Cisco is reportedly negotiating to acquire Astrix, a move that signals a crucial shift in the cybersecurity landscape towards securing AI agents and other automated systems.
This potential deal, valued at over $250 million, is what's known as a 'tuck-in' acquisition. While the price is relatively small for a giant like Cisco, its strategic importance is significant. Astrix specializes in protecting 'Non-Human Identities' (NHIs)—think of the API keys, service accounts, and OAuth tokens that AI agents and cloud applications use to talk to each other. By acquiring Astrix, Cisco aims to plug a critical hole in its security portfolio, which it has been building aggressively through major purchases like Splunk and Isovalent.
So, why is this happening now? The timing is driven by a few key factors. First, at the recent RSA 2026 security conference, Cisco itself highlighted the need to discover and govern these exact types of AI agents, creating a perfect product slot for Astrix's technology. Second, the competitive pressure is immense. Google recently closed its massive $32 billion acquisition of Wiz, and Palo Alto Networks bought CyberArk for $25 billion, both moves aimed at dominating the cloud and identity security market. Cisco cannot afford to fall behind in this race.
Looking back further, the industry has been pushed in this direction by a series of high-profile security breaches. For months, attackers have been exploiting vulnerabilities in systems that use OAuth tokens, such as the incidents involving Salesforce and Snowflake customers. These attacks demonstrated that credentials for non-human systems are a major weak point. This has elevated the issue from a technical problem to a boardroom-level concern, creating strong market demand for solutions like those offered by Astrix.
Ultimately, Cisco's pursuit of Astrix is not an isolated event. It is a calculated response to clear market signals: the rise of the AI-driven workforce, escalating threats against automated systems, and a strategic land grab for the future of identity security by the industry's biggest players.
- Non-Human Identity (NHI): Digital identities for non-human entities like software applications, AI agents, or devices, which use credentials like API keys or tokens to access data and services.
- OAuth: An open standard for access delegation, commonly used to grant websites or applications access to information on other websites without giving them the passwords. It's the technology that powers 'Log in with Google' or 'Log in with Facebook' features.
- Tuck-in Acquisition: A type of acquisition where a large company buys a smaller one to integrate its products, technology, or talent into an existing business line, rather than operating it as a standalone entity.
