Astrix Security logo

AI visibility report for Astrix Security

Vertical: Agent Authentication & Identity for AI

AI search visibility benchmark across 5 platforms in Agent Authentication & Identity for AI.

Track this brand
25 prompts
5 platforms
Updated May 20, 2026
2percent

Presence Rate

Low presence

Top-3 citations across 125 prompt × platform pairs

+0.67

Sentiment

-1.00.0+1.0
Very positive
#10of 13

Peer Ranking

#1#13
Below averagein Agent Authentication & Identity for AI

Key Metrics

Presence Rate2.4%
Share of Voice0.7%
Avg Position#14.3
Docs Presence0.0%
Blog Presence2.4%
Brand Mentions2.4%

Platform Breakdown

Grok
4%1/25 prompts
Perplexity
4%1/25 prompts
Google AI Mode
4%1/25 prompts
Gemini Search
0%0/25 prompts
ChatGPT
0%0/25 prompts

Overview

Astrix Security is an enterprise cybersecurity platform founded in 2021 that specializes in securing non-human identities (NHIs) and AI agents across cloud and SaaS environments. Co-founded by Israeli Unit 8200 veterans Alon Jackson (CEO) and Idan Gour (President), the company pioneered the NHI security category, providing discovery, governance, and threat detection for API keys, OAuth tokens, service accounts, webhooks, autonomous AI agents, and MCP servers. Its Discover–Secure–Deploy framework inventories all NHIs, detects and remediates excessive privileges or malicious access, and enables secure-by-design agent deployment via its Agent Control Plane (ACP). Customers include Workday, Figma, NetApp, HubSpot, Mercury, Boomi, and Priceline. Backed by $85M from Menlo Ventures, Bessemer Venture Partners, CRV, and Workday Ventures, the company is recognized by Gartner as a Cool Vendor and Market Guide Representative Vendor.

Astrix Security is a purpose-built platform for AI agent and non-human identity (NHI) security. It provides automated discovery, governance, behavioral threat detection, and secure deployment capabilities for all machine identities—including API keys, OAuth tokens, service accounts, AI agents, and MCP servers—across enterprise cloud, SaaS, and IaaS environments. Its Agent Control Plane (ACP) allows organizations to provision agents with short-lived credentials and precisely scoped access from day one.

Key Facts

Founded
2021
HQ
Boston, MA, USA (R&D center in Tel Aviv, Israel)
Founders
Alon Jackson, Idan Gour
Employees
80-130
Funding
$85M
Valuation
~$200M last private; $250–$350M reported
Status
Private (Cisco acquisition talks reported April 2025, unconf

Target users

Enterprise IAM and identity security teamsCloud security and DevSecOps teamsCISOs and security leadership at Fortune 500 companiesGRC and third-party risk management teamsPlatform engineering and DevOps teams managing service accounts and machine credentials

Key Capabilities9

  • Automated discovery of AI agents, MCP servers, and NHIs (including shadow and unregistered agents)
  • Real-time NHI inventory across SaaS, IaaS, and PaaS environments with risk context
  • Behavioral anomaly detection for compromised credentials and suspicious NHI activity
  • Automated remediation of over-privileged, stale, or malicious NHI connections
  • Agent Control Plane (ACP): just-in-time, least-privilege provisioning for secure-by-design AI agent deployment
  • NHI lifecycle management from provisioning to decommissioning
  • Centralized secret management across vaults and cloud environments
  • Third-party app risk assessment and access governance
  • Non-human Identity Threat Detection and Response (ITDR) with real-time alerting

Key Use Cases7

  • Securing AI agent deployments with least-privilege, just-in-time access controls
  • Discovering and governing shadow AI agents and MCP servers across the enterprise
  • Preventing supply chain attacks via over-privileged third-party app integrations
  • Remediating exposed API keys, OAuth tokens, and service accounts
  • Rapid incident response to third-party breaches affecting NHI credentials
  • Extending IAM programs to cover machine and AI agent identities
  • Meeting compliance and audit requirements for non-human identity governance

Astrix Security customer outcomes

Mercury

30 minutes vs. estimated days without Astrix

During a third-party Dropbox Sign breach, Mercury used Astrix to identify and remediate all affected OAuth connections across 900+ NHIs, turning a multi-day manual investigation into a straightforward process.

Boomi

Boomi used Astrix to rapidly assess the impact of a Snowflake security event, confirming no indicators of compromise and initiating their incident response process immediately, compressing what could have taken hours or days.

Workato

Workato achieved a 360-degree view of its NHI attack surface through seamless onboarding with Astrix, gaining visibility it previously lacked.

Pagaya

Pagaya gained continuous visibility and governance over thousands of NHIs across both corporate and production environments, strengthening its overall identity security program.

Recent Trend

Visibility-3.2 pts
Avg positionNo trend yet
SentimentNo trend yet

How AI describes Astrix Security1

Astrix Security: Focuses on securing app-to-app integrations. Astrix provides visibility into the tokens, OAuth apps, and service accounts utilized by third-party integrations, LLM plugins, and autonomous bots, mitigating authorization risks when...

Which non-human identity platforms can govern AI agents alongside service accounts, API keys, and machine identities?

google-aiDirect Astrix Security mention

Alternatives in Agent Authentication & Identity for AI6

Astrix positions itself as the pioneer and category-creator of non-human identity (NHI) security, founded in 2021 before the market widely recognized the threat.

  • It differentiates from incumbents like Venafi by focusing on cloud, SaaS, and API-level NHIs—including AI agents and MCP servers—rather than low-level device or certificate management.
  • Its proprietary 'Discover–Secure–Deploy' framework and Agent Control Plane (ACP) are marketed as the first purpose-built solution for secure-by-design AI agent deployment.
  • Astrix claims first-mover advantage over newer entrants, leveraging a behavioral engine trained on real-world API traffic since 2022 and notable analyst recognition (Gartner Cool Vendor, Gartner Market Guide for Guardian Agents, RSA Innovation Sandbox Finalist 2023, Fortune Cyber 60).
View category comparison hub

Reviews

Praised

  • Real-time visibility into NHI and AI agent attack surface
  • Behavioral anomaly detection and real-time alerts
  • Fast time-to-value and quick deployment
  • AI agent security automation saves time
  • Agentless deployment reduces operational burden
  • Extends security responsibility across the whole organization

Criticized

  • Onboarding needs more training and hand-holding
  • Pricing perceived as high relative to benefit received
  • Contract negotiation friction reported

Public reviews are limited. Gartner Peer Insights shows a 4.0/5 rating from 4 verified reviews in the Workload Identity Management category. Reviewers highlight value in managing service account sprawl, AI-agent-driven automation, and real-time detection of leaked tokens and vulnerable Chrome extensions. Critical feedback centers on onboarding complexity, a need for more training support, and high pricing. G2 lists the product but no accessible aggregate score was found. TrustRadius and Capterra show no verified reviews.

Pricing

Subscription-based pricing, determined by organization size and selected feature modules. Specific pricing is not publicly disclosed and is available only via personalized quote upon request. At least one Gartner Peer Insights reviewer noted the price is 'a little high for the benefit we receive' and that contract negotiation was not straightforward.

Limitations

  • Public reviews are very sparse (only 4 verified Gartner Peer Insights reviews as of research date), making comprehensive user satisfaction assessment difficult.
  • Some reviewers cite pricing as high relative to perceived benefit and note that contract negotiation was challenging.
  • Onboarding is flagged as needing more training and hand-holding.
  • The platform is enterprise-focused and may be inaccessible for smaller organizations.
  • As a specialized NHI/AI-agent security tool, it requires complementary IAM and SIEM integrations for full enterprise security coverage.

Frequently asked questions

Topic Coverage

Capability1/5DevEx0/5Integrations &Ecosystem0/5Performance &Reliability0/5Setup & First Run1/5

Prompt-Level Results

Brand citedCompetitor citedNot cited
PromptGemini SearchChatGPTGrokPerplexityGoogle AI Mode
Capability1/5 cited (20%)

What tools let me enforce fine-grained, intent-based access policies for AI agents accessing enterprise systems?

Which non-human identity platforms can govern AI agents alongside service accounts, API keys, and machine identities?

Looking for an agent auth solution that supports agent-to-agent delegation and MCP server authentication — what should I evaluate?

What tools handle both human user auth and AI agent identity under a single platform with granular per-agent permissions?

Which platforms support ephemeral, task-scoped credentials for AI agents instead of static API keys?

