LLM / Prompt Layer Firewall
Governs what goes into and out of the model. Invisible to everything the model decides to do.
A structural analysis of what 50 agentic AI security vendors cannot see, and why each blind spot is architectural, not a roadmap gap.
The agentic AI security market has produced at least 83 distinct vendors in under 24 months. Every vendor publishes capability matrices. None has published a rigorous map of what their architecture structurally cannot see.
This document does exactly that.
Across 50 companies tracked by Behavry, we identify nine recurring architectural patterns. Each pattern has a structural blind spot. A class of risk it cannot address regardless of how mature the product becomes. These are not roadmap gaps. They are consequences of where the vendor chose to sit in the stack.
The central finding: every pattern except inline pre-execution enforcement fails to address the same problem. The tool call that already executed. And every pattern except one inherits a second structural flaw: the entity that acts is also the entity that attests to its own behavior.
That is not governance. That is forensics with a compliance badge.
The philosophical anchor for this analysis is a single structural requirement.
When an AI agent logs its own actions, generates its own audit trail, and reports itself as compliant, the compliance record is produced by the same system being governed. This is structurally equivalent to a defendant writing their own verdict.
Every architecture that instruments the agent itself, including SDK hooks, eBPF sensors, sidecar monitors, and LLM-layer guardrails, inherits this flaw. The agent is the source of truth about what the agent did. The observer and the observed are the same entity.
An inline governance layer positioned between the agent and its tools is the only architectural position from which chain-of-custody can be independently attested. The proxy acts; it is never the agent. Its log is produced by a separate system. That separation is the structural moat.
The following patterns are derived from public architectural claims, documentation, and investor materials for each vendor. We take each vendor at their word and draw the structural implications.
Governs what goes into and out of the model. Invisible to everything the model decides to do.
Governs what software reaches the endpoint. Cannot govern what authorized software does once it runs.
Governs who the agent is and what it can reach. Cannot govern what it does once it gets there.
The dominant pattern. Watches everything. Prevents nothing. Produces forensics, not governance.
Governs which tools agents can access. Partially blind inside authorized connections.
Strong governance within one platform. Zero visibility outside it.
Finds vulnerabilities before deployment. Provides zero runtime enforcement.
Governs which AI tools employees can use. Cannot govern what autonomous agents do.
Provides durable execution and audit trail. Is not a policy enforcement engine.
Nine patterns. Nine structural blind spots. One structural requirement that all nine fail to satisfy.
This requires three architectural properties that no other pattern provides simultaneously.
The Attestation Separation Principle is the architectural requirement that nine of the ten patterns violate. Only an inline governance proxy, positioned between agent and tool, with independent log production and cryptographic hash chaining, satisfies all three properties.
This is not a product positioning claim. It is a structural consequence of where each architecture chooses to sit in the stack.
Ten patterns mapped against their enforcement point, core blind spot, and whether they can block a tool call before it executes.
| # | Pattern | Enforcement Point | Core Blind Spot | Can Block Tool Call? |
|---|---|---|---|---|
| 01 | LLM Firewall | Model input/output | All tool-call execution | No |
| 02 | Supply Chain | Pre-install artifact scan | Post-authorization execution | No |
| 03 | Identity / JIT | Credential provisioning | Inside the access window | No |
| 04 | Observe & Detect | Post-execution log analysis | Prevention entirely | No |
| 05 | MCP Gateway | Server/tool authorization | Inside authorized connections | Partial |
| 06 | Platform-Native | Within-platform lineage | All out-of-platform agents | Partial |
| 07 | Red Team / Testing | Pre-deployment probing | Live runtime enforcement | No |
| 08 | Workforce AI Gov. | Employee tool access | Autonomous agent behavior | No |
| 09 | Workflow Orch. | Durable execution state | Policy enforcement entirely | No |
| 10 | Inline Governance | Tool-call execution layer | None (full coverage) | Yes |
Understanding the blind spot taxonomy produces three immediate implications for the CIOs, CTOs, and platform leaders responsible for AI deployment.
Most vendor conversations are organized around capabilities: what does your tool detect? What policies can you enforce? The structurally important question is where does enforcement happen? Any tool that answers with a variation of we monitor, we detect, we alert, or we instrument is Pattern 4, regardless of how sophisticated the detection is.
Combining Pattern 3 (identity) and Pattern 4 (observe-and-detect) produces a deployment story that looks comprehensive on a capability matrix and leaves the same structural gap: the tool call that executed inside the authorized window. Stacking incomplete tools does not make AI deployment safer.
The difference between a governance record and a forensic record is who produced it. An audit log produced by the governed system is self-attestation. An audit log produced by an independent, inline layer with cryptographic integrity is the only record that survives board-level scrutiny, regulatory examination, and adversarial review. If your audit comes from the agent itself, your board cannot trust it.
The EU AI Act, NIST AI RMF, and emerging enterprise procurement requirements are converging on the same question: can you prove the agent did what you say it did, from a record that the agent could not have altered? The answer determines whether an organization has governance or the appearance of governance.
