Silverfort, the identity security company, and SentinelOne®, the AI Security leader, announced a strategic partnership to secure human, AI agent and other non-human identities (NHIs). This collaboration brings together best-in-class runtime security across identities, endpoints, cloud workloads and AI applications to protect against increasingly sophisticated identity attacks. As a result, organizations can confidently benefit from agentic innovation while ensuring they have autonomous defense in place to detect and respond to both human and agentic threats at machine speed.
As enterprises accelerate the adoption of AI-driven systems and agentic platforms, new forms of identity risk are also emerging. Modern enterprise environments are now populated by a diverse array of “workers,” including service accounts, APIs, workload identities, and increasingly autonomous AI agents. These agents are executing actions for humans and systems at machine speed and scale. In the past few weeks, high profile attacks have provided a preview into what lies ahead for modern defenders and the speed at which they will need to respond to agentic and identity-based threats in today’s automated enterprises.
On March 31, 2026, a North Korean state actor executed a sophisticated supply chain attack by hijacking the npm credentials of the primary Axios maintainer. In this attack, the first infection was observed 89 seconds after publication, a pace no manual workflow could possibly defend.
A week prior, SentinelOne caught and blocked a trojaned version of LiteLLM that had been updated by an autonomous coding assistant – identifying and preemptively killing a malicious process chain originating from Anthropic’s Claude Code running with unrestricted permissions. The malicious action was done without any human in the loop. Just a normal, automated workflow. In this case, SentinelOne’s behavioral AI caught the trojaned package mid-execution, preemptively killing it in under 44 seconds.
While these are examples of third-party software supply chain attacks, they each illustrate just how fast such trusted authentication tactics could be executed in modern, automated IT environments, and the speed at which security teams will need to respond.