Podcast Appearances
There's a lot of...
like post-hoc analysis you can do and those kinds of things.
We're working with integration partners to do real-time investigations of tool calls, for instance, or after-the-fact log analysis.
So there's a bunch of fascinating stuff there.
Could you block things?
Yes.
I mean, the short answer is yes.
Something like an AI firewall, even, too.
That's why I think it's really interesting.
Yes, you can.
And there are, uh, so we mentioned them in this, in a blog post just the other day, but there's some integration partners.
Oso is one, Cervos is another.
Yeah.
And so, uh, yeah, they've been great, uh, like to work with over just over the past few weeks, but yeah, we have a, we have an integration with them where, uh,
We have an API, for instance, tool call hooks.
They can intercept them and analyze those.
And you can start to do things where you can dynamically adjust your network or your security policy based on effectively real-time signals.
Or you have an agent that is starting to get a little bit more fast and loose with the rules and starting to access things that maybe it shouldn't be.
Yeah.
And so there's ways, you know, we can send signals out to those tools and those tools have like their own kind of like, I guess, application level, like network policy that they can start to adapt in real time based on signals they're getting from Aperture because it's all centralized.