Palo Alto Networks published its 2026 Identity Security Landscape report Thursday, with the headline number worth pinning in any AI-agent procurement deck: organizations now manage an average of 109 machine identities for every human identity. AI agents account for a growing share. Survey respondents project machine identity growth of 77% over the next twelve months, AI agent growth of 85%, and human identity growth of 56% โ€” meaning the agent/machine layer is expanding twice as fast as the human layer, and the gap will widen materially through 2027. The downstream problem the report flags is the perception gap: C-suite executives believe their organizations enforce least-privilege because they focus on human access, while security practitioners report they cannot consistently enforce least-privilege for service accounts across cloud, SaaS, and on-prem systems. More than half of survey respondents admit that gap in writing.

The Unit 42 incident data is the part to weight most heavily โ€” it comes from actual breach investigations rather than survey self-report. Unit 42 examined more than 750 cyber incidents in 2025; in 87% of cases, investigators needed evidence from two or more distinct sources to establish what happened, with complex incidents requiring as many as ten. Fragmented identity systems added an average of 12 hours to identity-related incident response. The pattern that emerges is that authentication is over-emphasized as a control while post-login activity is under-monitored: single sign-on and MFA secure the front door, but neither catches what an agent, token, or service account does after authentication. AI agents are already reaching financial records, PII, operational technology, and core business systems โ€” and most organizations cannot define what those agents are allowed to access, how access is bounded, when permissions are revoked, or which systems inherit access from each other.

The ecosystem read connects directly to the agentic-stack pieces shipping this week. AWS WorkSpaces' MCP-agent preview, covered yesterday, made IAM-per-agent identity a baseline procurement requirement โ€” the Palo Alto report is the demand-side data point that explains why. Microsoft's MDASH agentic security harness from the same news cycle is the offensive-side complement; the same architectural pattern (100+ specialized AI agents) that finds vulnerabilities will also create them when deployed without IAM hygiene. The honest hedging on this report: it is Palo Alto Networks' own research, and Palo Alto sells identity-security products including CyberArk-integrated machine-identity tooling โ€” so the 109:1 ratio is in their commercial interest to flag. The Unit 42 incident statistics are more credible because they come from real-world investigations rather than self-report, but should still be treated as Palo Alto's view of the market rather than an independent census.

For builders: if you ship products that include AI agents reaching customer data, three concrete actions before the next deployment cycle. First, audit your machine-identity inventory โ€” most teams discover the 109:1 ratio is conservative when they actually count. Second, implement just-in-time access for service accounts and IAM-per-agent identity for any agent that touches production data; permanent privileged access is now an audit finding. Third, build a credential-revocation runbook that doesn't require a human approval step โ€” agent compromise at machine speed will burn organizations that can only revoke at human speed. The Palo Alto report is at the Help Net Security link if you want the full methodology; the 109:1 framing is the part to lift into procurement decks and the AI agents-grow-85% projection is the planning input for the next twelve months.