Vendor Strategy

Deconstructing Cisco's Agent Security Ambition: Open Foundry for Rule-Setting, Astrix for Non-Human Identity Lock-in, Network Layer as Agent Traffic Gateway

Deconstructing Cisco's Agent Security Ambition: Open Foundry for Rule-Setting, Astrix for Non-Human Identity Lock-in, Network Layer as Agent Traffic Gateway

1. Opening: 30+ Signals Are Not News Bombardment, But Four-Layer Architecture Synchronized Rollout

In the first two weeks of May 2025, Cisco released 30+ signals covering open-source specifications, acquisition integration, AI defense platforms, network infrastructure, operator strategy and more. Seemingly scattered announcements are actually a carefully orchestrated four-layer architecture synchronized rollout.

Four-Layer Architecture Core Logic:

Definition Layer (Standards) → Control Layer (Identity) → Detection Layer (Anomalies) → Infrastructure Layer (Pipeline)

These four layers form a complete Agent security system - Cisco is not just selling products, but competing for discourse power in Agent security. Why now? Because Agent security is transitioning from PPT discussions to commercial reality where customers bring budgets to ask questions. Enterprises need clear Agent security architecture guidance.

2. Definition Layer: Open Foundry Specifications for Rule-Setting Authority

2.1 Core Content of Foundry Security Spec

Cisco's open-source Foundry Security Specification defines a complete Agent security evaluation framework:

8 core agent role definitions | 130 functional requirements | 11 non-negotiable principles

This is not a product manual but an industry standard draft. By open-sourcing specifications, Cisco positions itself as the definitional authority in Agent security - similar to how Google's Android captured the mobile ecosystem through open standards.

2.2 Model Provenance Constitution: Solving AI Supply Chain Trust from Source

The Foundry specification includes the Model Provenance Constitution addressing AI supply chain verifiable trust:

Verifiable derivation history based on model weights | Distinguishing 5 association patterns from 8 non-association patterns

Open-source Model Provenance Kit provides model lineage verification tools, generating unique fingerprints for comparison with known model databases. This solves a fundamental question: when your AI system calls external models, how do you confirm the model has not been tampered with or replaced?

2.3 Strategic Intent: Becoming Android in Agent Security

Cisco's logic with Foundry specifications mirrors Google's Android open-source approach - not directly selling a system but becoming the standard itself. Competitors may adopt Foundry specifications, but Cisco's design philosophy is embedded in the rules. This is higher-dimensional competition: not competing at product level, but at rule level.

Comparison with Palo Alto: Palo Alto's Prisms and AI SASE represent product logic (I help you detect Agent security). Foundry represents standards logic (I define what should be detected). They operate on different levels.

2.4 Risk: Can Open Specifications Truly Influence Industry?

The critical variable is ecosystem response. The value of open specifications depends on how many developers, security vendors, and enterprises adopt them. If Foundry becomes the mainstream standard, Cisco occupies the rule-setter position; if response is minimal, specifications are merely marketing material.

3. Control Layer: Astrix Locks Non-Human Identity, Constitution Model Enables AI-Governed-AI

3.1 Astrix Acquisition: Filling Agent Identity Governance Gap

In May 2025, Cisco announced acquisition of Astrix Security, addressing Non-Human Identity (NHI) security management:

NHI TypeDescription
API KeysCredentials for AI Agent external service calls
Service AccountsAuthentication identity for system-to-system communication
AI AgentsAgent instances currently executing tasks

Traditional security focuses on human identity governance (user accounts, permission management). But in the Agent era, many operations are executed by non-human identities. Stolen API keys, uncontrolled service account permissions, AI Agent identity spoofing - these are the most common attack surfaces in Agent security.

Astrix positions as Agent identity firewall - who can enter, with what credentials, how much permissions, whether behavior is anomalous. After integration into Cisco Identity Intelligence Platform and Zero Trust solution, Cisco's zero-trust boundary extends from humans to humans + machines + agents.

3.2 Constitution-Defined Model: Deeper Logic of AI-Governed-AI

Another key move in Cisco's Agent security is shifting AI security classification from human annotation to Constitution-Defined Model.

Traditional AI security classification relies on human annotation - security experts define rules, annotate data, train classifiers. But in the Agent era, security policy quantity and complexity grow exponentially; human annotation does not scale.

