Introducing Wiz Agents & Workflows: Security at the Speed of AI

A new security operating model powered by AI agents that removes bottlenecks and enables teams to act at the speed of AI

AI is changing not just how we build — but how security operates.

AI-generated code, autonomous agents, and dynamic applications are increasing both the speed and complexity of modern environments. Traditionally, this created an asymmetry: defenders had to secure everything, while attackers only needed to find one weak point.

But AI is beginning to shift that balance.

AI is now accessible to both attackers and defenders — but its effectiveness depends on one thing: context. Defenders have it.

Across code, cloud, and runtime, security teams sit on the richest source of context about how systems are built, how they behave, and where risk actually exists. And more importantly, Wiz brings that context together.

Security teams are no longer limited by a lack of data, but by the ability to act on it. They are still forced to manually investigate alerts, stitch together signals across tools, and validate risk before taking action. As risk increases in speed and scale, response remains constrained by human capacity.

This is the bottleneck.

Today, we’re introducing Wiz Agents and Workflows — bringing autonomous reasoning and action into the Wiz platform as a force multiplier for security teams, helping them operate at the speed of AI.

Meet the Agents: Red, Blue, and Green

We built three specialized agents to operate across the entire security lifecycle. These aren’t simple assistants — they are intelligent systems that can reason, investigate, and take action, grounded in the Wiz Security Graph.

Red Agent (Offensive)

Your AI-powered attacker. Red Agent reasons through application logic to uncover complex logic-driven vulnerabilities typically left hidden. It acts like a sophisticated security researcher- but with AI speed and scale- reasoning about application behavior, adapting its approach in real time, and validating exploitable risks across your web applications and APIs, empowering you to stay one step ahead of attackers. Learn more about the Red Agent in this blog.

Blue Agent (Defensive)

Your built-in threat investigator. When a threat is triggered, Blue Agent gathers evidence across cloud telemetry, runtime signals, and identity context to comprehensively investigate the threat and produce a clear verdict on its severity. It approaches threat investigation as a seasoned incident responder would, providing its full investigation logic so you can resolve threats with confidence and speed. Learn more about the Blue Agent in this blog.

Green Agent (Resolution)

Your path to “zero criticals”. Green Agent acts as a built-in investigation and remediation engine, continuously analyzing your highest-risk Issues to close the gap between detection and resolution. Like a seasoned security engineer, it synthesizes context from across Wiz - including the Security Graph, code-to-cloud relationships, identity ownership, and historical remediation patterns - to identify the true root cause of a risk and the safest, most effective resolution. Teams get environment-specific, step-by-step remediation guidance so fixes are durable.

Together, they form a continuous loop of validation, investigation, and resolution — all grounded in real context across your environment.

Introducing Agents in Workflows

Teams now have rich context, clear prioritization, and AI-driven analysis — but the challenge is operationalizing that insight into consistent, scalable action.

That's where Workflows come in, allowing teams to define how AI operates within their environment.

Workflows extend Wiz from insight to action — turning the platform’s context, prioritization, and AI-driven analysis into programmatic, repeatable workflows that scale how security teams operate.

Wiz Workflows introduces a new hub for orchestrating cloud and AI security within Wiz. It brings together the rich context of Wiz, analysis from Wiz AI agents, and a flexible drag-and-drop interface. Together, this enables security teams to define and customize how work gets done,  from when and how agents act to where human input is required. For example, teams can:

  • Pull the Blue Agent analysis for a suspicious login Threat, message the user in Slack to validate the activity, and escalate to SecOps if it’s not recognized.

  • Automatically trigger remediation actions when the Green Agent reaches a high-confidence remediation verdict, such as blocking public S3 access or patching a vulnerable workload, and send a summary from MikaAI of the remediation to cloud security in Slack.

  • Route lower-confidence remediation verdicts from the Green Agent to a developer in Slack for approval, for example confirming a code change to a production workload before triggering remediation.

