{"id":12831,"date":"2026-03-18T02:41:51","date_gmt":"2026-03-18T02:41:51","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12831"},"modified":"2026-03-18T02:41:51","modified_gmt":"2026-03-18T02:41:51","slug":"orchid-safety-named-gartner-consultant-vendor","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12831","title":{"rendered":"Orchid Safety Named Gartner Consultant Vendor"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>New York, United States, March seventeenth, 2026, CyberNewswire<\/strong><\/p>\n<p><strong>Unleash AI adoption securely: uncover, attribute, and govern AI brokers all through the enterprise<\/strong><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.orchid.security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Orchid Safety<\/a>, the corporate bringing readability and management to the complexity of enterprise identification, right now introduced it has been acknowledged as a Consultant Vendor in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/info.orchid.security\/2026-market-guide-for-guardian-agents\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gartner\u2019s Market Information for Guardian Brokers<\/a>, as a vendor \u201cmanaging the identities\/entry for AI brokers with zero-trust insurance policies and governance.\u201d<\/p>\n<p>On this inaugural market information, Gartner asserts that:<\/p>\n<p>\u201cAI brokers introduce new dangers that outpace human evaluate, but most enterprises are unprepared to handle them because of fragmented organizational buildings and ongoing challenges with discovery.\u201d<\/p>\n<p>Orchid Safety concurs with this evaluation. The corporate finds that the rising use of AI brokers exponentially expands the quantity of <strong>identification darkish matter<\/strong>\u2014the invisible and unmanaged layer of identification\u2014inside organizations. <\/p>\n<p>AI brokers may exploit the darkish matter that already exists with a purpose to obtain their prompted functions as effectively as doable by design.<\/p>\n<p>\u201cFor all of the thrilling enterprise transformation promise of agentic AI, its rising adoption poses very actual cyber, compliance and operational dangers to be managed,\u201d mentioned Roy Katmor, co-founder and CEO of Orchid Safety.<\/p>\n<p>In reviewing Gartner\u2019s analysis, Orchid notes a number of key necessities for correctly managing AI brokers which are shaping the guardian agent market:<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-human-operator-attribution\"><strong>Human Operator Attribution<\/strong><\/h3>\n<p>Though AI brokers are assumed to behave on behalf of people, they&#8217;ve their very own identities impartial of customers. Organizations should establish all brokers and map their exercise to the related human proprietor for accountability, compliance, and governance.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-activity-audit\"><strong>Exercise Audit<\/strong><\/h3>\n<p>Organizations should see, log, monitor, and report on agent exercise and output to make sure accountability, reveal compliance, and allow incident response within the occasion of unauthorized modifications or incidents.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-posture-management\"><strong>Posture Administration<\/strong><\/h3>\n<p>Safe use of every AI agent requires correct identification and entry administration hygiene, together with centrally managed identities, robust authentication, time- and purpose-bound entry, and least-privilege authorization.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-runtime-inspection-and-enforcement\"><strong>Runtime Inspection and Enforcement<\/strong><\/h3>\n<p>Agentic actions and outputs should stay aligned with intentions, objectives, and governance insurance policies to take care of acceptable use.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-orchid-s-principles-for-secure-ai-agent-adoption\"><strong>Orchid\u2019s Rules for Safe AI Agent Adoption<\/strong><\/h3>\n<p>Orchid believes these necessities align carefully with its view of safe AI-agent adoption inside complete identification and entry administration, guided by 5 core rules:<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-human-to-agent-attribution\"><strong>Human-to-Agent Attribution<\/strong><\/h3>\n<p>Determine and classify each AI agent\u2014whether or not embedded in self-hosted functions, delivered by way of SaaS platforms, or working via third-party options\u2014and explicitly correlate it to a accountable human proprietor (and, the place related, a system\/service proprietor). <\/p>\n<p>This ensures organizations know precisely who triggered an agent run, who authorised the device use, and who&#8217;s finally chargeable for the end result.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-comprehensive-activity-audit\"><strong>Complete Exercise Audit<\/strong><\/h3>\n<p>For each agentic entity, seize the total operational context: the agent identification, assigned position, intent behind the motion, approvals, and the entire chain of custody from Agent \u2192 Instrument\/API \u2192 Motion \u2192 Goal. <\/p>\n<p>This allows accountability, compliance reporting, and speedy incident response.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-dynamic-context-aware-guardrails\"><strong>Dynamic, Context-Conscious Guardrails<\/strong><\/h3>\n<p>Guarantee each AI agent\u2019s entry is repeatedly evaluated and enforced based mostly on real-time context, human proprietor entitlements, atmosphere, time, goal, sensitivity of the goal, and danger alerts\u2014avoiding broad, standing privileges no matter how the agent is applied or built-in.