Menu

Can Proofpoint Secure the Intent of the Autonomous Agent?

Can Proofpoint Secure the Intent of the Autonomous Agent

Analyst(s): Fernando Montenegro
Publication Date: February 17, 2026

Proofpoint has acquired Acuvity to extend its data security perimeter beyond the inbox and into the emerging “agentic workspace.” This strategic pivot aims to secure the intent of autonomous AI agents through runtime governance, challenging established vendors and cloud-native startups for control of the enterprise AI gateway.

What is Covered in This Article:

  • Proofpoint acquires Sunnyvale-based startup Acuvity to bolster AI security and governance.
  • The integration of the RYNO platform to secure the “agentic workspace,” including Model Context Protocol (MCP) servers and locally installed tools like Ollama.
  • How Proofpoint is aiming to evolve from a human-centric focus to an agent-centric governance model.
  • An analysis of how Proofpoint faces pressure from platform vendors (Microsoft, Cisco, Palo Alto Networks), key SASE providers (Netskope, Zscaler, others), and numerous data/cloud security vendors (Cyera, Wiz, Veeam, Commvault, others)

The News: On February 12, 2026, Proofpoint announced its acquisition of Acuvity, a Silicon Valley-based startup specializing in AI security and governance.

Headquartered in Sunnyvale, California, Acuvity was founded in 2023 by a team of cybersecurity veterans. The company is led by co-founder and CEO Satyam Sinha, who previously co-founded the microsegmentation firm Aporeto (acquired by Palo Alto Networks for $144 million) and served as Vice President of Engineering for Prisma Cloud. He is joined by co-founder and CTO Antoine Mercadal, a fellow Aporeto and Palo Alto Networks alumnus.

Before the acquisition, Acuvity operated as a lean team of approximately 24 employees. The startup emerged from stealth in September 2024, backed by a $9 million seed funding round led by Foundation Capital.

Acuvity’s RYNO platform is designed to provide visibility into “Shadow AI” and to enforce real-time policies for LLM interactions through a specialized AI firewall and runtime inspection. Notably, the technology secures the “agentic workspace” by monitoring emerging Model Context Protocol (MCP) connections and locally installed tools like Ollama. This integration will allow Proofpoint to extend its “human-centric” security model to include autonomous agents, addressing risks such as prompt injection and data exfiltration.

Financial terms of the deal were not disclosed.

Can Proofpoint Secure the Intent of the Autonomous Agent?

Analyst Take: The acquisition of Acuvity marks a necessary and timely strategic move for Proofpoint. It signals a recognition that in the emerging “agentic workspace,” the inbox is no longer the primary perimeter: rather, the data workflow is. By integrating Acuvity’s RYNO platform, Proofpoint aims to expand its Data Loss Prevention (DLP) capabilities to address the non-deterministic nature of Generative AI. While network security vendors focus on the pipeline (securing the connection) and DSPM vendors focus on data at rest, Proofpoint is betting that its historical position in human workflows gives it a unique advantage in securing the payload by understanding not just that an agent is moving data, but why.

From Static DLP to “Semantic” Governance

The potential technical differentiator here is the shift from “Shadow AI” discovery (which is now a commodity) to runtime enforcement. Traditional DLP relies on static rules and regex (e.g., “block credit card numbers”), which often fail against human and, increasingly, non-human attackers using Large Language Models that can rephrase sensitive data into harmless-looking text. Acuvity aims to provide the semantic understanding required to detect intent.

Crucially, Acuvity’s support for the Model Context Protocol (MCP) allows Proofpoint to insert itself into the “read-write” loop of autonomous agents. This is a significant leap beyond the capabilities of a standard proxy, for example. While traditional proxy functionality can block a URL, proxies often struggle to parse the context of a multi-turn agentic conversation without breaking the application. If Proofpoint can successfully layer its Sigma information protection stack on top of Acuvity’s inspection engine, it may be able to offer a “kill switch” for data exfiltration that is context-aware rather than just connection-aware.

The “Digital Insider” and the Stakeholder Gap

This acquisition also offers Proofpoint a narrative bridge to compete with broader platforms: treating the AI Agent as a “digital employee.” Proofpoint is an established vendor in Insider Threat Management (ITM). As agents gain autonomy, the risk of an agent “going rogue” (hallucinating or being jailbroken) mimics the behavior of a malicious insider. By framing AI security as an extension of ITM, Proofpoint can leverage its large installed base and relationships with CISOs to potentially flank competitors such as Palo Alto Networks or CrowdStrike, despite both companies having made AI-specific acquisitions in the past year.

However, the competitive landscape is far broader. Proofpoint is also contending with pressure from at least four distinct vectors:

  • The Identity & AppSec Incumbents: This is arguably the stiffest headwind. Okta and CyberArk (now a Palo Alto Networks subsidiary) view AI agents as “Machine Identities” that belong under their governance, not Proofpoint’s. Simultaneously, developer-centric platforms like Snyk are moving to secure MCP servers at the code level, while Lakera (now part of Check Point) has traction as an AI firewall that appeals directly to the engineers Proofpoint may struggle to reach.
  • The Email & Human Risk Rivals: Traditional competitors like Abnormal Security and Mimecast (via its acquisition of Aware) are expanding their behavioral detection to cover AI and insider risks, arguing they can secure the “human element” without a separate agent governance tool.
  • The Network Gatekeepers: Cloud platform providers like F5 and Cloudflare, among others, are actively securing the AI traffic “pipe” via their own gateway offerings, often bundling this for free with existing enterprise contracts.
  • The Data Security Convergence: Proofpoint must compete against dedicated DSPM vendors like Cyera and Wiz, as well as data resilience providers entering the space, including but not limited to IBM, Veeam (via Securiti.ai), and Commvault (via Satori).

