~ / directory / cyata
CY
Mixed · Identity & AppSec · reviewed 2026-04

Cyata

Control plane for agentic identities — discover, govern, and control AI agents.

Visit cyata.ai
01

What it does

The control plane for agentic identities. Discovers, governs, and controls AI agents across enterprise environments by scanning endpoints and SaaS for shadow agents. Acquired by Check Point in February 2026. Founded by Unit 8200 alumni from Cellebrite and Check Point.

02

Security relevance

Addresses the critical non-human identity (NHI) gap for AI agents. Traditional IAM/PAM tools can't handle ephemeral, autonomous agents that spawn instantly and disappear before detection. Cyata provides forensic observability that captures agent intent in real-time, requiring agents to justify their reasoning.

03

When to use it

Deploy when AI agents are proliferating across your organisation — even if you think they aren't. Cyata has found cases where organisations had no idea Copilot or Cursor was running in full impersonation mode. Enterprise deployment integrating with identity providers and endpoint infrastructure.

04

OWASP coverage

Risks addressed — mapped to both OWASP Top 10 standards. 2 in LLM, 2 in Agentic.

LLM Top 10 · 2025 · 2/10 covered
01
02
03
04
05
06
07
08
09
10
Agentic Top 10 · 2026 · 2/10 covered
01
02
03
04
05
06
07
08
09
10
05

The raw record

What Yuntona stores. Single source of truth — fork it on GitHub.

name: Cyata
slug: cyata
type: Mixed
category: Identity & AppSec
url: https://cyata.ai

reviewed:   2026-04
added:      2026-04
updated:    2026-04

risks:
  llm:  [LLM07, LLM08]
  asi:  [ASI03, ASI07]

complexity:    Enterprise Only
pricing:       —
audience:      Blue Team
lifecycle:     [govern]

tags: [Agentic, Identity, NHI, Shadow AI]