This creates a flexible model where AI acts as a force multiplier, accelerating execution and pushing teams toward greater autonomy where it makes sense. Agents in Workflows help make operational processes more efficient, and elevate teams’ roles away from manual work and toward defining processes, overseeing execution, and evaluating key decision points.  

See Them in Action: From Zero-Day to Zero Critical

🔴 Red Agent — Finds the Risk

In this case, the Red Agent proactively discovers an authentication bypass in an externally exposed AI chatbot. By reasoning through the application's logic, it identifies an unauthorized access vulnerability, allowing it to send natural language prompts to the chatbot and exfiltrate sensitive backend data, including PII and financial data. Red Agent validates the exploitability and provides concrete proof and reasoning, demonstrating a real, critical risk requiring immediate attention.

🟢 Green Agent — Drives the Fix

Once the risk is identified, the Green Agent investigates it in context — tracing the issue back to its root cause and identifying the most efficient fix from remediation history. 

It maps ownership to the right developer and generates clear, environment-specific remediation steps, ensuring the fix is both actionable and durable.

⚙️ Agent-Led Workflows — Orchestrate the Response

Simultaneously, agents in Workflows determine how the organization responds.

For high-confidence risks, remediation can be triggered automatically — such as automatically restricting public access to a virtual machine. In other cases, the Workflow can route through a human approval step, providing full context and a clear recommendation before taking an action like triggering remediation or creating a Jira ticket with context for a developer.

This allows teams to scale responses while remaining oversight and control. 

🔵 Blue Agent — Detects and Investigates

In parallel, the Blue Agent detects suspicious activity on the host container supporting the chatbot and investigates it in real time.

It correlates signals across runtime, identity, and cloud telemetry to map the full path of the activity, understand its impact, and determine whether it represents active exploitation.

This ensures teams aren’t just fixing a vulnerability, but fully understanding the threat in context.

Summary

What would traditionally require multiple tools, manual investigation, and hours of effort becomes a coordinated sequence — from discovery to remediation to continuous validation.

Each step builds on the last, removing the bottlenecks that slow security teams down.

Built on Context, Designed for Action

Effective security decisions require context.

Understanding whether something is truly risky depends on how identities, workloads, applications, and data are connected — not just on isolated signals.

Wiz Agents are grounded in the Wiz Security Graph, giving them the ability to reason across the full environment. This allows them to move beyond summarizing findings and instead validate risk, understand impact, and drive precise remediation.

This combination — deep context with action-oriented execution — is what enables agents to reduce noise, prioritize what matters, and eliminate the bottlenecks that slow teams down.

Security Built on Trust

For autonomous systems to be adopted, they must be trusted.

Wiz Agents are designed with that in mind:

  • Transparent — every action is backed by visible evidence

  • Explainable — decisions are clearly reasoned and easy to understand

  • Actionable — outputs are designed to drive real outcomes

Combined with human-in-the-loop workflows, this ensures teams can adopt AI at their own pace — with confidence in every step.

The Future: From Bottlenecks to Velocity

Security teams have always been constrained by time.

Too many alerts, too much manual work, and not enough capacity to act.

Wiz Agents and Workflows change that.

By removing investigation bottlenecks and accelerating remediation, they allow teams to shift from reacting to risk — to staying ahead of it.

This shift isn’t just about speed — it’s about measurable impact.
Organizations see faster investigation and remediation cycles, reduced manual effort across teams, consolidation of fragmented tools, and a clearer focus on the risks that actually matter. In some cases, teams report cutting MTTR by an order of magnitude — moving from hours to minutes.

The result is a more efficient operating model — where security scales with the business, not against it.

Our north star is simple:

Investigate and remediate every validated risk at the speed of AI.

Continuer la lecture

Twenty Years of Cloud Security Research

This post will look at the past 20 years of cloud security research, separating the two decades into eras with important milestones defined that resulted in the change of one era to the next.

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités