Introduction: The Identity Governance Bottleneck
AI agents are transforming hospital records and factory inspections, but enterprise identity and access management (IAM) was never designed for them. Cisco President Jeetu Patel revealed at RSAC 2026 that 85% of enterprises run agent pilots, yet only 5% have reached production. The 80-point gap is not about model capability or compute—it is about trust. Without proper identity governance, agents cannot be scoped, monitored, or revoked at machine speed. This structural failure is the hidden barrier to agentic AI at scale.
According to IANS Research, most businesses lack role-based access control mature enough for human identities, let alone autonomous agents. The 2026 IBM X-Force Threat Intelligence Index reports a 44% surge in attacks exploiting public-facing applications, driven by missing authentication controls. The message is clear: deploy agents without identity governance, and you invite a breach.
For executives, this is a bottom-line issue. Every stalled pilot represents lost productivity gains. Every ungoverned agent is a liability. The organizations that solve identity first will dominate their industries; those that delay will watch competitors accelerate.
Why the Trust Gap Is Architectural
Michael Dickman, Cisco’s SVP of Campus Networking, argues that the problem is not just tooling—it is architectural. Traditional IAM systems treat identities as human-centric, with static roles and permissions. Agents, however, operate dynamically, executing tasks across systems at machine speed. They generate non-human identities that most enterprises cannot inventory, scope, or revoke.
Dickman emphasizes that the network sees what endpoints miss: actual system-to-system communications. “It’s that difference of knowing versus guessing,” he says. Network telemetry provides raw behavioral data that enables cross-domain correlation. Without it, organizations have no reliable way to enforce agent policy. This is why agentic AI breaks the pattern of prior technology transitions where security was bolted on after productivity gains.
The blast radius of a compromised agent identity is enormous. When agents autonomously update patient records, adjust network configurations, or process financial transactions, a single breach can cascade across systems. Dickman breaks the trust problem into four conditions: secure delegation, cultural readiness, token economics, and human judgment. Each must be addressed before production deployment.
Winners and Losers
Winners: Cybersecurity vendors that develop IAM solutions for AI agents will capture a new market segment. Cisco, with its network-layer enforcement framework, is positioned to lead. AI agent developers will benefit from improved security frameworks enabling broader adoption. Cloud providers offering integrated identity governance for agents will gain enterprise trust.
Losers: Traditional IAM providers that fail to adapt to non-human identities risk obsolescence. Healthcare and manufacturing sectors face immediate security risks and compliance challenges. Enterprises that delay governance investments will suffer from permission sprawl and increased breach exposure.
Second-Order Effects
The identity governance gap will trigger a wave of regulatory scrutiny. Expect governments to mandate agent identity management in critical infrastructure sectors. Insurance premiums for cyber liability will rise for organizations without agent-specific IAM. A new role—Agent Identity Officer—may emerge in enterprise C-suites.
On the technology side, network-layer enforcement will become a standard requirement. Microsegmentation, once a niche security practice, will be essential for containing agent blast radii. Hybrid architectures that combine agentic AI with deterministic tools will dominate, as they offer the intelligence of foundation models with predictable execution.
The market for agent IAM will bifurcate into human-centric and machine-centric solutions. Startups that focus on agent identity lifecycle management—onboarding, monitoring, offboarding—will attract venture funding. Incumbents like Okta and Microsoft will need to pivot or acquire.
Market and Industry Impact
The IAM market, currently valued at $15 billion, will grow by 20% annually as agent identity becomes a standard requirement. Network security spending will increase as enterprises invest in telemetry and microsegmentation. The healthcare and manufacturing sectors will lead adoption, driven by high-value use cases and regulatory pressure.
However, the biggest impact will be on AI adoption itself. The 80-point gap between pilots and production will narrow only as identity governance matures. Enterprises that prioritize trust infrastructure will deploy agents at a pace competitors cannot match. Those that treat security as an afterthought will remain stuck in pilot purgatory.
Executive Action
- Audit every agent identity in production. Assign a human owner and define permitted actions before expanding scope.
- Implement microsegmentation for agent-accessible systems. Start with highest-sensitivity data like PHI and financial records.
- Establish a formal policy-to-enforcement pipeline. Translate business intent into machine-speed network rules.
Why This Matters
The identity governance gap is the single biggest barrier to agentic AI at scale. Every day you delay, competitors build trust infrastructure that lets them deploy agents faster and safer. The window to act is closing—regulators are watching, and breaches will happen. Theoretical trust does not ship.
Final Take
Agentic AI will not scale on model improvements alone. Identity governance is the bottleneck, and the organizations that solve it first will own the future. Cisco’s framework—identity governance, cross-domain visibility, policy enforcement—is the blueprint. Ignore it at your peril.
Rate the Intelligence Signal
Intelligence FAQ
IAM systems were built for human identities with static roles. Agents operate dynamically at machine speed, generating non-human identities that cannot be inventoried, scoped, or revoked effectively.
A compromised agent can laterally move across systems, accessing sensitive data like patient records or financial transactions, with a blast radius far larger than a human breach.
Implement agent-specific IAM with human accountability, microsegmentation for blast radius containment, and a unified data fabric for cross-domain visibility.