Constitution-Defined Model logic: Using LLMs instead of human annotators for consistent classification and evaluation based on pre-defined principles (constitution). Letting AI develop and execute security policies themselves, not merely using AI for threat detection.

This is not using AI for detection, but using AI for policy-making itself - a fundamental difference in automation level.

Comparison with Palo Alto: Palo Alto uses AI for threat detection and response (I found what threat). Cisco uses AI for security policy-making itself (what constitutes a threat) - higher automation level.

3.3 Strategic Bet: AI Security's Future is AI Governing AI

Cisco's judgment: Agent security's future, where rule and policy scale far exceeds human management capability, must rely on AI automation. This means whoever masters AI governing AI core technology controls Agent security. Foundry specifications are what to define; Constitution-Defined Model is who executes - combined, they form a complete Agent security policy framework.

4. Detection Layer: AI Defense + ADK Integration + Red Team Labs, Capturing Developer Entry Points

4.1 AI Defense Integrates Google ADK: Capturing Agent Developer Entry Points

Cisco AI Defense platform announced integration with Google Agent Development Kit (ADK), providing end-to-end runtime protection for ADK-developed Agents.

Strategic intent is clear: capture Agent developer entry points. Google ADK is one of mainstream toolchains for developers building AI Agents. Through plugin and callback mechanisms embedded in ADK lifecycle, Cisco's protection becomes the default option for developing Agents with ADK.

This is not product selling but ecosystem lock-in - developers write Agents on Cisco platform, use Cisco protection, deploy on Cisco infrastructure, forming a complete closed loop.

4.2 VLM Dual Failure Mode Research: Proving Existing Defenses Are Insufficient

Cisco security research team published VLM (Vision Language Model) dual failure mode research, revealing minimal pixel perturbations bypass VLM safety alignment:

Failure ModeMechanism Description
Readability RecoveryAdversarial perturbations cause VLM to misread malicious content as normal
Denial SuppressionAdversarial perturbations prevent VLM from correctly triggering safety denial

This research has greater marketing value than academic value - proving to enterprises that existing AI defense systems are insufficient, justifying the need for advanced runtime protection. This is precisely why AI Defense platform exists.

4.3 DevNet Red Team Labs: Shifting Security Testing Left to Development Phase

AI Defense Explorer Edition provides red team lab capabilities, supporting natural language attack goal setting and multi-round adaptive attack simulation. Practical labs provide real-environment security testing.

DevNet red team lab strategic intent: Shift security testing left to development phase. Developers conduct security testing on Cisco platform while writing Agents, discovering and fixing issues immediately rather than passively defending post-launch.

Combined with ADK integration, Cisco's lock-in logic is complete: developers write Agents with ADK → test security risks in DevNet → use AI Defense for runtime protection → deploy on Cisco infrastructure.

Comparison with CrowdStrike: CrowdStrike's Charlotte AI detects Agent behavior at endpoint layer (host layer). Cisco AI Defense detects Agent traffic at network entry point (network layer) - more upstream, capable of intercepting before traffic reaches hosts.

5. Infrastructure Layer: Network as the Unavoidable Pipeline for Agent Traffic

5.1 Why Network Layer is the Strongest Position for Agent Security

All Agent operations depend on network:

API CallsAgents calling external services
Tool ExecutionAgents triggering local/remote operations
Data TransmissionAgents obtaining inputs, returning results
State SynchronizationMulti-agent collaborative communication

Regardless of platform, model, or tools, traffic passes through network layer. This means: network layer is the most natural anchor point for Agent security control.

Competitors can detect Agent behavior, but only Cisco can directly block Agent traffic at network layer. This is an irreplaceable architectural advantage.

5.2 AI Network Traffic Report: Quantifying Agent's Impact on Network

Cisco quantified Agent AI's WAN impact for the first time, predicting AI inference traffic will account for 25% of WAN total by 2035.

This report's true purpose: telling enterprises Is your network ready for this? Agent era will fundamentally change network traffic structure; traditional network planning and security architecture need synchronized upgrades. This is the optimal narrative for selling upgrades.

