Cyata
Control plane for agentic identities — discover, govern, and control AI agents.
What it does
The control plane for agentic identities. Discovers, governs, and controls AI agents across enterprise environments by scanning endpoints and SaaS for shadow agents. Acquired by Check Point in February 2026. Founded by Unit 8200 alumni from Cellebrite and Check Point.
Security relevance
Addresses the critical non-human identity (NHI) gap for AI agents. Traditional IAM/PAM tools can't handle ephemeral, autonomous agents that spawn instantly and disappear before detection. Cyata provides forensic observability that captures agent intent in real-time, requiring agents to justify their reasoning.
When to use it
Deploy when AI agents are proliferating across your organisation — even if you think they aren't. Cyata has found cases where organisations had no idea Copilot or Cursor was running in full impersonation mode. Enterprise deployment integrating with identity providers and endpoint infrastructure.
OWASP coverage
Risks addressed — mapped to both OWASP Top 10 standards. 2 in LLM, 2 in Agentic.
The raw record
What Yuntona stores. Single source of truth — fork it on GitHub.
name: Cyata slug: cyata type: Mixed category: Identity & AppSec url: https://cyata.ai reviewed: 2026-04 added: 2026-04 updated: 2026-04 risks: llm: [LLM07, LLM08] asi: [ASI03, ASI07] complexity: Enterprise Only pricing: — audience: Blue Team lifecycle: [govern] tags: [Agentic, Identity, NHI, Shadow AI]