Architecture classification for each of the 50 companies in this analysis, based on publicly available architectural documentation, product pages, and investor materials. Classifications reflect the vendor's primary enforcement pattern as of April 2026.
| Company | Architecture Notes |
|---|---|
PATTERN 01LLM / Prompt Layer Firewall4 vendors | |
| CalypsoAI | Inference platform security; red-team + guardrails at model layer |
| Cato Networks | SASE + AI-FW module; network-layer AI traffic control |
| Lakera | Guard API; prompt injection / jailbreak detection; invisible to tool calls |
| Prompt Security | MCP transport security; AI firewall at model I/O layer |
PATTERN 02Supply Chain / Artifact Governance3 vendors | |
| Cisco DefenseClaw | Open-source RSAC 2026; scans before run; sidecar runtime plugin |
| Cycode | Agentic development security; shift-left SDLC for AI |
| Koi / Palo Alto | Artifact scan before install; blind post-authorization |
PATTERN 03Identity / JIT Access Control10 vendors | |
| Aembit | Workload identity; secretless access; Agentic IAM with no stored secrets |
| Agentic Fabriq | AI agent identity and governance layer |
| Astrix Security | 4-method discovery + Agent Control Plane; NHI-first, JIT credentials |
| CyberArk | PAM + AI Agent Gateway; ZSP credentials; blind inside the window |
| Cyata | Agent identity control plane; credential governance |
| Hush Security | NHI + secretless access + agent identity; credential plane |
| Keycard | Agent identity infrastructure; credential plane |
| Oasis Security | Pioneer NHI / AAM; JIT session identities, not tool-call layer |
| Ping Identity | Identity for AI GA Mar 2026; Agent Gateway + JIT; identity plane only |
| SGNL (CrowdStrike) | Continuous authorization; ZSP; context-aware access revocation |
PATTERN 04Observe-and-Detect / Runtime Monitoring10 vendors | |
| Acuvity / Proofpoint | RYNO platform; MiniProxy at transport layer; monitors, does not pre-block |
| AllTrue.ai / Varonis | Acquired Feb 2026 by Varonis; data-centric runtime monitoring |
| Capsule Security | AI agent runtime security; behavioral detection post-execution |
| Geordie AI | Observe-and-guide; RSAC 2026 Innovation Sandbox; behavioral understanding |
| Knostic (Kirin) | Knowledge-layer least privilege + runtime monitoring for coding agents |
| Manifold | Endpoint AIDR (AI Detection and Response); agent behavioral EDR |
| Noma Security | Discovery + posture + runtime protection |
| Portal26 | GenAI visibility / AI TRiSM; monitoring and audit |
| Straiker | eBPF / SDK / proxy multi-layer; MCP server is agent-invoked check |
| Zenity | AI-SPM + runtime threat protection; low-code agent focus |
PATTERN 05MCP Gateway / Access Registry6 vendors | |
| Akto | API security extended to MCP; transport and auth layer |
| JetStream Security | AI governance blueprints; access-layer governance |
| MintMCP | MCP hosting + gateway + monitoring |
| Onyx Security | Enterprise AI agent control plane; gateway-based |
| Runlayer | MCP server registry + SSO; governs connection, not execution |
| Traefik Labs | Triple Gate (API / AI / MCP); TBAC enforcement; governs connection layer |
PATTERN 06Platform-Native Governance6 vendors | |
| Arkeo AI | On-premise private AI agent deployment; deployment platform, not governance |
| Databricks | Unity Catalog governance; self-attesting within Databricks lakehouse |
| Kore.ai | Enterprise AI orchestration platform; in-platform governance only |
| MetaComp | AI-governed fintech payment compliance; domain-specific platform |
| Sana | AI knowledge platform; enterprise agent orchestration |
| TrueFoundry | Agentic AI gateway + LLM platform; platform-scoped governance |
PATTERN 07Red Team / Adversarial Testing4 vendors | |
| Enkrypt AI | AI security and compliance; red-teaming + supply chain posture |
| IriusRisk / ThreatModeler | AI-enhanced threat modeling; design-time risk, not runtime enforcement |
| Novee | AI penetration testing; offensive security, not runtime governance |
| SPLX | AI red teaming + runtime protection; adversarial testing focus |
PATTERN 08Workforce AI Governance3 vendors | |
| Certiv | Endpoint runtime assurance for AI tools |
| Nudge Security | SaaS / AI governance; employee AI tool discovery and policy |
| Seraphic Security | Browser runtime; governs employee AI tool use in browser |
PATTERN 09Workflow Orchestration2 vendors | |
| Serval | Agentic IT operations; process automation; durable execution |
| Temporal | Durable workflow orchestration; audit trail via execution state, not policy engine |
PATTERN 10Inline Governance2 vendors | |
| Assury | MoCoP. OPA/Rego inline policy; cumulative risk graph; early stage, no attestation infrastructure |
| Behavry | Inline MCP proxy. OPA/Rego policy engine. SHA-256 hash-chained Decision Trace. Independent attestation by construction. |
50 vendors. Grouped by primary architectural pattern.
This taxonomy was produced by Behavry Inc. based on public architectural claims, product documentation, investor materials, and technical press coverage for each vendor listed. Behavioral claims attributed to each company reflect what the company says about its own product.
Behavry's position in Pattern 10 does not reflect a commercial claim. It reflects the structural architecture of the product: an inline MCP proxy that sits between agent and tool, evaluates every tool call against OPA/Rego policy before execution, and produces a SHA-256 hash-chained Decision Trace from a system that is never the agent.
Ward Spangenberg is the Founder and CEO of Behavry Inc. and the sole inventor on 12 provisional patents (March 15, 2026 priority date) covering inline agent governance architecture.