Latest news with #RadiantLogic


Forbes
3 days ago
- Business
- Forbes
Multiplayer AI: The New Operating Model For Identity Security
Dr. John Pritchard is the Chief Product Officer at Radiant Logic, responsible for the company's global product vision. AI-powered deepfakes and credential attacks are rewriting the rules of cyber risk, with identity-related breaches now costing organizations an average of $4.45 million per incident and accounting for over 70% of successful attacks on enterprise infrastructure and supply chains. Despite record investments in detection and response, breaches keep making headlines. Why? I call this the identity security paradox: More technology doesn't equal protection, especially if tools—and the people and AI agents using them—don't work together. Identity is the primary attack surface in the enterprise. Most organizations built their identity security stack on a traditional combination of IAM, IGA and PAM, but the rapid proliferation of cloud apps, machine identities and AI agents outpace these traditional controls. The result? Siloed data, unmanaged privileged accounts and hidden nonhuman identities—each a potential attack vector. Gartner finds that 65% of organizations still lack IAM maturity, weighed down by technical debt and fragmented architectures. Point solutions deployed to 'fix' audit findings or compliance gaps create more complexity, not less. Attackers exploit these seams, moving laterally between systems and identities that aren't monitored holistically. CISA's Silentshield Red Team Assessment demonstrated that decentralized teams and poor communication allowed adversaries to persist undetected, even when individual groups spotted anomalies. The lesson is clear: Solo efforts—whether a lone expert, an isolated AI agent or a disconnected tool—cannot keep pace with adversaries who are increasingly agile, automated and collaborative. To close these gaps, interoperability must become the standard for tools and the people and AI agents using them. Interoperability means more than connecting dashboards or sharing alerts. It's about ensuring that identity security posture management (ISPM) and identity threat detection and response (ITDR) systems share data, context and workflows in real time, across both human and machine identities. Gartner recommends a 'system of systems' approach, built on identity fabric principles, to support zero trust and intelligent automation. This means breaking down technical and organizational silos so prevention and detection teams operate from a unified, continuously updated single source of truth for identity data—a concept Gartner identifies as foundational for modern identity security. This trusted, authoritative data layer enables faster, more accurate decisions and ensures that every team acts on the same intelligence. When ISPM and ITDR interoperate, and when human and AI teammates collaborate based on shared reference points, blind spots shrink and attackers have fewer seams to exploit. I call the next evolution in identity security: multiplayer AI—intelligent systems designed to amplify human capabilities through enhanced teamwork. Gartner predicts by 2027, 90% of successful AI implementations in cybersecurity will focus on tactical task automation and process augmentation, not full autonomy or staff replacement. Multiplayer AI enables human and AI collaboration, breaking down silos and bridging gaps between prevention and detection. AI excels at analyzing vast datasets, detecting patterns humans miss and automating repetitive processes. Critical decisions, like determining whether anomalies are a threat or false positives, still require human judgment and contextual understanding. Studies show organizations using collaborative AI models—human decisions based on AI recommendations—see faster response times, fewer security incidents and improved resilience. The key is not just technology, but teamwork: AI handles the heavy lift of data processing and pattern recognition, while humans provide creativity, ethical oversight and business context. Thankfully, the industry is moving quickly. With the meteoric rise of agentic AI, open standards like Model Context Protocol (MCP) and Agent2Agent (A2A) are enabling AI agents from different vendors, clouds and frameworks to communicate, share context and coordinate tasks securely. Technology partners including OpenAI, Microsoft and Google are already adopting these protocols, breaking down silos that limit automation's impact. For business leaders, agentic AI means specialized agents for threat detection, access management, compliance and user behavior analytics can now form ad hoc teams-automating complex workflows and adapt to new threats. By 2028, Gartner forecasts multiagent AI will account for 70% of threat detection and response implementations, primarily to augment—not replace—staff. Early adopters will see measurable results: Leveraging agent-to-agent collaboration is predicted to cut attacker dwell time in compromised environments by up to 50%, while accelerating response and reducing operational risk. When humans and AI work together, identity security becomes faster, smarter and more resilient. 1. Establish an interoperability baseline. Audit ISPM and ITDR tools for data sharing and workflow integration across human and machine identities. Ensure architectures support agent-to-agent interoperability using open standards like MCP and A2A, so specialized agents can collaborate and automate cross-vendor workflows. Set quarterly targets to reduce IAM tool integration gaps. 2. Pilot tactical AI augmentation. Start with a focused, data-driven use case, such as automated privilege review or anomaly detection. Track improvement in response time and risk reduction. 3. Build AI literacy and human oversight. Train teams on both the benefits and limits of AI, including where human verification is required in critical workflows. 4. Continuously review identity hygiene. Use AI-driven discovery to identify unused or risky accounts, but require human validation before making changes. Aim to reduce privileged account sprawl and remediate orphaned accounts as they are detected. 5. Measure what matters. Track outcome-driven metrics such as percentage reduction in excessive permissions, improvement in MFA deployment rates and decreased incident response times. For example, reducing excessive permissions by 20% and increasing MFA coverage to 95% of privileged accounts within one year. The next breach won't be stopped by just another dashboard or a new AI agent. Organizations that have achieved true interoperability across tools, teams and AI will be able to respond more accurately to security issues. Multiplayer AI and agent-to-agent collaboration will lead the blueprints for resilience in the age of AI turbulence. Start by assessing your current environment for interoperability gaps, unify your tools and teams and empower your people with AI that amplifies—not replaces—their expertise. In the high-stakes game of identity security, victory belongs to those who play as a team. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Yahoo
