AWS joins Microsoft, Google in the security AI agent race
Briefly

AWS joins Microsoft, Google in the security AI agent race
"To that end, the cloud giant has rolled out AWS Security Agent in preview today at its annual re:Invent conference. It's free to use - with usage limits - during the public preview period, but there's no word yet from Amazon as to when it will be generally available. But unlike Google and Microsoft, AWS's approach to agentic AI for security-specific use cases seems a little more subdued with one agent - as opposed to tasking agents with all the security things."
""The penetration testing agent creates a customized attack plan informed by the context it has learned from your security requirements, design documents, and source code, and dynamically adapts as it runs based on what it discovers, such as endpoints, status and error codes, and credentials," said Esra Kayabali, AWS senior solutions architect, in a blog shared with The Register ahead of publication."
"This task alone can shave weeks or even months off applications' security validation processes, according to Rungta. "Customers have told us that AWS Security Agent's on-demand penetration testing allows them to begin receiving results within hours compared to what would have taken weeks of scheduling and back-and-forth communication between teams," Rungta said. "Others have told us that AWS Security Agent's design time findings helped them save significant development time and effort,""
AWS rolled out AWS Security Agent in preview at re:Invent, offered free during public preview with usage limits and no announced general availability date. The agent is a single frontier agent that proactively secures applications across the development lifecycle and environments. Security teams define corporate requirements and standards and the agent conducts automated reviews to ensure compliance. The agent performs on-demand penetration testing customized to applications and reports security risks. The penetration testing agent creates customized attack plans informed by security requirements, design documents, and source code, dynamically adapting based on discoveries. The service speeds security validation, often delivering results within hours instead of weeks.
Read at Theregister
Unable to calculate read time
[
|
]