Explore the C1 Academy
Back to C1 Academy

Types of AI Agents

AI and Identity
4 min

Speaker: Paul Querna CTO, Co-founder ConductorOne

Learn about the three primary types of AI agents—company agents, personal agents, and SaaS-based agents—and how each impacts identity security, access control, and enterprise risk.

Main Takeaways

  • Company agents act like digital employees, aligned to job roles and requiring structured access similar to human team members.

  • Personal agents assist individuals with productivity tasks and typically need limited, short-term access to complete specific jobs.

  • SaaS-based agents are built into third-party tools and often operate autonomously, moving data between systems.

  • All types of agents increase the total number of identities organizations must manage and secure.

  • Managing agent access requires task-based authorization and tighter controls to avoid overprovisioning.

  • As AI agents proliferate, identity governance must evolve to handle their scale, context, and security boundaries.

Learn More


/images/key-takeaways-from-the-2025-identity-security-outlook-report-1.jpg

The State of Agentic AI in Identity Security

Security leaders aren’t just experimenting with AI—they’re rapidly integrating agentic AI into high-stakes workflows like identity provisioning and network defense. ConductorOne’s 2025 Identity Security Outlook Report reveals that urgency is driving adoption, but with thoughtful strategies and real concern for risk.

/images/2025-3rd-ai-id-problem.jpg

The AI Identity Problem

AI agents are changing the identity landscape, but legacy IAM systems weren’t built for them. These fast-moving, ephemeral identities require dynamic access, machine-speed decisions, and a new model of governance. In this post, we break down the AI identity problem—and what it takes to solve it.

/images/2025-ai-wave-1.jpg

The Divergent AI Landscape: Making Sense of Agentic AI

Explore the evolving world of agentic AI. Learn the three core types of AI agents—company, employee, and agent-to-agent—and the identity, security, and governance challenges they introduce.