Artificial IntelligencePress ReleaseThreat Detection & Defense

CrowdStrike Extends AI Agent Security Across the SaaS Stack

Adding Visibility and Governance to OpenAI GPT-Based Agents—Including Those Built with ChatGPT Enterprise and OpenAI Codex—and Expanding Support for 175+ SaaS Applications and the AI Agent Identities Reshaping the Modern Attack Surface

CrowdStrike has announced a new integration with the OpenAI ChatGPT Enterprise Compliance API, designed to add visibility and governance for Artificial Intelligence (AI) agents that are redefining how work gets done. CrowdStrike Falcon® Shield now discovers GPTs and Codex agents created in OpenAI’s ChatGPT Enterprise, expanding support for more than 175 SaaS applications. As cybersecurity’s platform innovator for the AI era, CrowdStrike helps organisations strengthen governance of AI agent identities and the human identities behind them.

As organisations embrace agentic AI to drive automation at scale, an explosion of agents is transforming SaaS environments. Organisations can have limited visibility into what the agents are doing, what systems and data they can access, or who created them. These autonomous agents have non-human identities with persistent privileges and can be hijacked when a human identity is compromised—enabling adversaries to exfiltrate data, manipulate systems, or move laterally across critical business applications. By expanding the number of identities, accelerating access, and increasing the blast radius of a single compromise, these agents are redefining the attack surface.

Falcon Shield’s integration with ChatGPT Enterprise adds governance for this new layer of AI-driven automation in the SaaS stack—mapping each agent to its human creator, surfacing risky behavior, and helping to enforce policy in real time. Combined with Falcon® Identity Protection, CrowdStrike helps deliver unified visibility and protection across every human and non-human identity—helping organisations strengthen the oversight of AI agents.

“AI agents are emerging as superhuman identities, with the ability to access systems, trigger workflows, and operate at machine speed,” said Elia Zaitsev, Chief Technology Officer at CrowdStrike. “As these agents multiply across SaaS environments, they’re reshaping the enterprise attack surface and are only as secure as the human identities behind them. Falcon Shield and Falcon Identity Protection help secure this new layer of identity to prevent exploitation.”

CrowdStrike Secures AI Agents with Innovation

Falcon Shield secures AI agents across the SaaS stack by:

  • Discovering AI Agents Across SaaS: Surfaces GPTs, Codex agents, and other embedded AI tools across platforms like ChatGPT Enterprise, Microsoft 365, Snowflake, and Salesforce—giving security teams added visibility.
  • Mapping Agents to Human Creators: Links agents to their human owner to support accountability, trace access, and govern privileges with context—while Falcon Identity Protection helps secure the human identities behind them.
  • Detecting Risky Behaviour: Flags overprivileged agents, GPTs with sensitive action capabilities, and unusual activity by analyzing identity, application, and data context.
  • Containing Threats Automatically: Uses Falcon® Fusion, CrowdStrike’s no-code SOAR engine, to automate actions like blocking risky access, disabling compromised agents, and triggering automated response workflows to mitigate issues quickly.
  • Unifying AI Agent Protection, Powered by the Falcon Platform: Combines Falcon Shield, Falcon Identity Protection, and Falcon® Cloud Security to provide end-to-end visibility and control over AI agent activity—from the human who created it to the cloud systems it can access.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *