Most safety groups have extra information than they know what to do with. Alerts, dashboards, telemetry feeds—all of it pointing at issues that want consideration. The issue isn’t that they will’t see the dangers. It’s that seeing them and truly fixing them are two utterly various things.
Identified vulnerabilities sit unresolved for months. Orphaned accounts linger in identification techniques. Cloud assets get spun up and forgotten. Certificates expire on property no one remembers proudly owning. Safety groups largely learn about all of it. They only can’t transfer quick sufficient to do a lot about it.
I had an opportunity to speak with Yair Grindlinger, co-founder and CEO of Surf AI, about why that hole exists and what it takes to shut it. He made some extent that caught with me: “20 years in the past, you needed to take care of a slender set of property. At this time, you have got a number of clouds and folders and buckets and 1,000 completely different SaaS purposes. It’s just like the universe is increasing. What we used to do 20 years in the past doesn’t work in any respect now.”
And but a variety of enterprise safety applications are nonetheless constructed prefer it’s 20 years in the past—or at the very least, constructed round instruments that deal with fixing issues as a aspect impact of discovering them.
The Operational Drawback No one Talks About
While you take a look at the place safety applications truly get caught, it’s often not detection. It’s all the things that occurs after detection. Who owns this asset? What breaks if I alter it? Who has to approve this? Which crew does this ticket go to?
These questions sound easy. In a big enterprise, they’re something however. Unclear possession, cross-system dependencies, legacy infrastructure that no one absolutely understands anymore—all of that creates friction that slows remediation to a crawl. Identified issues pile up as a result of resolving them requires coordination that organizations simply aren’t set as much as do at scale.
AI is making the underlying publicity worse. Extra identities, extra permissions, extra non-human accounts working automated processes—and extra methods for attackers to seek out the gaps that haven’t been cleaned up. The riskiest exposures are sometimes the quiet ones: dormant accounts, over-privileged service credentials, misconfigured cloud settings. They not often set off a high-priority alert. They only sit there.
Massive enterprises can have tens of hundreds of tokens and repair identities unfold throughout techniques. Managing that manually—monitoring down possession, validating whether or not accounts are nonetheless lively, coordinating remediation throughout groups—isn’t reasonable. The publicity exists not as a result of anybody is negligent, however as a result of the dimensions of the issue outpaced what human processes can deal with.
What Really Has to Change
The piece that’s lacking in most environments is context—no more information about what’s unsuitable, however the connective tissue that tells you who’s accountable, what depends upon what, and what occurs in the event you contact one thing.
Proper now, a safety software will inform you an asset has an issue. It gained’t inform you who truly owns that asset, whether or not it’s nonetheless in use, what the downstream influence of adjusting it is perhaps, or who must log out earlier than something occurs. You need to go determine all of that out manually. By the point you do, you’ve already burned time that almost all groups don’t have.
Constructing that context layer requires pulling from a variety of sources without delay—identification techniques, cloud environments, HR information, ticketing techniques, and communication channels. And it has to remain present, as a result of possession modifications, individuals depart, and assets transfer round. A snapshot of an setting at a single time limit isn’t sufficient. You want a steady, evolving image.
Account possession is an effective instance of how arduous this will get. The final one who touched an asset isn’t essentially the proprietor. Probably the most frequent particular person isn’t essentially the proprietor, both. You need to cross-reference HR information, take a look at ticket historical past, and think about whether or not somebody is on depart or has modified roles. It’s a variety of sign to synthesize—and it’s precisely the sort of work that doesn’t scale with human analysts alone.
AI Brokers for Execution, Not Simply Detection
There’s been a variety of concentrate on utilizing AI for risk detection. Much less consideration has gone to the remediation aspect—the precise work of closing vulnerabilities, disabling accounts, implementing insurance policies, and maintaining the setting clear on an ongoing foundation.
The mannequin that is sensible right here is specialised brokers, every with a slender job. One collects details about an asset. One other updates the CMDB. One other contacts the account proprietor to substantiate whether or not one thing must be eliminated. One other escalates to a supervisor if wanted. Each has an outlined set of actions it will possibly take and no extra. Consistency comes from maintaining every agent’s scope small and well-defined slightly than constructing one agent that tries to do all the things.
The audit query comes up instantly with any sort of automated remediation. If you happen to’re working hundreds of actions, who’s checking them? The sensible reply is: you don’t overview all the things, however you audit all the things. The complete log is there. You may pattern, spot-check and intervene when one thing seems off. However requiring a human to overview each automated motion defeats the aim of automation within the first place.
That’s a mindset shift as a lot as a technical one. Grindlinger put it plainly: “You need to audit all the things, and also you need to pattern and become involved if essential, however you possibly can’t comply with each motion. So how do you keep consistency?” The reply is tight guardrails on what every agent can do, mixed with full transparency into what it did.
Distributors Are Beginning to Tackle This In another way
Distributors are beginning to take a brand new method to addressing this problem. For instance, Surf AI is constructed particularly across the hole between understanding danger and performing on it. Moderately than surfacing issues and producing tickets, the platform focuses on closing the loop—constructing a context graph that hyperlinks property, identities, possession, and dependencies throughout identification, cloud, safety, and enterprise techniques, then utilizing specialised AI brokers to coordinate and execute remediation workflows with human approvals and full audit logging in-built by default.
Early deployments have centered on identification hygiene: disabling dormant accounts, resolving duplicate identities, and implementing entry insurance policies at enterprise scale. The corporate, which simply emerged from stealth with a $57 million funding spherical led by Accel, with participation from present buyers Cyberstarts and Boldstart Ventures, says shoppers have recovered extra SaaS license spend, cleared hundreds of orphaned accounts, and automatic identification enforcement workflows that beforehand required guide coordination throughout a number of groups. Prospects Cushman & Wakefield and VetCor are among the many early adopters already working the platform in manufacturing.
Surf AI just isn’t alone in recognizing this hole. The broader shift taking place throughout the safety business is away from instruments that assist analysts handle work and towards platforms that do the work—with people setting coverage, reviewing exceptions, and dealing with escalations slightly than processing each remediation step manually.
The Query Price Asking
Organizations have lived with months-long remediation cycles on recognized exposures as a result of it was just too costly to do it in a different way. AI modifications that price equation. What wasn’t sensible to automate a few years in the past is sensible now.
The safety applications that work out the way to shut the loop between discovering issues and fixing them—constantly, at scale—are going to look very completely different from those nonetheless counting on analysts to manually chase down tickets. The path is obvious. The query is how lengthy it takes to get there.








