What the AI Vendor Landscape Reveals About Fragmented Identity Systems
You can Subscribe and Listen to the Podcast on Apple Podcasts, or wherever you listen to Podcasts.
And be sure to leave me a Rating and Review!
Starting with the problem, not the label
-
What inputs does their product seem to rely on?
-
What output does it produce?
-
Where does that output get used?
Patterns emerge at the boundaries
-
Identity: who or what is acting
-
Signals: what is happening or being observed
-
Policy: what should be allowed
-
Enforcement: how that decision is applied
-
Execution: what actually occurs as a result
The implicit system behind the architecture
A shift in how to think about identity systems
Why start here
Transcript
Introduction
Welcome to another edition of the Digital Identity Digest, the audio companion to the blog at Spherical Cow Consulting. In this episode, we explore a surprisingly revealing journey into the AI vendor landscape—and what it uncovers about modern identity systems.
At first glance, this topic may seem like yet another take on AI hype. However, as you’ll see, the real story runs deeper. It’s not just about artificial intelligence—it’s about how decisions are made across fragmented systems.
A Different Way to Look at the AI Market
Over the past few years, AI has become impossible to ignore. It shows up everywhere:
- Conference presentations
- Vendor pitch decks
- Product rebrands
- Industry panels
Tools that were once labeled as:
- Analytics platforms → now “AI-driven analytics”
- Workflow tools → now “intelligent orchestration engines”
- Detection systems → now “autonomous decision systems”
Sometimes, these changes reflect real innovation. Other times, they are simply marketing.
So instead of asking “Is this really AI?”, a more useful question emerged:
- What function does this product serve?
- What problem is it trying to solve?
This shift in perspective turns out to be far more insightful.
Breaking Down Vendor Functionality
To better understand the landscape, each product was evaluated using three simple questions:
- What inputs does it rely on?
- What outputs does it produce?
- Where are those outputs used?
Once you strip away the buzzwords, patterns begin to emerge.
Most systems rely on inputs such as:
- Identity data
- Behavioral signals
- Device information
- Policy rules
- Human approvals
And they typically produce outputs like:
- Risk scores
- Allow or deny decisions
- Alerts
- Tokens
- Workflow triggers
From there, you can determine where each tool fits within a broader ecosystem.
The Hidden Structure of Identity Systems
As vendors were mapped based on behavior, a clear layered structure appeared. Most tools fall into one of the following roles:
Identity Layer
Focuses on defining who or what is involved:
- Users
- Devices
- Workloads
- Service accounts
Signal Layer
Answers the question: What is happening right now?
- Login anomalies
- Device changes
- Behavioral deviations
Policy Layer
Determines: What should happen next?
- Access decisions
- Authentication requirements
- Risk-based controls
Enforcement Layer
Executes decisions:
- Blocking sessions
- Granting tokens
- Triggering step-up authentication
Execution Layer
Handles outcomes:
- Completing transactions
- Triggering workflows
- Moving data
At first glance, this looks like standard architecture. However, the reality is far more complex.
Why Fragmentation Matters
Although these layers appear neatly organized, they are deeply interconnected:
- Identity influences signals
- Signals inform policy
- Policy drives enforcement
- Enforcement shapes execution
- Execution generates new signals
In other words, these tools don’t operate independently—they form a distributed decision system.
This distinction is critical.
Because when decisions are distributed:
- No single tool owns the outcome
- Quality depends on integration, not just performance
- Failures can occur at the seams between systems
And that’s where things start to break down.
The Illusion of Order
A typical enterprise access flow might look clean and logical:
- A user logs in
- Identity is validated
- Device posture is checked
- Risk is assessed
- Policy is applied
- Access is granted or denied
Historically, these systems were deterministic, meaning:
- Same inputs → same outputs
- Decisions are predictable
- Auditing and governance are possible
Even risk-based systems followed controlled logic.
However, behind the scenes:
- Components come from different vendors
- Systems are deployed at different times
- Teams manage separate pieces
- Data is interpreted inconsistently
As a result, decisions are often assembled through:
- Integrations
- Middleware
- Scripts
- Workarounds
- Institutional knowledge
It works—but it’s fragile.
Enter AI: A New Layer of Complexity
Now, AI enters the picture.
Modern environments may include:
- AI models summarizing alerts
- Systems scoring behavioral anomalies
- Tools recommending policy changes
- Automation engines executing responses
- Models classifying users or workloads
These capabilities can deliver real value. However, they also introduce a fundamental shift.
Instead of deterministic outputs, we now see probabilistic results, such as:
- “Model confidence suggests elevated risk”
- “Behavior indicates probable misuse”
- “Action resembles prior abuse”
This creates a mismatch.
Because most organizations still rely on:
- Deterministic controls
- Clear audit trails
- Predictable outcomes
The result? Increased uncertainty.
The Risk of “Magical Thinking”
It’s important to be clear—this is not an anti-AI argument.
AI can:
- Improve detection
- Handle scale
- Reduce manual workload
However, it is not a magic solution.
If anything, AI can:
- Amplify fragmentation
- Obscure decision logic
- Introduce inconsistency
In poorly structured environments, AI doesn’t create clarity—it accelerates confusion.
Rethinking Identity as a Decision System
This research leads to a critical realization:
Organizations are not just running identity systems or security tools.
They are operating a decision system that determines:
- Who can act
- What they can do
- When they can do it
- Under what conditions
- With what level of trust
This was always true.
What’s changed is that now:
- More decisions are inferred, not explicitly defined
- More outputs are opaque
- More logic is difficult to explain
That shift demands new thinking.
Better Questions to Ask
Instead of asking whether a product “has AI,” focus on deeper questions:
- Does the system produce consistent outcomes?
- Can decisions be explained after the fact?
- Are results reproducible?
- Do teams understand differences in outcomes?
- Can policy intent survive across multiple tools?
- Can automation drift be detected?
- Can humans safely override decisions?
- Are errors correctable and auditable?
These are not easy questions—but they are essential.
The Reality Behind Vendor Claims
Most vendor messaging avoids these complexities.
Instead, it emphasizes:
- “Unified platforms”
- “End-to-end solutions”
- “AI-powered intelligence”
In reality:
- Some platforms reduce complexity
- Others simply move it elsewhere
- Most enterprises remain hybrid environments
Because:
- Legacy systems persist
- Acquisitions happen
- Regulations vary
Fragmentation doesn’t disappear—it evolves.
Why This Matters Now
AI doesn’t create the fragmentation problem.
It exposes it.
And in many cases, it makes it harder to manage.
This creates an important opportunity:
- To rethink how decisions are made
- To design better system interactions
- To improve governance across layers
Because ultimately:
If you cannot explain how decisions are made today, adding AI tomorrow won’t fix that.
Final Thoughts
As you evaluate AI in identity or security, start with one simple question:
What decision is this system actually helping you make?
If that answer isn’t clear, pause.
Because the real risk isn’t adopting AI—it’s adopting it without understanding the system it operates within.
Looking Ahead
This topic goes far beyond a single discussion. Future explorations will dive into:
- How decisions are assembled across fragmented systems
- Where integration points fail
- What standards can (and cannot) solve
- What happens when systems disagree
Because in the end:
The system that wins a conflict defines your true architecture—not the diagram.
Conclusion
If this helped clarify the landscape—or at least made it more interesting—consider sharing it with a colleague.
Stay curious, stay engaged, and keep asking better questions about how decisions are really made.