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-least-privilege\"><strong>Least Privilege<\/strong><\/h3>\n<p>Require correctly scoped permissions and Simply-in-Time (JIT) elevation for agent actions, changing persistent \u201cgod-mode\u201d entry with purpose-bound, time-bound authorization aligned to the minimal required entry.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-remediation-responses\"><strong>Remediation Responses<\/strong><\/h3>\n<p>Detect unauthorized or dangerous agent exercise\u2014corresponding to makes an attempt to bypass controls, use static secrets and techniques, exceed meant scope, or entry delicate targets\u2014and orchestrate remediation by blocking the motion, stepping up approval, implementing re-authentication, or rotating credentials by way of Vault\/PAM integrations.<\/p>\n<p>\u201cAI brokers is not going to be adopted safely on prime of yesterday\u2019s identification stack,\u201d Katmor summarized.<\/p>\n<p>\u201cOrchid delivers the identification infrastructure for each identification, human and non-human\u2014together with agentic AI\u2014with attribution, audit, and least-privilege guardrails inbuilt. That\u2019s how enterprises unlock the total energy of AI with out increasing their assault floor or compromising compliance.\u201d<\/p>\n<p>Enterprise leaders chargeable for cybersecurity, identification and entry administration, and AI agent governance <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/info.orchid.security\/2026-market-guide-for-guardian-agents\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">register for choose entry<\/a> to the Gartner Market Information for Guardian Brokers, compliments of Orchid Safety.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-additional-resources\"><strong>Further Assets<\/strong><\/h3>\n<h3 class=\"wp-block-heading\" id=\"h-gartner-disclaimer\"><strong>Gartner Disclaimer<\/strong><\/h3>\n<p>Gartner doesn&#8217;t endorse any firm, vendor, services or products depicted in its publications, and doesn&#8217;t advise know-how customers to pick solely these distributors with the best rankings or different designation. <\/p>\n<p>Gartner publications encompass the opinions of Gartner\u2019s enterprise and know-how insights group and shouldn&#8217;t be construed as statements of truth. <\/p>\n<p>Gartner disclaims all warranties, expressed or implied, with respect to this publication, together with any warranties of merchantability or health for a specific goal.<\/p>\n<p><strong>GARTNER is a trademark of Gartner, Inc. and its associates.<\/strong><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-about-orchid-security\"><strong>About Orchid Safety<\/strong><\/h2>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.orchid.security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Orchid Safety<\/a> sees straight into utility binaries to ship the business\u2019s first Identification Management Aircraft, reworking IAM complexity into readability, compliance, and management. <\/p>\n<p>Its Identification-First Safety Orchestration platform repeatedly discovers enterprise functions, analyzes their native authentication and authorization flows, and accelerates onboarding into governance programs\u2014reducing months of guide work right into a single click on. <\/p>\n<p>The platform additionally observes all identification exercise\u2014managed and unmanaged\u2014on the utility degree, offering a full audit of use and figuring out orphan, dormant, native, and over-permissioned accounts. <\/p>\n<p>By exposing and remediating the \u201cidentification darkish matter\u201d hidden throughout trendy environments, Orchid helps enterprises scale back danger, decrease operational prices, and obtain compliance at scale.<\/p>\n<p>Backed by Intel Capital and Team8, Orchid leverages observability, automation, and huge language fashions to unify fragmented identification operations. <\/p>\n<p>World organizations depend on Orchid to modernize identification governance, speed up IGA adoption, and safe the subsequent era of functions and AI brokers.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-contact\"><strong>Contact<\/strong><\/h3>\n<p><strong>Chloe Amante<\/strong><\/p>\n<p><strong>Montner Tech PR<\/strong><\/p>\n<p><strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"ff9c9e929e918b9abf9290918b919a8dd19c9092\">[email\u00a0protected]<\/a><\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>New York, United States, March seventeenth, 2026, CyberNewswire Unleash AI adoption securely: uncover, attribute, and govern AI brokers all through the enterprise Orchid Safety, the corporate bringing readability and management to the complexity of enterprise identification, right now introduced it has been acknowledged as a Consultant Vendor in Gartner\u2019s Market Information for Guardian Brokers, as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2953,3023,8271,5284,211,6272],"class_list":["post-12831","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-gartner","tag-named","tag-orchid","tag-representative","tag-security","tag-vendor"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12831"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12831\/revisions"}],"predecessor-version":[{"id":12832,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12831\/revisions\/12832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12833"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-04 13:50:49 UTC -->