03-06-2025
- Business
- Yahoo
Radiant Logic Wins 2025 Fortress Cybersecurity Award for Authentication & Identity Innovation
SAN RAFAEL, Calif., June 03, 2025--(BUSINESS WIRE)--Radiant Logic, the leader in Identity Security Posture Management (ISPM), today announced it has been named a winner in the 2025 Fortress Cybersecurity Awards, presented by the Business Intelligence Group. Radiant Logic was recognized in the Authentication & Identity category for its groundbreaking work in unifying identity data and delivering real-time visibility to speed IAM operations and reduce identity risk across complex enterprise environments. The Fortress Cybersecurity Awards honor the industry's top organizations and individuals who are advancing the state of security through measurable innovation and a commitment to best practices. This recognition follows a series of major product enhancements from Radiant Logic, including the announcement of Identity Observability in the RadiantOne platform, equipping security teams with continuous monitoring, dynamic risk scoring, and real-time remediation across distributed identity infrastructures. "The volume and complexity of threats facing organizations today is growing by the minute," said Russ Fordyce, CEO of the Business Intelligence Group. "The winners of this year's Fortress Cybersecurity Awards are not only keeping up—they're setting the pace. We're proud to honor Radiant Logic for developing identity-centric solutions that are essential to the future of secure access and Zero Trust." Radiant Logic's win highlights the impact of its AI-powered identity observability engine and graph-based data unification model, which together help enterprises detect misconfigurations, eliminate orphaned accounts, and improve compliance through a unified view of identity across Active Directory, cloud services, SaaS applications, and more. "We're honored to be recognized by the Business Intelligence Group," said Dr. John Pritchard, CEO, Radiant Logic. "As identity becomes the dominant threat vector in today's cybersecurity landscape, our mission is to give organizations the visibility and intelligence they need to secure access at scale. This award is a testament to our team's innovation and relentless focus on helping customers ensure a more resilient identity infrastructure." To learn more about Radiant Logic's award-winning platform and ISPM approach, visit To learn more about the Fortress Cybersecurity Awards, visit: About Radiant Logic Radiant Logic, the leader in Identity Security Posture Management (ISPM), empowers complex enterprises to ensure a more resilient identity ecosystem and prevent security breaches. RadiantOne is the only centralized platform that unifies 100% of identity data—including legacy systems, cloud platforms, and non-human identities—into a single source of truth that serves as the foundation of your IAM program. Delivering 360° visibility, observability, and context in real time, the platform is fueled by AI-driven analytics to automatically identify and remediate risks. Trusted by the world's largest commercial and government organizations, we help accelerate identity-first security strategies by reducing the attack surface, ensuring continuous compliance, and driving digital transformation. Learn more at About Business Intelligence Group The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry award programs, these programs are judged by business executives with real-world experience. The organization's proprietary scoring system measures performance across multiple business domains and rewards companies whose achievements are significant and measurable. View source version on Contacts Media Contact Sydney DraytonSdraytonc@ Eliana StarbirdChief Nominations OfficerBusiness Intelligence Group+1 909-529-2737contact@


Techday NZ
29-05-2025
- Business
- Techday NZ
Radiant Logic launches AI tool for identity visibility
Radiant Logic has launched the full suite of its Identity Observability feature for the RadiantOne platform, offering real-time monitoring and risk management capabilities for identity and access management ecosystems. The latest release from Radiant Logic aims to provide organisations with enhanced visibility into their identity management systems and processes, which can help identify, prioritise, and address security risks before they are exploited. The RadiantOne platform now incorporates features such as continuous real-time discovery and observability across identity systems, a unified graph-based model of identity data from sources including Active Directory, LDAP, on-premise applications, Entra Identity, and SaaS platforms, and dynamic risk scoring using heuristics and pattern recognition. The platform also includes an AI Data Assistant (AIDA) that analyses intricate identity relationships, recommends corrective measures, and facilitates collaboration between line managers and resource owners to resolve identity issues. Additional features include dashboards that provide real-time monitoring of identity hygiene, comprehensive reporting, and maturity assessments designed to support policy enforcement and compliance requirements. According to Radiant Logic, the platform is designed to fit into existing enterprise environments as a SaaS or self-managed solution, supporting security initiatives such as Identity and Access Management (IAM), Identity Governance and Administration (IGA), and Zero Trust