The market for the so-called Agenic SOC - or IA agents for security operations centres - is in the middle of a boil. Over the past 18 months, dozens of initiatives have emerged that promise to ease the overload of alerts, automate research and give analysts time for strategic tasks. Part of that promise is real, but there is also a lot of commercial noise around capabilities that in practice are not always translated into real risk reduction. That is the central warning of a recent Gartner report that it is appropriate to pay attention to if you are assessing such solutions: accelerated adoption does not guarantee measurable results if it is not rigorously evaluated. You can download the available version through the company's website that shared the summary Here..
Before falling into the glowing demo trap, it is appropriate to start with the basics: which concrete processes of your SOC consume time and bring little value? The evaluation should be based on the operating bottlenecks, not on the supplier's list of functions. An agent who shines in a laboratory may be solving problems that your team already has solved by other ways; what you are looking for is that it automates or improves repetitive tasks that actually release work hours and improve the quality of research, not just the apparent speed.

Measuring success exclusively by the number of processed alerts is a usual error. Processing more alerts does not amount to reducing the risk if the quality of the inquiries gets worse or if the false negatives grow. Instead, the evaluation should focus on metrics that matter for risk mitigation: average detection and response times, reduction of false positives and, above all, time to effective incident containment. The qualitative results also include: Is there an improvement in the performance and confidence of analysts? Ask for real benchmarking of customers with environments similar to yours and check whether these data come from concept tests or sustained production deployments.
Another point that should not be underestimated is the risk of the supplier. This category is dominated by young companies with very different approaches, which feeds innovation but also uncertainty about continuity and financial stability. Before signing, he asked about the commercial maturity of the product, the customer base and the financial health of the supplier. Accepting that there will be consolidation and procurement is reasonable, but it must be managed as a third-party risk, not as an immutable fatality. It also reviews the price model with magnifying glass: some products charge by volume of alerts, others by volume of data or LLM tokens; under high loads costs can scale unforeseeable.
The IA promise for SOC includes an important bet on the professional development of the teams. It's not just about the machine doing the job, it's about the machine doing it in a way that analysts learn and evolve. The best deployments combine automation and implicit teaching, showing reasoning, consultations and sources for a junior analyst to understand how a conclusion was reached and, over time, to undertake more complex research. Here it is appropriate to assess what training resources the supplier offers and whether the tool facilitates detection engineering, threat hunting and continuous improvement of rules and detections.
The agent's autonomy is another key chapter. Gartner distinguishes between models with "human in the loop," which require human approval for each action, and models with "human on the loop," which allow the IA to act with strategic monitoring. There is not a single correct answer: it depends on your appetite for risk, your regulation and the maturity of the solution. The essential thing is that the rules on what the IA can do, what it requires scaling and how the guards are applied are configurable and audible. In situations of ambiguity, design philosophy should encourage safe climbing against automatic action, because the mistakes in the limits are the ones that can cause the most damage.
Technological integration is a practical friction that decides many projects. Suppliers assume integration with IMS, EDR, SOAR and identities, but the real depth of such integration varies and should be checked in environments equivalent to yours. A critical question is whether the solution requires centralizing all your data to function or can operate by consulting multiple origins without moving mass of information. For hybrid or distributed architectures, this difference determines the operational complexity of the deployment.
And we come to the point that most conditions the adoption by the teams: transparency. An agent who delivers verdicts without showing how it got to them leaves analysts in an uncomfortable position: accepting blind or redoing the investigation. Human-readable explanations and traces are essential for trust and governance. In regulated sectors this is not an extra, it is a requirement. It seeks solutions that document queries, data consulted and logical steps in each research and that allow for the audit and feedback of the system without exposing sensitive data in an unsafe manner. The risk management guides of IA, such as those of the NIST, can serve as a reference for designing controls and governance frameworks that accompany these technologies ( NIST - AI).
If we extend the look, the practical recommendation is clear: do not let the marketing noise dictate a strategic purchase. These tools can transform the SOC operation, but taking this value requires results-focused evaluation processes, real-life testing and a plan to integrate technology into the workflows and the team culture. Tools like the MITRE ATT & CK framework help connect detections and processes with known threats ( MITRE ATT & CK), while resources from agencies such as CISA provide context on risks and good practices in critical environments ( CISA - IA).

The figure provided by Gartner is illustrative of the challenge: many organizations will test agents IA in the coming years, but few will achieve measurable improvements if the evaluation is limited to volume metrics. To stop being a promise and become an effective tool, you have to measure containment, research quality, human learning and the supplier's economic sustainability. In this way, there are suppliers that design transparency as a principle and seek to integrate without requiring centralization of all data; they should be considered, tested with real scenarios and demand reproducible evidence before they are deployed on a scale.
If you are in charge of the purchase, take this as an invitation to put in the center the operational evidence, traceability and formation of your people. Technology can increase the scope of security equipment, but only if the introduction is governed by clear, metric targets that measure risk reduction and a plan to preserve and enhance human knowledge behind each detection.
For those who want to look into the questions that Gartner recommends and the full guide to evaluating these agents, the above-mentioned report is available on the page that distributes it. Here.. Also, if you are looking for management frameworks and controls for IA to help you establish governance, check NIST's risk resources in IA ( NIST TO RMF).
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...