Join the event that the leaders of the institutions have been trusted for nearly two decades. VB Transform combines people who build AI’s strategy for real institutions. Learn more
AI’s infrastructure spending is expected to arrive 309 billion dollars By 2032, the winners will not be determined by those who have the best models; It will descend to those who control the infrastructure layer that makes Amnesty International operating on a large scale.
Security sellers make more aggressive moves. Palo Alto networksand Crowdstrike and Cisco Each report on AI’s security revenue grows from 70 to 80 % on an annual basis, while traditional infrastructure sales decreased. Style is clear: Security has become a control plane for the AI.
“The complexity of the burdens of artificial intelligence is the current infrastructure of the collapse point.”. “Institutions need new methods mainly to manage artificial intelligence on a large scale.”
Establish evidence. according to IDC73 % of institutions indicate insufficient infrastructure as its primary barrier to adopt artificial intelligence. Meanwhile, opponents collect weapons faster than companies that can spread defenses. Infrastructure wars began.
Agenticops appears as the basis of the new battle
Agenticops is not a single seller. It is a recognition on the level of industry that traditional information technology operations cannot manage artificial intelligence agents with the speed of the machine with human permissions. Cisco began the category in Cisco Live 2025but Microsoft’s Ai Orchestationand Google operations And startups like Weights and biases It is already preceded to own it. Battle lines are drawn.
Technical requirements are brutal. Institutions that publish 50,000 AI agents need an infrastructure that deals with access to data across the field, actual time and multi -difference cooperation. Traditional tools are broken in 5,000 agents. Mathematics does not work.
“For the first time, security has become a speedy adoption, instead of an obstacle,” Geto Patel, President of CISCO and CPO, told Venturebeat in a recent interview. Basic transformation: Security teams now allow the spread of artificial intelligence rather than preventing it.
The three columns are determined at the level of institutions: the unified access to data in all fields, the cooperative environments in which Netops and SECOPS are operating together and models designed for this purpose governing agent procedures. Forrester Research A multi -field vision confirms that it is critical. Sellers who mastered all the three components will be the ones who control. But most of them are struggling to effectively connect one.

The death of the surrounding security
Traditional protection walls cannot protect the burdens of artificial intelligence. The evidence is overwhelming. Palo Alto’s PRISMA cloud It treats 2 billion security events daily at the time of operation. Fortinet security fabric It connects more than 500 integration points because the surrounding defense has failed. Infinitely examination It works on the principles of zero tenderness, assuming a breach in each layer.
EBPF has changed the game. Linux Kerneel technology allows this security application without performing 40 % of traditional methods. CISCO’s acquisition is valid for $ 2.8 billion. KmOpen source ISOVALNT project, now secures the burdens of production work in Netflix, Adobe and Capital One. Japemb’s 15,000 stars reflect the adoption of institutions, not the interest of the developer.
Craig Conneys, Vice President of Cisco and CTO of Security, framing the shift in a recent interview in the Venturebeat project: “The security policy now applies to each class, from the burden of work to silicon.” The implicit meaning is clear. Security becomes an integral part of the infrastructure, not an overlapping.
Speaking devices seals the shift. Silicid security operates at the time of nanotechnology again. Mathematics brutal: safety of knowledge by programs adds 50-200 mm. The safety of devices adds from 50 to 200 nano. This improves a million times. Sellers who do not have silicone capabilities cannot compete.
Exploitation window for 72 hours
Weapons opponents are weak in 72 hours. Correcting institutions in 45 days. This gap is born 84 % of successful violations. Each security seller is racing to close.
Croldstrike’s Falcon Prevent Executive blocks before the stains are present. Quals vmdr It provides real time management. Tanium correction The mechanical response promises to the sub -watch. Cisco’s Live Protect applies the core levels within minutes.
The economy cannot be denied. Bonimon Institute research shows that every hour of late patching costs $ 84,000 of the risk of breach. The automatic platforms provide a return on investment (ROI) in 4.7 months. CISO cannot ignore mathematics.
“Time is everything in cybersecurity,” Shlomo Kramer, CEO of the company, confirms Cato networks. “Automation is not only related to efficiency, but rather is related to the survival of attacks that human teams cannot respond to quickly enough.”
Note wars are intensified
Splink’s acquisition of $ 28 billion indicates a greater fact: The observation determines who wins the Battle of Amnesty International. DataDand 18 trillion is treated daily. New residue It monitors 10 billion transactions per minute. Dynatatatatrace It tracks 2.5 million cloud applications.
Existential risks. Institutions that spread artificial intelligence without observation are blind flying. “You cannot secure what you cannot see,” says Itay Maour, director of security strategy in CATO networks. “Observation is not optional, it’s the basis for a safe digital transformation.”
The obstetric user interface represents the following limits. Instead of information panels, artificial intelligence creates interfaces in actual time based on the exact problem that is solved. Servicenow and Splink and emerging players like Noticed They are betting that dynamic facades replace fixed information panels within 24 months.
Standardization of the market is accelerating
The infrastructure giants collect their armies through the acquisition. Cisco paid $ 28 billion for Splink. Palo Alto captured the security of apple juice, drilling security and Talon at $ 1.2 billion. Buy Croldstrike Re -Customize, Humio, and Eliminate. VMWARE programs worth $ 69 billion in Broadcom the entire scene.
The speed of the platform now determines survival. Unified structures reduced development time from years to months. It took 18 months to publish now in 8 weeks. The engineering teams vote with their feet, and joins companies that ship quickly start with the institution’s scale.
Amnesty International’s infrastructure market is expected to be merged from more than 200 sellers to less than 20 platforms within 36 months. Gartner predicts 60 % of the current sellers will not be present by 2027. The message is brutal: controlling the full stack or becomes unrelated.
The bottom line
Agenticops is the most important architectural transformation since the emergence of cloud computing. Institutions that build an infrastructure of artificial intelligence will flourish with the assumption of the ongoing settlement, endless identities and attacks of the machine speed. Those who cling to the surrounding defense and respond to human speed will join Blockbuster and Kodak in the digital cemetery.
The sellers who follow this challenge – whether it is CISCO, Palo Alto, Microsoft, or young people – will control the next decade of institution technology. The race works. The clock is knocking. The winners are already arising.
[publish_date
https://venturebeat.com/wp-content/uploads/2025/06/hero.png?w=1024?w=1200&strip=all