Developer Experience0/5 cited (0%)

Which platforms offer the smoothest workflow for testing and debugging agent auth flows during development?

What tools do AI agent developers actually use day-to-day for handling user-delegated authentication across multiple integrations?

I'm an ML engineer building agents — which auth platforms let me focus on agent logic instead of wrestling with OAuth plumbing?

Which agent auth platforms have the best developer experience for managing OAuth tokens, refresh flows, and scoped permissions?

What agent identity tools have the best docs and SDKs for a small team building their first production AI agent?

Integrations & Ecosystem0/5 cited (0%)

What tools integrate natively with MCP and the major AI agent frameworks for handling auth in agentic workflows?

Looking for agent identity infrastructure that plugs into our existing identity provider — which platforms support federation?

Which agent auth platforms have the widest coverage of pre-built OAuth connectors for popular SaaS APIs?

Which platforms let AI agents securely access both cloud SaaS tools and on-prem internal systems through one auth layer?

I'm evaluating agent auth tools for a multi-cloud setup — which ones support cross-environment policy enforcement and audit trails?

Performance & Reliability0/5 cited (0%)

What are the most battle-tested platforms for securing AI agents in regulated industries like fintech or healthcare?

I need agent auth that works at the edge with sub-100ms enforcement — which platforms support distributed authorization?

What auth infrastructure holds up when thousands of AI agents are making concurrent authenticated API calls?

Which agent auth platforms add the least latency overhead to tool calls when agents need to authenticate in real time?

Which platforms handle automatic token refresh and rotation reliably enough for production AI agent workloads?

Setup & First Run1/5 cited (20%)

What tools let me add delegated auth to AI agents without requiring each end user to re-authenticate for every tool call?

What's the quickest way to add OAuth authentication to AI agents that need to access third-party APIs on behalf of users?

Looking for a drop-in SDK to handle agent-to-API authentication in a TypeScript codebase — what are my options?

I'm building an AI agent that needs to connect to a dozen SaaS tools securely — what auth infrastructure should I start with?

Which platforms make it easiest to set up secure auth for MCP servers without building custom OAuth flows from scratch?

Strengths

No clear strengths identified yet.

Gaps5

  • I'm an ML engineer building agents — which auth platforms let me focus on agent logic instead of wrestling with OAuth plumbing?

    Competitors on 5 platforms

  • What's the quickest way to add OAuth authentication to AI agents that need to access third-party APIs on behalf of users?

    Competitors on 4 platforms

  • Which agent auth platforms have the best developer experience for managing OAuth tokens, refresh flows, and scoped permissions?

    Competitors on 4 platforms

  • What tools let me add delegated auth to AI agents without requiring each end user to re-authenticate for every tool call?

    Competitors on 3 platforms

  • What tools integrate natively with MCP and the major AI agent frameworks for handling auth in agentic workflows?

    Competitors on 3 platforms

Vertical Ranking

#BrandPres.SoVDocsBlogMent.PosSentiment
1Auth0 (Okta)36.8%21.9%4.8%17.6%29.6%#15.8+0.40
2WorkOS33.6%16.2%0.8%33.6%29.6%#14.7+0.36
3Composio30.4%21.7%1.6%2.4%26.4%#24.2+0.44
4Nango29.6%13.6%0.0%29.6%26.4%#15.1+0.41
5Merge22.4%8.1%0.8%21.6%20.8%#14.4+0.36
6Stytch20.8%9.5%3.2%18.4%19.2%#13.8+0.36
7Arcade.dev10.4%5.0%0.8%9.6%10.4%#31.7+0.38
8Descope7.2%2.1%0.0%4.0%7.2%#17.3+0.39
9Oasis Security2.4%1.0%0.0%0.0%2.4%#11.5+0.67
10Astrix Security2.4%0.7%0.0%2.4%2.4%#14.3+0.67
11Better Auth0.8%0.2%0.8%0.0%0.8%#29.0+0.80
12Keycard.ai0.0%0.0%0.0%0.0%0.0%
13Operant AI0.0%0.0%0.0%0.0%0.0%

Turn this into your team dashboard

Sign up to unlock project-level analytics, daily tracking, actionable insights, custom prompt configurations, adoption tracking, AI traffic analytics and more.

Get started free