models. Dr. John Pritchard, Chief Executive Officer at Radiant Logic, commented on the release, "Identity sprawl, hybrid complexity and unmanaged access create blind spots that leave organisations vulnerable to cyber threats. With the RadiantOne platform, we're illuminating every human and non-human identity across the environment—giving security and IAM teams complete visibility into who has access to what, whether it's legitimate and how to mitigate risks, before attackers find the gaps." The platform's enhancements are aligned with guidance from research and advisory firms' recommendations, such as those from Gartner. In its 2025 Guidance for Comprehensive IAM Architecture Strategy, Gartner recommends that organisations "Invest in a centralised identity and access data platform that integrates discovery tools across all IAM layers to aggregate, correlate and reconcile identity and access data. Implement emerging artificial intelligence (AI)-driven identity and access intelligence solutions to enhance observability and automation to quickly remedy vulnerabilities or facilitate a response to identity threats." Industry stakeholders outside Radiant Logic have also commented on the significance of providing robust visibility across identity data. John Horn, Head of the Cybersecurity Practice at Datos Insights, said, "Security defences at many firms operate with incomplete views of identity data and risk across their organisation. A robust identity fabric, centred upon rich, AI-enabled identity visibility for every aspect of the business, is the new operational foundation." "Radiant Logic's Identity Observability is an exciting capability that enables enterprise-wide views of identity data and risk, combined with automated resolutions to many common security problems. As we enter the age of Agentic AI and greater cyber risk, powerful identity observability and remediation will become central capabilities for the business." Early adopters of RadiantOne's new features have reported benefits in managing identity vulnerabilities and improving oversight. A Head of IAM in the insurance sector stated, "It's truly one of the few solutions that delivers so many valuable features right out of the box. This product's real-time data visibility and intuitive interface make it an outstanding tool for monitoring identity vulnerabilities and quickly understanding the health of our company's access management." A Head of Cybersecurity in the transportation industry shared a similar sentiment, saying, "With real-time data visibility and centralised reporting, this tool makes monitoring identity and access management effortless huge improvement over our previous solutions." The RadiantOne platform's combination of real-time monitoring, unified visualisation, and AI-driven remediation is designed to support organisations in addressing the increasing complexities and threats related to identity and access management across hybrid and multi-cloud environments.


Business Wire
28-04-2025
- Business
- Business Wire
Radiant Logic Wins Editor's Choice for Identity Security at the Global InfoSec Awards
SAN FRANCISCO--(BUSINESS WIRE)-- Radiant Logic, a leader in Identity Security Posture Management ('ISPM'), is proud to announce it was named Editor's Choice in Identity Security by the Global InfoSec Awards from Cyber Defense Magazine (CDM), the industry's leading electronic information security magazine. 'We're thrilled to receive this award and recognition from Global InfoSec for how we are helping organizations lay the proper data foundation to effectively drive their Identity-First Security Program,' said Dr. John Pritchard, CEO, Radiant Logic. 'This year's recognition in Identity Security helps solidify the work we have done to help enterprises gain visibility and control of their identity data and proactively identify and mitigate risks in real time.' Radiant Logic continues to innovate in the identity security space by helping customers address the risk of identity sprawl, through enhanced integration, visibility, and intelligence across complex identity environments. In a landscape where identity data is often scattered and inconsistent, Radiant Logic unifies and streamlines identity information to give security teams a complete and accurate picture of who has access to what—across every system and application. This clarity enables faster threat detection, smarter access decisions, and stronger Zero Trust enforcement. Radiant's ability to make identity the backbone of modern security is what sets it apart as the trusted choice for the world's most complex organizations. 'We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cybercrime. Radiant Logic is absolutely worthy of these coveted awards and consideration for deployment in your environment,' said Yan Ross, Global Editor of Cyber Defense Magazine. About Radiant Logic Radiant Logic, a leading Identity Security Posture Management (ISPM) software provider, unifies, analyzes, and secures an organization's entire identity ecosystem in real-time. RadiantOne is the only data-driven platform that delivers identity hygiene at scale through the combination of identity data management, advanced analytics real-time observability and AI. By serving as the foundation of an organization's IAM program, RadiantOne unifies 100% of identity data—including legacy systems, cloud platforms, machine, and agentic identities—into a single authoritative source of truth. The platform also provides 360° observability with real-time risk assessments and leverages AI-powered remediation workflows to transform insights into actionable security outcomes. We are trusted by the world's largest commercial and government organizations, to help them achieve measurable identity security improvements such as faster threat detection, streamlined compliance reporting, and reduced operational inefficiencies. Learn more at About Cyber Defense Magazine Cyber Defense Magazine is the premier source of cyber security news and information for InfoSec professions in business and government. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at and visit and to see and hear some of the most informative interviews of many of these winning company executives. Join a webinar at and realize that infosec knowledge is power.