Threat Vector by Palo Alto Networks cover image

Attackers Have Agents. Do You?

Threat Vector by Palo Alto Networks

00:00

Agent identity and guardrails

Elad explains agents require identities, scoped permissions, and guardrails tied to the creating user's role.

Play episode from 32:05
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app