Market Cap: $3.5162T 2.070%
Volume(24h): $163.1221B -7.100%
  • Market Cap: $3.5162T 2.070%
  • Volume(24h): $163.1221B -7.100%
  • Fear & Greed Index:
  • Market Cap: $3.5162T 2.070%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$111233.607824 USD

0.62%

ethereum
ethereum

$2710.400604 USD

4.44%

tether
tether

$0.999989 USD

0.01%

xrp
xrp

$2.466558 USD

2.62%

bnb
bnb

$689.250459 USD

0.85%

solana
solana

$183.771663 USD

5.32%

usd-coin
usd-coin

$0.999812 USD

0.00%

dogecoin
dogecoin

$0.251507 USD

4.57%

cardano
cardano

$0.827639 USD

5.75%

tron
tron

$0.274246 USD

1.47%

sui
sui

$3.897754 USD

-2.37%

hyperliquid
hyperliquid

$35.462900 USD

17.82%

chainlink
chainlink

$17.006311 USD

4.47%

avalanche
avalanche

$25.733231 USD

9.34%

stellar
stellar

$0.310183 USD

4.44%

Cryptocurrency News Articles

Token Security launched Model Context Protocol (MCP) Server for non-human identity (NHI)

May 23, 2025 at 03:44 pm

This capability brings the power of agentic AI to modern security operations and enables teams to interact with complex NHI data using simple, natural language.

Token Security launched Model Context Protocol (MCP) Server for non-human identity (NHI)

Token Security, a startup providing an identity threat detection and response platform, announced Model Context Protocol (MCP) Server for non-human identity (NHI). This capability brings the power of agentic AI to modern security operations and enables teams to interact with complex NHI data using simple, natural language.

The Token MCP Server leverages the open-standard Model Context Protocol to bridge large language models (LLMs) with enterprise identity data, delivering intelligent insights and guided remediation through a conversational interface.

Security teams can now ask questions and make requests, such as:

* "What is the riskiest service identity and why?"

* "An instance was compromised yesterday. Provide steps to mitigate the risk."

* "Which identities have vulnerable credentials and how can I rotate them?"

The AI-driven response will provide detailed answers and remediation guidance specific to the customer environment, identities, and data.

“This launch is a major step toward agentic security operations,” said Nissim Pariente, CPO at Token Security. “By combining the power of AI with deep identity context, we’re turning natural language into real-time, actionable, autonomous, and environment-specific action.”

“This is a game-changer for security teams,” said Tamir Ronen, CISO at HiBob. “Token MCP will turn time-consuming investigations into quick, AI-driven insights and a mitigation plan. This will save hours of identifying, prioritizing, and automating risk remediation.”

Unlocking visibility and actionability at scale

Token MCP brings two critical capabilities to security teams:

* Enhanced visibility: By aggregating context from identity posture risks to usage patterns and ownership data, Token MCP delivers a prioritized, holistic view of machine identity risk across environments, from cloud to on-premises.

* Smarter remediation: Token MCP provides precise, customer-specific remediation guidance, including CLI commands, scripts, and explanations tailored to each environment, empowering teams to resolve issues faster and more confidently.

Designed for the tools security teams already use

Token MCP integrates seamlessly with leading AI chat platforms, such as Claude, ChatGPT, and Gemini. Security teams can interact with their data from the tools they already rely on and trust, without needing to learn new languages or sift through complex dashboards.

In early customer deployments, Token MCP has demonstrated value across key use cases:

* Quickly identify and prioritize the riskiest service identities and factor in the rationale.

* Provide a step-by-step plan to mitigate a compromised instance with customer-specific commands and scripts.

* Grant permission to specific identities to access resources using natural language requests.

* Generate code to rotate credentials for vulnerable identities.

These capabilities reduce investigation time, accelerate response, and make complex identity challenges approachable.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on May 23, 2025