Saviynt, the leader in AI-powered identity security solutions, today unveiled groundbreaking advancements to its platform that redefine how enterprises manage and secure identities in the AI era. These new enhancements address two of the most pressing challenges facing enterprises today: the inability to onboard and govern all applications; and the lack of secure management for all identities – human and non-human, including AI agents.
Saviynt’s new AI-driven capabilities address these long standing challenges by accelerating and simplifying application onboarding, enabling all apps to be managed from a single, unified identity security platform, and extending Identity Security Posture Management (ISPM) to include every identity – human, non-human and AI agent – to help organizations strengthen their overall security posture.
Onboard All Applications with Agentic AI
Comprehensive application onboarding has long been one of the biggest roadblocks to realizing the full value of an identity security program. In fact, a Ponemon study found that 49% of organizations don’t even track how many disconnected apps they have – creating dangerous visibility gaps and expanding the attack surface.
Saviynt’s new Agentic AI Onboarding for Applications solves this challenge by harnessing agentic AI to accelerate and simplify the integration of both connected and disconnected applications across hybrid environments. The result is that every application – no matter where it resides – can now be seamlessly onboarded, governed, and secured under a single identity platform.
Secure All Identities — Human, Non-Human, and AI
As artificial intelligence transforms how enterprises operate, identity ecosystems are expanding at an unprecedented pace. Non-human identities and AI agents now outnumber human identities by more than 82 to 1, underscoring their explosive growth and the urgent need for stronger governance and control.
While AI agents are fueling major productivity gains, they also introduce a new class of identities that widens the attack surface. Most organizations lack the visibility and oversight to manage them effectively, leaving hidden risks across critical systems.
Saviynt is addressing this challenge head-on by extending its Identity Security Posture Management (ISPM) capabilities to cover all identities – human, non-human, and AI. These enhancements empower enterprises to confidently adopt AI while maintaining full visibility, governance, and compliance.
New capabilities include:
- Identity Security Posture Management (ISPM) for AI Agents: Provides comprehensive visibility, governance, and audit readiness for AI agents and their core components – such as MCP servers and tools – through simplified discovery, prioritized risk insights, and integrated access maps enriched with signals from leading security solutions like CrowdStrike.
- ISPM for Non-Human Identities (NHI): Enhanced NHI capabilities now include a unified inventory for all NHIs, their access policies, and detected violations, with support for one-click remediation.
Built for an AI-Driven Future
Together, these AI-driven capabilities enable unified identity security across all environments, simplifying application onboarding and extending protection to every identity.
Saviynt’s AI-powered platform seamlessly integrates identity governance, application governance, privileged access management, and security posture management for all identities. With the addition of AI-native capabilities, organizations can proactively reduce risk, accelerate decision-making, and enhance operational agility.
By unifying human and non-human identity security under a single platform, Saviynt empowers enterprises to achieve true Zero Trust at scale and ensure continuous compliance in today’s AI-driven world.
For more information on Saviynt’s AI-powered identity security platform, read the new blog. Saviynt will also showcase these new capabilities during its 2025 UNLOCK Roadshow, taking place in six cities around the world over the next two months.
F5 Has Apparently Been Pwned By The Chinese
Posted in Commentary with tags Hacked on October 15, 2025 by itnerdF5 has disclosed that it was the target of a state-sponsored cyberattack, likely linked to Chinese threat actors, with attackers exfiltrating files that included BIG-IP source code and vulnerability information.
It’s unclear how long the hackers maintained access, but the company confirmed that they stole source code, vulnerability data, and some configuration and implementation details for a limited number of customers.
“Through this access, certain files were exfiltrated, some of which contained certain portions of the Company’s BIG-IP source code and information about undisclosed vulnerabilities that it was working on in BIG-IP,” the company states.
Despite this critical exposure of undisclosed flaws, F5 says there’s no evidence that the attackers leveraged the information in actual attacks, such as exploiting the undisclosed flaw against systems. The company also states that it has not seen evidence that the private information has been disclosed.
F5 claims that the threat actors’ access to the BIG-IP environment did not compromise its software supply chain or result in any suspicious code modifications.
This includes its platforms that contain customer data, such as its CRM, financial, support case management, or iHealth systems. Furthermore, other products and platforms managed by the company are not compromised, including NGINX, F5 Distributed Cloud Services, or Silverline systems’ source code.
Will Baxter, Field CISO, Team Cymru had this comment:
“This is another reminder that the modern attack surface extends deep into the software development lifecycle. Threat groups targeting source code repositories and build environments are seeking long-term intelligence value—understanding how security controls operate from the inside. Visibility into outbound connections, threat actor command-and-control infrastructure, and unusual data exfiltration patterns is key to identifying this activity early. Combining external threat intelligence with internal telemetry gives defenders the context needed to detect and contain these advanced intrusions.”
If I were a F5 customer, I’d be kind of nervous right now. Because there’s no telling what this threat actor can do with the data that they stole. Other than the fact that whatever they do with that data, it won’t be good for anyone.
UPDATE: Cybercrime expert and VP of Cyber Risk for HITRUST, Tom Kellermann offers up this comment:
“This is the first stage of a supply chain campaign designed to compromise trust in digital infrastructure. Rogue nation-state actors consistently show us how successful and well-resourced they are. Once adversaries gain access at the application layer, they’re not just stealing data but embedding themselves for command and control. F5 customers must immediately enhance detection and response at the application layer through ADR. Supply chain attacks have become the preferred tactic of modern cyber warfare. We need to start treating third-party risk as a national security issue.”
Leave a comment »