5.3 Nexus Dashboard 4.2: Datacentre Network Control Plane for AI Era

Nexus Dashboard 4.2 is Cisco's core update for datacentre networking:

Slurm AI/HPC Job MonitoringLLDP+NVIDIA NIC Adaptive Routing
eBPF Zero-Downtime Vulnerability Protection Live ProtectAI Workload Optimization Integration

Slurm is the industry standard for HPC/AI training job scheduling; integrating Slurm monitoring means Cisco occupies a position in AI training infrastructure. eBPF zero-downtime vulnerability protection Live Protect provides hot-fix capability - patching network device vulnerabilities without downtime.

5.4 Deep Integration with Red Hat: Capturing Enterprise AI Platform Network Control Plane

Cisco-Red Hat deep integration covers four dimensions:

AI POD | Unified Edge | Network-as-Code | Security AI Factory

Key integration points: Ansible (network automation), Splunk (security analytics), Isovalent eBPF (cloud-native networking) embedded in Red Hat OpenShift. This is a strategic move to capture enterprise AI platform network control plane - enterprises using OpenShift will have network and security architecture naturally dependent on Cisco.

5.5 Joint Ethernet AI Training Benchmark with AMD: Seizing NVIDIA InfiniBand Alternative Position

Cisco and AMD jointly released Ethernet AI training benchmark, using Cisco Nexus 9000 switches + Pensando Pollara 400 NIC achieving deterministic performance in 128-GPU clusters.

Core message: Ethernet can replace InfiniBand for AI training

NVIDIA's InfiniBand is the current standard for AI training networks, but expensive and supply-constrained. If Ethernet achieves comparable performance, enterprises have an alternative. Cisco Nexus 9000 series is the flagship datacentre switch product; this benchmark's essence: endorsing Cisco Ethernet devices for AI training scenarios.

5.6 Liquid-Cooled Switches: From Selling Switches to Selling AI Datacentre Systems

Cisco released liquid-cooled N9000/N8000 series switches:

Direct chip liquid cooling | Doubled bandwidth density | 70% energy reduction

AI datacentres are high-density computing scenarios where traditional air cooling approaches physical limits. Liquid-cooled switches mean Cisco sells not just networking equipment but complete datacentre infrastructure solutions adapted to the AI era. This is strategic upgrade from selling boxes to selling systems.

5.7 Agentic Workflows: AI Orchestration for Network Automation

Agentic Workflows provides AI-driven intelligent orchestration layer for Ansible/Terraform/Python:

FromTo
Task ExecutionOutcome-Driven
Script AutomationAI Decision Orchestration

Traditional network automation follows if X then execute Y script logic. Agentic Workflows follows tell me the goal, AI plans the path and executes - shifting from command execution to outcome-driven. This fundamentally brings network automation into the Agent era.

5.8 Comparison with Fortinet: Optimizing Devices vs Building Systems

DimensionFortinetCisco
Network Device OptimizationAI Firewall + NPU accelerationAgent traffic pipeline + security orchestration
Technical ApproachUpgrading existing devices to AI eraBuilding AI-native network architecture
Core ValueDevice performance improvementSystem-level security + network control

Fortinet optimizes existing devices; Cisco builds AI-era network infrastructure systems. Different routes, not the same competitive dimension.

6. Competitive Positioning Summary

DimensionPalo AltoFortinetCrowdStrikeCisco
Core PositionApp + CloudSecurity ApplianceEndpointNetwork Pipeline
Agent Security ApproachRuntime detection + AI SASEAI Firewall + NPUHost-layer Agent behaviorStandards + Pipeline Control
MoatPrisms + Portkey AI platformFortiOS + install baseFalcon + endpoint coverageNetwork Unavoidability
WeaknessNo network layer controlNo cloud/app layer controlNo network/cloud layer controlHistorical integration challenges

Cisco's unique advantage: Only Cisco simultaneously controls network pipeline and security definition layer. Others can detect Agent anomalies; only Cisco can directly block Agent traffic at network layer.

7. Weakness Analysis

7.1 Historical Legacy: Multi-Product Line Integration Difficulties

Cisco built its security product line through numerous acquisitions (Sourcefire, Splunk, Duo, etc.), with uneven integration progress across product lines. If Agent security requires four-layer orchestration, this historical issue becomes the critical bottleneck.