Proofpoint’s success will depend on its ability to prove to enterprises that Agent Integrity is not a bottleneck, but the necessary “trust layer” that finally allows them to move their autonomous agents from pilot to production.

Who is the right buyer?

Another aspect that Proofpoint will have to navigate is engaging the right stakeholders within an organization: Does the CISO make the final decision about agent-based security? Recent data from Futurum’s Cybersecurity Decisionmaker survey, fielded during Q4 2025, shows how, in areas such as data security, which is closely related to AI security, the responsibility for data security is increasingly shared between departments.

Figure 1: Security Team Influence on Data Security Purchases

Can Proofpoint Secure the Intent of the Autonomous Agent

What to Watch:

  • Will Proofpoint’s “Human-Centric” branding survive the pivot to “Agentic” security? As autonomous agents become primary actors, Proofpoint must reconcile its identity with a reality where threats are machine-to-machine.
  • Will this acquisition trigger a defensive consolidation wave among email security rivals? Competitors like Abnormal Security and Mimecast may be forced to build more capabilities around agent governance.
  • Can Proofpoint successfully navigate the shift in buying power to AI engineering teams? As budgets for agentic workflows move away from the traditional CISO, Proofpoint must prove it can sell to the DevOps leaders who may now control the “digital employee” roadmap.
  • Will Acuvity’s discovery capabilities expose a “Shadow Agent” crisis? Just as CASB revealed Shadow IT, early deployments may reveal that employees are already using unmanaged agents, forcing a rapid shift in enterprise security priorities.

Further information about the acquisition can be found in Proofpoint’s press release.

Declaration of Generative AI and AI-assisted Technologies in the Writing Process: While preparing this work, the author used AI capabilities from both Google Gemini and/or Futurum’s Intelligence Platform to summarize source material and assist with general editing. After using these capabilities, the author reviewed and edited the content as needed. The author takes full responsibility for the publication’s content.

Disclosure: Futurum is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of Futurum as a whole.

Other Insights from Futurum:

How Should We Consider Agentic AI Workflows in Cybersecurity? – Report Summary

Securing Agentic AI Is the Multi-Level Challenge for Security Teams – Report Summary

Was 2025 Really the Year of Agentic AI, or Just More Agentic Hype?

Author Information

Fernando Montenegro

Fernando Montenegro serves as the Vice President & Practice Lead for Cybersecurity & Resilience at The Futurum Group. In this role, he leads the development and execution of the Cybersecurity research agenda, working closely with the team to drive the practice's growth. His research focuses on addressing critical topics in modern cybersecurity. These include the multifaceted role of AI in cybersecurity, strategies for managing an ever-expanding attack surface, and the evolution of cybersecurity architectures toward more platform-oriented solutions.

Before joining The Futurum Group, Fernando held senior industry analyst roles at Omdia, S&P Global, and 451 Research. His career also includes diverse roles in customer support, security, IT operations, professional services, and sales engineering. He has worked with pioneering Internet Service Providers, established security vendors, and startups across North and South America.

Fernando holds a Bachelor’s degree in Computer Science from Universidade Federal do Rio Grande do Sul in Brazil and various industry certifications. Although he is originally from Brazil, he has been based in Toronto, Canada, for many years.

Related Insights
OpenAI Acquires Promptfoo, Gaining 25% Foothold in Fortune 500 Enterprises
March 11, 2026

OpenAI Acquires Promptfoo, Gaining 25% Foothold in Fortune 500 Enterprises

Mitch Ashley, VP Practice Lead at Futurum, examines OpenAI's acquisition of Promptfoo and what it signals about the security and governance requirements blocking AI agents from enterprise production....
Can Microsoft's Frontier Suite Deliver AI Excellence at Scale
March 10, 2026

Can Microsoft’s Frontier Suite Deliver AI Excellence at Scale?

Futurum analysts Keith Kirkpatrick and Fernando Montenegro share their insights on Microsoft’s Frontier Suite, and discuss the implications for both enterprise buyers and the company’s competitors....
Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning
March 6, 2026

Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning

Dion Hinchcliffe is Vice President & Practice Lead, CIO & Technology Buyers reviews Okta’s Q4 FY 2026 earnings, focusing on agentic identity positioning, evolving pricing models, and how large-customer platform...
Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience
March 6, 2026

Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience

Fernando Montenegro, VP and Practice Lead, Cybersecurity at Futurum, examines how Commvault’s bi-directional integration with CrowdStrike Falcon Next-Gen SIEM enables shared backup-integrity telemetry to fasten recovery after cyberattacks....
CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus
March 6, 2026

CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus

Fernando Montenegro, VP Cybersecurity at Futurum, highlights CrowdStrike’s Q4 FY26 earnings: Falcon expands into AI security, identity, and browser runtime, underscoring consolidation-driven cybersecurity strategies....
S3NS & Sovereignty Can Thales-Google Venture Make AI Sovereignty Work at Scale
March 5, 2026

S3NS & Sovereignty: Can Thales-Google Venture Make AI Sovereignty Work at Scale?

Nick Patience, VP & Practice Lead for AI Platforms at Futurum Research, assesses S3NS’s progress following its SecNumCloud qualification, evaluates the sovereign AI roadmap, and examines what the Thales-Google Cloud...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.