Mark D. McClain
Management
Thanks, Todd. Thanks for the question. Yeah, I think we've tried to make sure we're trying to clarify and even delineate a little bit what we're doing from others. In our case, the machine identity approach we're taking is pretty consistent with how we've handled the governance of non-human identities. And as you noted, for now, that does not include AgenTic. We're going to cover in our Navigate launch here shortly a new product focused on agents. Our machine product would be covering things, as you said, like service accounts and software bots and RPA, maybe even some intelligent devices. I'd say in general, we're finding the situation where customers have sort of woken up, so to speak, to the fact that while some of these agents, excuse me, identity categories and machine are not new, they're a new part of the attack vector. So it's not that there's been a brand new introduction to machine identities. They've been there in many cases for some time. Now they're being recognized as part of the attack vector. And so what we've highlighted for folks in our offering is there's two things that are kind of unique about what we're doing for machines versus humans historically. One is you have to find them. You have to discover them. In many cases, customers really don't have a good grasp of the inventory of all these nonhuman identities that are already in their environment. And once you find them, then you need to kind of assign ownership. The other challenge is often there's some service account out there, there's some device out there, but it's not clear what human is responsible. So this idea of discovery and then assignment is kind of unique and new in the case of machine identity. Once we get through that step, though, in some cases, the ongoing governance and security of these identities looks pretty familiar. It's the lifecycle. It's the certification. Is this still a valid identity, who's responsible for it, has anything changed, is there any evidence of compromise? The kind of questions we answer for human identity. So we are finding that customers are very interested in this topic, and they are looking at our offering as pretty different from some of the offerings, say, that are focused more on, like, certification of servers, which is another offering for machine identity out there today. And that offering is more akin to authentication for a human. They want to validate that the machine is actually the machine they think it is, there's not a governance lifecycle approach. We're bringing our traditional lifecycle approach to these machine identities.