As enterprises accelerate AI adoption across copilots, assistants, and automated workflows, securing these systems from data ingestion to runtime operations has become a critical challenge. A new alliance between F5 and Forcepoint aims to bridge this gap by delivering unified protection across the entire AI lifecycle.
F5 and Forcepoint have announced a strategic partnership to help organizations secure AI environments from initial data discovery and classification through runtime protection and continuous assurance. The collaboration brings together Forcepoint’s AI driven data security posture management capabilities with F5’s application security and runtime protection technologies, creating a more integrated approach to managing AI risk.
The need for this partnership stems from a growing disconnect in enterprise security strategies. While data governance, application security, and runtime controls are all essential, they often operate in silos. This fragmentation makes it difficult for organizations to understand where sensitive data resides, how it flows through AI systems, and how risks evolve once AI applications are deployed in production.
By combining their technologies, F5 and Forcepoint aim to eliminate these gaps. Forcepoint provides deep visibility into sensitive data across cloud, SaaS, endpoint, and enterprise environments, enabling organizations to classify and prioritize data based on risk. This foundation allows enterprises to determine which data can be safely used in AI applications and which requires stricter controls.
F5 extends this capability into runtime environments by enforcing policies across APIs, applications, and AI systems. Its platform includes AI red teaming and guardrails that help detect prompt abuse, prevent data exfiltration, and secure AI models against emerging threats. Together, these capabilities allow organizations to monitor AI behavior in real time while maintaining alignment with governance policies.
“Enterprises are moving AI initiatives from experimentation to production faster than most security programs can adapt,” said John Maddison, Chief Marketing Officer at F5. “By combining Forcepoint’s deep data intelligence and contextual awareness with F5’s advanced application security and runtime protections, organizations eliminate operational security gaps with unmatched confidence and control in their AI operations. As AI’s threat surface continues to expand, the combined power of DSPM technologies with F5’s AI Red Team and AI Guardrails equips enterprises with proactive tools to securely scale and govern AI at every stage of its lifecycle.”
“AI has fundamentally redefined data security, exposing static policies for what they are: inadequate,” said Naveen Palavalli, Chief Product and Marketing Officer at Forcepoint. “F5 and Forcepoint are establishing a new standard of continuous, adaptive protection that follows data from the moment of creation through every stage of its lifecycle, including the runtime layer where AI systems operate, evolve, and expand risk vectors. The threats AI brings require a new category for proactive data and AI risk mitigation, and our partnership is delivering on this today.”
The partnership also introduces continuous telemetry and policy validation, ensuring that AI systems operate securely over time. By aligning data intelligence with runtime enforcement, the solution helps organizations move from understanding their data landscape to actively protecting it during AI execution.
With this collaboration, F5 and Forcepoint are addressing one of the most pressing challenges in enterprise cybersecurity. By connecting data security with application and runtime protection, they are offering a practical path for organizations to scale AI adoption while maintaining visibility, control, and compliance in an increasingly complex digital environment.
Recommended Cyber Technology News:
- Ridge Security Launches PurpleRidge 3.0 with Autonomous AI Pentesting
- ESET Expands PROTECT Platform With Cloud Security Tools
- Dell Unveils Quantum-Ready Security and AI-Driven Cyber Resilience Enhancements
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





