{"id":5524,"date":"2025-09-16T13:11:28","date_gmt":"2025-09-16T13:11:28","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/16\/securing-the-agentic-era-introducing-astrixs-ai-agent-control-plane\/"},"modified":"2025-09-16T13:11:28","modified_gmt":"2025-09-16T13:11:28","slug":"securing-the-agentic-era-introducing-astrixs-ai-agent-control-plane","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/16\/securing-the-agentic-era-introducing-astrixs-ai-agent-control-plane\/","title":{"rendered":"Securing the Agentic Era: Introducing Astrix&#8217;s AI Agent Control Plane"},"content":{"rendered":"<p>\u200bAI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.\u00a0<br \/>\nRecent studies show 80% of companies have already experienced unintended AI agent actions, from unauthorized system\u00a0AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.\u00a0<br \/>\nRecent studies show 80% of companies have already experienced unintended AI agent actions, from unauthorized system\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.\u00a0 Recent studies show 80% of companies have already experienced&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/16\/securing-the-agentic-era-introducing-astrixs-ai-agent-control-plane\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Securing the Agentic Era: Introducing Astrix&#8217;s AI Agent Control Plane<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":5525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5524"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=5524"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/5525"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=5524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=5524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=5524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}