Active Management

All Those AI ‘Agents’ Are Going to Need Security Credentials

One of the more immediate consequences of businesses and government entities increasingly trusting artificial intelligence (AI) with their data is security risk.

Portrait of Jafar Rizvi, Analyst and Portfolio Manager at Harding Loevner.
Jafar Rizvi, CFA contributed research and viewpoints to this piece.

One of the more immediate consequences of businesses and government entities increasingly trusting artificial intelligence (AI) with their data is security risk. An area of cybersecurity that may see greater demand because of AI is a niche known as identity and access management, which is Israel-based CyberArk’s specialty.

Humans who access an organization’s computer systems are assigned digital identities, which include their login credentials and define what parts of the system they have permission to access. Computer hardware and software also have digital identities—called “machine identities”—which must be protected. Securing human and machine identities involves managing various digital mechanisms, such as application programming interfaces (APIs), which are sets of rules that allow one piece of software to talk to another; digital certificates, which act like virtual identification cards with embedded signatures; and electronic keys that grant access to specific data or functions. CyberArk’s software platform helps organizations manage digital identities and monitor them for suspicious or unauthorized activity.

This is important because AI is creating a new class of machine identities in the form of autonomous and semi-autonomous AI “agents” capable of performing tasks and making decisions previously handled by humans. Already, the number of machine identities is on the rise: According to CyberArk, organizations on its platform had about 40 machine identities for every human identity last year—a ratio that has since doubled.

CyberArk is also poised to benefit from the proliferation of so-called containers and microservices widely used by AI developers. Containers package everything an app needs to run (code, tools, libraries), while microservices focus on discrete functions such as authentication. The company also developed a suite of AI-powered tools called CORA AI that helps its identity-security platform analyze user behavior, detect risky activity, generate audit reports, and provide its clients actionable insights. Management has been a good steward of capital, using the company’s strong balance sheet and free cash flow to invest in products and strategic partnerships that position CyberArk to meet the security challenges created by AI.

While much of the investment community has been focused on what large US companies are doing in AI, this technology may become a powerful equalizer, offering businesses of all sizes across geographies a chance to leapfrog the competition (or risk falling behind). ∎

More Insights

Health Care Swoon Puts Sector’s Stable Profits on Discount

Health Care stocks are now trading at some of their most attractive levels relative to the broader market in decades.

Will Europe Boost Military Spending?

NATO’s new defense spending target of 3.5% of GDP by 2035 could nearly double military budgets, unlocking a potential US$800B...

Humanoid Robots Are Exciting. Pneumatics Are a Better Business

When people think of industrial automation, they may envision a factory of robots that look and move like humans do.

Receive our investment updates in your inbox
Quarterly Commentaries
Monthly Reports
Quarterly Webcast Schedule
Insights from our Investment Team
Company HLHP
Opt-In Confirmation*
 

*By checking “Opt-In Confirmation,” you consent to receive investment updates from Harding Loevner. You can withdraw your consent at any time. Contact us.

The “Fundamental Thinking” series presents the perspectives of Harding Loevner’s analysts on a range of investment topics, highlighting our fundamental research and providing insight into how we approach quality growth investing. For more detailed information regarding particular investment strategies, please visit our website, www.hardingloevner.com. Any statements made by employees of Harding Loevner are solely their own and do not necessarily express or relate to the views or opinions of Harding Loevner.

The information provided is as of the publication date and may be subject to change. Harding Loevner may currently hold or has previously held positions in the securities referenced, but there is no guarantee that Harding Loevner currently owns, or has ever owned, the securities mentioned herein. If Harding Loevner owns any of these securities, it may sell them at any time.

Any discussion of specific securities is not a recommendation to purchase or sell a particular security. Non-performance based criteria have been used to select the securities identified. It should not be assumed that investment in the securities identified has been or will be profitable. To request a complete list of holdings for the past year, please contact Harding Loevner.

There is no guarantee that any investment strategy will meet its objective. Past performance does not guarantee future results.

© 2025 Harding Loevner