishing scams, the risks of using public Wi-Fi, and effective password management practices.

ABOUT NORDLAYER

NordLayer offers reliable connection, protection, threat detection, and response for businesses needing strong network security. Built on NordVPN standards, NordLayer is a trusted cybersecurity platform that integrates easily with any network and technology stack, all with unmatched support. NordLayer is part of the cybersecurity powerhouse Nord Security. For more information: https://nordlayer.com/

Zoho Launches Zia LLM and Deepens AI Portfolio with Prebuilt Agents, Custom Agent Builder, MCP, and Marketplace

Posted in Commentary with tags on July 17, 2025 by itnerd

 Zoho Corporation today announced additional investments and offerings in AI, including Zia LLM, a proprietary large language model; Zia Agents, with 25+ ready-to-deploy AI-powered agents available in Agent MarketplaceZia Agent Studio, a no-code agent builder; and a model context protocol (MCP) server to open up Zoho’s vast library of actions to third-party agents. These capabilities and investments are designed to help organizations fully realize and maximize the value of contextual, assistive and agentic AI technology. Immediately impacting daily workflows for diverse roles and use cases, Zoho’s latest AI developments deliver operational and financial efficiencies across entire organizations.

Zia LLM, Built from the Ground Up and Optimized for Business

Zoho has successfully launched its own large language model, Zia LLM, built completely in-house by leveraging NVIDIA’s AI accelerated computing platform. Trained with Zoho product use cases in mind—ranging from structured data extraction, summarization, RAG, and code generation—Zia LLM is comprised of three models with 1.3 billion, 2.6 billion and 7 billion parameters, each separately trained and optimized for contextual applicability that benchmark competitively against comparable open source models in the market. The three models allow Zoho to always optimize the right model for the right user context, striking the proper balance between power and resource management. This focus on right-sizing the model is an ongoing development strategy for Zoho.  

In addition to Zia LLM, Zoho is announcing two proprietary Automatic Speech Recognition (ASR) models for speech-to-text conversion for both English and Hindi. Optimized to perform on a low computer load without compromising on accuracy, the models benchmark up to 75% better than comparable models across standard tests. Language support for additional languages will be coming in the future. 

While Zoho supports many LLM integrations for users, including ChatGPT, Llama, and DeepSeek, Zia LLM continues Zoho’s commitment to data privacy by allowing customers to keep their data on Zoho servers, leveraging the latest AI capabilities without sending their data to AI cloud providers.

Zia LLM will be deployed across Zoho’s data centers in the US, India, and Europe. The model is currently testing for internal use cases across Zoho’s broad app portfolio, and will be available for customer use in coming months. 

Effective Native AI Agents Ready for Use

To enable immediate adoption of agentic technology, Zoho has developed a roster of AI agents contextually baked right into its products. These agents can be used across various business activities, handling relevant actions based on real-life organizational roles (including sales development, customer support, and account management).

Agents available today include: 

  1. New Version of Ask Zia : The latest version of Zoho’s platform-wide conversational AI assistant, Ask Zia‘s new BI skills are tailored to data engineers, analysts, and data scientists, yet supports any user within an organization. Ask Zia is now equipped with capabilities that directly address the unique pain points faced by each persona, whether it’s building end-to-end data pipelines for engineers, analyzing data, creating reports and dashboards in an interactive conversation mode for analysts, or helping to jump start building ML models for data scientists.
  2. Customer Service Agent: With the ability to process incoming customer requests, understand the context behind them, and either answer them directly or triage them to a human rep, the Customer Service Agent for Zoho Deskprovides an efficient yet reliable first line of assistance, paving the way for quicker responses and resolutions.  

AI Agent Studio and Marketplace

First announced earlier in 2025, Zoho has further simplified the Zia Agent Studio experience to be fully prompt-based (with the option to use low-code) and include ready-made access to over 700 actions across Zoho’s products. Agents built by users can be deployed autonomously, triggered through button clicks or rule-based automation, or summoned within customer conversations.

At the time of deployment, an agent can also be provisioned as a digital employee. Digital Employees respect defined user access permissions, maintaining the same permissions structures already defined within the organization. Admins are able to perform behavioural audits as well as performance and impact analyses on Digital Employees, ensuring that every agent is working as effectively as possible and within clear guardrails.

Zoho Marketplace, which supplies over 2500 reliable extensions and integrations for Zoho users, now houses the Agent Marketplace, a dedicated section for AI agents that can be deployed by customers quickly. Ecosystem partners, ISVs, and individual developers will soon be able to create agents and host them on the Zia Agents Marketplace, further simplifying the adoption of agentic technology by organizations. 

Some pre-built agents created with Zia Agent Studio (and available on the Zia Agent Marketplace) are:

1. Revenue Growth Specialist: Uncovers opportunities for upsell and cross-sell across existing customers, recommending the best marketing approach for each customer.

2. Deal Analyzer: Analyze deals and provide insights such as win probability, next best action, and follow-up suggestions.

3. Candidate Screener: Intelligently identifies and ranks the most suitable candidates for a specific job opening based on role requirements, skills, experience, and other key attributes.

Zoho will continue to add more pre-built agents to the Agent Marketplace over time to cover several valuable core and utility use cases across various business functions. The full list of available agents can be found under Additional Documentation.

With over 55 applications across one ecosystem, users can build agents to meet their organization’s every need, no matter how specific. With Zia Agent Studio, Zoho users have access to the same tools as Zoho’s developers, ensuring that any agent a customer dreams of can be created with ease. 

Interoperability with MCP

Zoho has adopted the model context protocol (MCP), offering its own MCP server with a rich action library across several applications, allowing any MCP client to tap into data and actions from various Zoho apps while respecting the customer’s defined permission structures.

Zoho’s MCP server has a library of actions from more than 15 Zoho applications exposed during Early Access. With Zoho Flow, third-party tools are also exposed. Additional Zoho applications will be onboarded in the coming months. Furthermore,, Zoho Analytics now offers support for a local MCP server. 

Roadmap

In the short term, Zoho will regularly scale Zia LLM’s model sizes, starting with the first of several planned parameter increases by the end of 2025. Future planned releases include expanding the available languages used by the speech-to-text model, beginning with languages spoken primarily across Europe and India, as well as the introduction of a reasoning language model (RLM).

Additional skills will be added to Ask Zia, allowing it to act as an assistant to Finance teams and Customer Support teams, with more skills added in the future.

Support for the Agent2Agent (A2A) protocol will be implemented, allowing for Zia Agents to interact and collaborate with each other, as well as collaborate with agents on other platforms.

Additional Documentation
Zia Agents Marketplace – Full list of available agents at launch

Availability and Pricing

Zia LLM will be available to Zoho customers in the coming months. Zia Agents, Zia Agent Studio, Agent Marketplace, and Zoho MCP Server are being rolled out to customers who are currently on the early access waiting list. General availability for these offerings is expected towards the end of 2025. Zoho expects to study the usage patterns of these customers across use cases, industries, geographical regions, and sizes during this early access phase. A pricing structure for these offerings can be expected at the time of general availability.  

Saviynt Announces Availability of Saviynt MCP Server in the New AWS Marketplace AI Agents and Tools Category

Posted in Commentary with tags on July 16, 2025 by itnerd

Saviynt, a leading provider of identity security solutions, today announced the availability of Saviynt MCP Server in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily discover, buy, and deploy AI agents solutions, including Saviynt MCP Server using their AWS accounts, accelerating AI agent and agentic workflow development.

Saviynt MCP Server helps organizations extend the capabilities of Saviynt Identity Cloud by empowering customers to turn natural language prompts into precise identity actions—such as retrieving and analyzing access patterns, evaluating cross-application access, and initiating governance workflows including access approvals and revocations.

Saviynt MCP Server delivers essential capabilities including unified identity visibility that instantly visualizes access across cloud, hybrid and on-premises environments. With context-rich governance powered by MCP-based queries, organizations can link access to policies, approvals, and usage. Its AI-ready integration streamlines automation and accelerates compliance through seamless workflow orchestration.

With the availability of AI Agents and Tools in AWS Marketplace, customers can significantly accelerate their procurement process to drive AI innovation, reducing the time needed for vendor evaluations and complex negotiations. With centralized purchasing using AWS accounts, customers maintain visibility and control over licensing, payments, and access through AWS.

Available as a SaaS solution, Saviynt MCP Server leverages Model Context Protocol (MCP) to power intelligent agent interactions—bringing full-spectrum access visibility and automated governance to the forefront of AI-powered enterprises.

To learn more about Saviynt MCP Server in AWS Marketplace, visit the website. To learn more about the new AI Agents and Tools category in AWS Marketplace, visit https://aws.amazon.com/marketplace/solutions/ai-agents-and-tools/.