7.2 Inter-Layer Orchestration Black Box

Four-layer architecture is theoretically complete, but inter-layer orchestration is a black box. Can Foundry specifications actually drive AI Defense policies? Can Astrix identity management seamlessly embed into Nexus Dashboard? No public answers to these questions yet.

7.3 Verification Standard for Defensive Direction

If four-layer integration truly works - detect Agent anomaly → trigger identity verification → block at network layer - Cisco's Agent security position becomes as dominant as its network position. If layers still tell their own Agent stories, this moat remains theoretical.

8. Predictions

8.1 Short-Term (6 Months)

Foundry specifications: Attracting security community attention, ecosystem response pending observation

Astrix integration: Requiring time for identity management product integration

AI Defense + ADK: Becoming one of default security choices for ADK developers

8.2 Mid-Term (1 Year)

Key bifurcation:

If Four-Layer Orchestration WorksCisco's Agent security position mirrors its network dominance - the pipeline controller
If Still Separate Agent StoriesPalo Alto surpasses in AI security platform race

8.3 Critical Variable

Is four-layer integration genuinely operational or just PPT story? This is the core indicator for judging Cisco's Agent security strategy success or failure.

Key Data Annotations

✅ Verified: Foundry 8 roles/130 requirements/11 principles | Astrix acquisition | AI Defense + Google ADK integration | Liquid-cooled switches bandwidth density doubled/70% energy reduction | SD-WAN AI classification | AMD joint Ethernet benchmark 128 GPU | 2035 AI inference traffic 25%

⚠️ High Confidence: VLM dual failure modes | MSSP 70% operational efficiency improvement | Cisco IQ

⚠️ Vendor Claimed: Constitution-defined model replacing human annotation | Nexus Dashboard eBPF zero-downtime Live Protect

🎯

Why it Matters

Cisco's 30+ signals constitute not a product matrix but a strategic architecture. 

  • Open-source Foundry specifications attempt to replicate Android's success in Agent security - not selling products but selling standards. 
  • Astrix acquisition fills the Non-Human Identity governance gap, extending zero-trust from humans to machines. 
  • AI Defense + ADK integration captures developer entry points for ecosystem lock-in. 
  • Most critically, the infrastructure layer: network is the sole pipeline for Agent traffic, and Cisco's position is unavoidable. 

Competitors (Palo Alto, Fortinet, CrowdStrike) each occupy parts of one layer, but only Cisco simultaneously holds the definition layer, control layer, and irreplaceable infrastructure layer. This is a structural advantage in the Agent security competitive landscape.

PRO

DECISION

For security decision-makers, Cisco's four-layer architecture represents a new paradigm for Agent security - not single product procurement, but a strategy requiring deep integration with Cisco network infrastructure. Foundry specification ecosystem response is the first indicator; Astrix integration progress with existing identity platforms is the second; AI Defense + Nexus Dashboard orchestration use cases are the third. 

For network security teams, this signals that the anchor point for security strategy is migrating from application layer to network layer - traditional WAF, cloud security, endpoint detection remain necessary, but Agent era's first defense line may be at network layer. 

For technical architects, Cisco's Foundry specifications deserve attention - they may become the foundation for future Agent security interoperability standards, and early participation could secure standard-setting influence.

🔮 PRO

PREDICT

Cisco's position in Agent security will become clear within 12-18 months. If the four-layer architecture truly orchestrates, Cisco will become the network pipeline hegemon in Agent security - similar to its position in traditional networking. Any Agent traffic must pass through Cisco's security control points. Palo Alto will continue deep investment in AI security platform, differentiated by user experience and integration convenience. Fortinet will continue optimizing security device performance. CrowdStrike will strengthen endpoint layer coverage. But Cisco has the opportunity to become the infrastructure layer for Agent security - not optional, but the necessary path. 

Key risk: Cisco historically struggles with multi-product line integration, and four-layer orchestration complexity is even higher, with execution failure risk. Another risk: if Foundry specifications receive insufficient ecosystem response, they become self-entertaining marketing material rather than genuine industry standards. Short-term: AI Defense + ADK integration developer lock-in. Mid-term: infrastructure layer network pipeline value. Long-term: depends on Foundry ecosystem growth.

💬 Comments (0)