Back to resources

Securing AI Agents at Glide Identity

How Glide Identity used Lasso to turn 3 weeks of manual security work into 2 days of automated innovation.

Industry
Cybersecurity / Identity & Access Management (IAM)
Company Size
100+
Founding Year
2024
Headquarter
San Fransisco, California

With Lasso providing the guardrails, we turned three weeks of manual work into just two days. It gave us the confidence to empower our agents to do the heavy lifting without worrying about them being turned against us.

Sagiv Peer
Head of Application & Platform Security, Glide identity

The Challenge: 

Scaling AI Without the Risks

As a security-first company, Glide Identity wanted to lead by example. They aimed for full-scale corporate AI adoption, meaning agents and co-pilots helping everyone from R&D to non-technical teams.

However, Sagiv Peer and Shai Sivan identified a major hurdle: Agentic Intent. Unlike a standard chatbot, an internal agent can execute commands.

The risk was that an agent could be "maliciously activated" or manipulated into performing actions that align with an attacker’s goals rather than the company’s. Without runtime protection, they couldn't confidently scale these high-powered tools.

The Solution:
Protecting the Why Behind the Agent

Glide Identity partnered with Lasso to build a defense-in-depth strategy for their internal AI ecosystem. Rather than just blocking tools, they used Lasso to create a secure environment where agents could act autonomously but safely.

01

Agentic Red Teaming

Glide Identity uses Lasso to proactively Red Team their internal agents. By simulating sophisticated attacks, they can see if an agent can be tricked into deviating from its original purpose. Lasso provides the visibility needed to patch these logic gaps before they are exploited.

02

Runtime Protection & Policy Guardrails

Lasso acts as a security layer that monitors every interaction between the user and the agent. This ensures that the agent's actions always stay within the pre-defined safe zone, protecting against bias, misconfiguration, and unauthorized data access.

What I should know, what I should see, is what Lasso gave me. We aren't just protecting agents; we are securing the entire intent of our AI adoption. Lasso gives us the safety net to say 'yes' to innovation.

Sagiv Peer
CISO, Glide Identity

The Result:
The 2-Day Pentest

The standout success of this partnership is Glide’s Penetration Testing (PT) Agent. Traditionally, a deep-dive pentest took the team 3 weeks of manual effort. By building an AI agent to automate the process, and securing that agent’s intent with Lasso, the timeline was revolutionized.

Key Stats & Impact
Penetration Testing Time
3 Weeks
2 Days
AI adoption scope
Limited / Experimental
Automated 
Runtime Defense
Security deployment
Manual Reviews
Full-Scale
(All Depts)

The Result:
The 2-Day Pentest

The standout success of this partnership is Glide’s Penetration Testing (PT) Agent. Traditionally, a deep-dive pentest took the team 3 weeks of manual effort. By building an AI agent to automate the process, and securing that agent’s intent with Lasso, the timeline was revolutionized.

Key Stats & Impact
Penetration Testing Time
3 Weeks
2 Days
AI adoption scope
Limited / Experimental
Automated 
Runtime Defense
Security deployment
Manual Reviews
Full-Scale
(All Depts)

The Result:
The 2-Day Pentest

The standout success of this partnership is Glide’s Penetration Testing (PT) Agent. Traditionally, a deep-dive pentest took the team 3 weeks of manual effort. By building an AI agent to automate the process, and securing that agent’s intent with Lasso, the timeline was revolutionized.

Penetration Testing Time
3 weeks
2 Days
AI adoption scope
Limited / Experimental
Automated 
Runtime Defense
Security deployment
Manual Reviews
Full-Scale
(All Depts)

The Result:
The 2-Day Pentest

The standout success of this partnership is Glide’s Penetration Testing (PT) Agent. Traditionally, a deep-dive pentest took the team 3 weeks of manual effort. By building an AI agent to automate the process, and securing that agent’s intent with Lasso, the timeline was revolutionized.

Key Stats & Impact
Penetration Testing Time
3 Weeks
2 Days
AI adoption scope
Limited / Experimental
Automated 
Runtime Defense
Security deployment
Manual Reviews
Full-Scale
(All Depts)

A Roadmap for AI Adoption

Glide Identity proves that organizations don't have to be afraid of AI. By implementing the right security measures, they've shown that even the most security-conscious companies can adopt agentic workflows to drive massive efficiency gains.

About Glide Identity

Glide Identity provides SIM-based cryptographic authentication and verification systems using telecom network APIs. It replaces traditional methods like passwords and SMS-OTP by using SIM-anchored cryptographic verification, carrier-network intelligence, and biometrics. Its flagship product, MagicalAuth, verifies users silently via their SIM cards
with no codes or clicks, helping prevent SIM swap attacks, phishing, and other common fraud vectors.