Home » Aerospace and defense » Solving the Security Puzzle in Enterprise AI: Insights from Google Cloud Security Summit 2025
AI has become the defining force for digital transformation. As Jon Ramsey, vice president (VP) and general manager (GM) of Google Cloud Security, highlighted at the Google Cloud Security Summit 2025 that 91% of organizations have already launched AI initiatives, ranging from supply chain optimization to customer experience innovation. The consensus across industries is clear: AI’s transformative potential is undeniable. However, scaling these initiatives from pilot projects to enterprise-wide adoption is proving difficult. The single biggest hurdle is security—the ability to safeguard sensitive data, prevent adversarial misuse of AI, and build trust with regulators and customers.
According to Avasant’s The Evolution of Synchronous AI Agents report, 65% of organizations cite data security and privacy safeguards as the top barrier to scaling agentic AI initiatives (see Figure 1 below). As these AI agents handle sensitive data, organizations prioritize solutions with strong privacy protections to mitigate risks. Legal and regulatory compliance for autonomous agents is closely followed, where 58% of organizations expressed concern about the absence of a clear legal framework.

While AI promises unparalleled opportunities, it simultaneously creates new vulnerabilities and challenges for security leaders:
Together, these factors make organizations hesitant to scale AI adoption, despite its strategic business value. So, the question facing today’s enterprises is: How can they secure their AI-driven digital future while building resilience and operational efficiency?
The path forward is adopting a “Secure by Design” AI strategy that involves embedding security early and comprehensively across the AI life cycle. This approach rests on two key pillars:
Google positioned its Agentic SOC vision as the future of security operations. Payal Chakravarty, director of Product Management for Google SecOps, explained that AI agents function as “mini security analysts,” performing tasks such as continuous alert triage, anomaly investigation, new detection generation, and threat hunting. Instead of replacing humans, these AI agents augment their work by taking on the repetitive, data-heavy tasks that drain analyst productivity.
The summit showcased compelling examples:
Vodafone’s Cybersecurity Technology Strategy and IT Architecture Director Emma Smith shared how her team consolidated global network data with Google Cloud Security Operations (SecOps) to improve monitoring at scale. By unifying visibility across multicloud and on-premises systems, Vodafone applied AI/ML to both security events and posture management. With the EPIC data lake on GCP integrated into SecOps, analysts gained a single platform that simplified workflows, improved efficiency, and enabled faster response to threats.
Similarly, Hector Peña, senior director of Information Security at Apex Fintech Solutions, highlighted how Google SecOps with Gemini has significantly improved efficiency in threat detection and response. Tasks like writing regular expressions, which once took up to an hour, are now completed in seconds, reducing investigation time from several hours to under 30 minutes. With Unified Data Model (UDM) logging simplifying ingestion and analysis, analysts can shift their focus from repetitive tasks to more advanced security workflows.
While these outcomes are impressive, they are not exclusive to Google. Competitors such as Microsoft and CrowdStrike are also integrating AI-driven automation into SOC platforms:
Google’s differentiator lies in combining consumer-scale telemetry (billions of endpoints across Gmail, YouTube, and Chrome) with Mandiant’s incident response expertise, creating a unique flywheel of data and frontline intelligence.
After decades of reactive defense, AI is finally giving the defender an advantage. However, enterprises should evaluate ROI critically, as outcomes depend on integration maturity, analyst training, and data quality. The agentic SOC is not a silver bullet, but it offers a credible path toward operational resilience.
The second pillar focuses on securing AI itself. As organizations adopt generative AI for customer experience, employee productivity, and software development, the attack surface expands dramatically. Non-human identities—AI agents, workloads, and service accounts—already outnumber humans 45:1 in enterprise environments, creating systemic risk if mismanaged.
Naveed Makhani, product lead for AI Security Products at Google, highlighted that autonomous agents introduce new risks, including:
Addressing these interconnected risks requires comprehensive AI protection across the enterprise. Google’s security-first initiatives include:
Additionally, Google announced the extension of Model Armor to Agentspace, its platform for deploying AI agents that an employee can use directly across business workflows, and Vertex AI, a unified platform for building Gen AI models.
Snap’s Head of Infrastructure Security, Shrikant Pandhare, shared how the company is adopting AI Protection to gain visibility into its AI environment through automated asset discovery and risk scoring. Snap also found Model Armor effective in defending against jailbreak attempts, protecting sensitive data on third-party LLMs, and detecting abuse language, strengthening its secure AI adoption.
Industry peers are also advancing AI security. Recently, SentinelOne acquired Prompt Security to enhance its AI-native Singularity™ Platform with real-time generative AI and agentic AI protection. The integration will give IT and security teams visibility into AI usage, enforce policy-based controls against prompt injection and data leakage, and offer model-agnostic coverage across all major LLMs via the MCP.
Similarly, CyberArk has launched a Secure AI agents solution that extends its security controls to autonomous AI agents. The approach treats each agent as a privileged identity, applying access restrictions, credential management, and continuous monitoring to reduce risks such as unauthorized actions, misuse, or data exposure in agentic AI environments.
AI cannot scale safely without security built in at every layer—from training data and model deployment to agent-to-agent interactions. Google’s proposals are strong, but success depends on execution, ecosystem adoption, and regulatory alignment. Securing AI is no longer optional; it is a prerequisite for trust, compliance, and business resilience.
The Google Cloud Security Summit 2025 underscored a clear reality: enterprises cannot fully realize AI’s potential without advancing their security posture in parallel. Google leaders emphasized that security must evolve alongside AI to unlock scalable, resilient, and trusted adoption.
Key insights include:
The future of enterprise AI is “Secure by Design.” Embedding security throughout the AI life cycle will help organizations address threats and foster innovation with confidence. While Google has articulated a compelling vision, enterprises must validate these claims with measurable outcomes, customer experiences, and ecosystem alignment before committing at scale.
By Gaurav Dewan, Research Director
Avasant’s research and other publications are based on information from the best available sources and Avasant’s independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.
Login to get free content each month and build your personal library at Avasant.com