Meet Insights Agent — your AI teammate for faster, smarter breach response.

AI Is Scaling Without Boundaries. Zero Trust Is How You Rebuild Them.

Trupti Shiralkar
Director, Product Security

AI has quietly diminished enterprise boundaries before most security teams have had time to absorbe what’s changing.

What once felt like a defined perimeter now shifts constantly as we adopt new models, copilots, and integrations  in the name of speed and productivity.

Security teams aren’t pushing back on this change. They’re simply trying to keep pace with it.

The problem: innovation is happening faster than teams can design guardrails for it. Systems move into production before “secure by default” practices are fully in place.  

Over time, this lag creates a form of invisible security debt across identities, data access, and automated decisions.

The goal isn’t to slow innovation but to restore our trust in an environment where trust has been been given too freely. Zero Trust offers a way to do that. It reestablishes clear boundaries and enforces them continuously, even as the environment evolves.

Back to basics: the fundamental principle of Zero Trust

Security leaders may define and apply Zero Trust in a myriad of ways, but the core principle remains the same: trust must be earned through verification.

In otherswords, treat every entity with the same level of scrutiny. This includes human users and non-human identities such as service accounts, automated workflows, and AI agents.

If an identity can access resources or take action, it should have the least-privilege access it needs to do its job. That access should be limited, clearly defined, and easy to audit.

And trust isn’t granted once when the entity logs in. It’s continuously reassessed. Every interaction should validate identity, intent, and privilege before granting access. This is especially critical in AI-powered systems, where automated decisions and scaled actions can quickly amplify small gaps in trust.

In practice, this means starting with minimal access and expanding only when behavior, role, and context justify it. Trust is built over time and never assumed.

A reality check: complexity and cyber economics  

Enterprise AI has introduced a level of complexity that traditional security programs weren’t designed to handle.  

Organizations are quickly adding third-party software, APIs, and AI services across hybrid multi-cloud environments. In many cases, there’s limited visibility into how these systems operate, what assumptions they make, or how they handle data.  

Risk no longer comes from a single weak point. Any identity, system, or automated process can become a point of failure without proper controls.  

This is why continuous verification is no longer optional. One-time authentication doesn’t reflect how modern systems behave. Identity, device posture, behavior, and context need to be assessed throughout a session, not just at the start.  

AI systems act continuously. Security controls need to do the same.  

At the same time, security decisions are shaped by real-world constraints. In high-performance environments, latency matters. In healthcare or critical infrastructure, stability can take priority over constant change.  

These are strategic risk management decisions, not compromises.  

This is where cyber economics becomes critical. Absolute security isn’t achievable, and Zero Trust is not a one-size-fits-all model. Teams have to design controls that align with their mission, their risk tolerance, and their resources.

Building a Zero Trust strategy: structure, signals, and feedback

A resilient environment can’t rely on perimeter controls alone. Trust boundaries need to be rebuilt inside the environment.

Segmentation provides the foundation. By breaking networks into smaller, controlled zones, teams can limit how far an attacker can move if a breach occurs. This reduces blast radius and slows lateral movement.

Segmentation isn’t just about containment. It introduces structure into environments that have become much more dynamic with AI-driven workloads.

The next critical security control is detection and response. Access decisions should be informed by a combination of signals, including identity, location, device posture, behavior, vulnerabilities, and data sensitivity.

This shifts security from static enforcement to real-time risk evaluation. In AI-driven systems, where actions are automated and continuous, that shift is essential.

Visibility underpins both.

Without a clear understanding of what exists, how systems are connected, and how they behave, security teams are forced into reactive decisions. Visibility provides the context needed to make informed trust decisions before risk scales.

Zero Trust as an adaptive system

Zero Trust is best understood as an adaptive defense strategy, not a set of tools.

Segmentation, cloud detection and response, and visibility work best when they’re used together. Clear, high-fidelity signals help enforce trust boundaries with segmentation, which limits the impact of security events and breaches.

Over time, this creates a continuous feedback loop.

That loop helps teamrun in modern environments. It doesn’t remove all risk, but it makes risk easier to manage.

A Zero Trust approach helps systems handle disruption, adapt to change, and recover with confidence.

AI won't slow down. Zero Trust makes sure your security doesn't have to.

Zero Trust Resources

GUIDE

Zero Trust Segmentation for Dummies

Breaches are inevitable, but the damage isn’t. Zero Trust Segmentation for Dummies simplifies how to stop threats from spreading, protecting your organization before they cause harm.

Read now
REPORT

The Containment Gap

Most security teams trust their detection. They shouldn't. New research from a global survey of 700 IT and cybersecurity leaders reveals a massive gap between spotting threats and stopping them — with only 17% able to isolate a compromised asset in near real time.

Read now
REPORT

2025 Global Cloud Detection and Response Report

Discover how 1,150 global cybersecurity leaders are tackling alert fatigue, blind spots, and lateral movement in the hybrid multi-cloud.

Read now

Ready to learn more about breach containment?