Managing NHIs in the enterprise
Enterprise concerns about managing non-human identities create channel opportunities


In March 2025, ITPro reported that almost 12,000 passwords and live API keys had been found in a dataset used to train large language models (LLMs). Security experts placed the blame on identity and access management processes that are failing to keep up with the introduction of new technologies. One commentator observed that credential leakage from machine-to-machine authentication is a long-standing and growing risk.
Two weeks after the ITPro article, at our UNITE channel partner conference, I spoke to many consultants, CIOs, and CISOs who expressed deep concerns about the management of non-human identities (NHIs).
NHIs have proliferated as a result of the integration of various products within the enterprise, the introduction of service accounts as part of process automation, IoT, and the advent of robotic process automation. These systems all need to be authenticated to be able to talk to each other. This introduced a slew of non-human identities that have access to enterprise systems and exposure to third parties, and which need to be governed as carefully as human identities.
Identity and access management has certainly become more complex owing to the proliferation of OAuth tokens, API keys, service accounts, and certificates. While employees’ access is managed and revoked via an organization’s joiner, mover, and leaver processes, when it comes to machine-to-machine authentication, many tokens are not revoked for months on end. The lack of visibility and control over orphaned tokens can create an unprotected attack surface for bad actors.
Depending on which report you read, NHIs within the typical enterprise now outnumber employees, customers, and contractors by a factor of 10:1. Some have even calculated this at 92:1 for large enterprises with multiple automated processes.
However, I see more opportunities than obstacles.
The evolution of identity ecosystems presents a clear opportunity for channel partners to add value to their enterprise customers by objectively quantifying the risk and providing visibility of all the NHIs associated with security, authorization, and authentication.
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
Enterprises need to know what types of NHIs have access, what roles they perform, which tokens have not been rotated, and which are idle.
Channel partners can help their enterprise customers to take that first step by auditing the NHI estate and providing recommendations that enable a structured NHI governance model to be created.
The application of agentic AI within enterprises opens up the potential to use machine learning data in a productive way to enhance IAM for human and machine identities. What’s currently missing is the management and governance of agentic AI in a way that’s comprehensive.
So, the next point of value that channel partners can bring is customized integrations. A lot of the tooling that their enterprise customers have invested in doesn’t integrate out of the box. As an example, Identity, Governance, and Administration (IGA) solutions support centralized policies and automated workflows that help reduce operational costs while ensuring that employees can access the resources they need.
IGA solutions are now using machine learning. Threat detection and response uses AI too. The disaster recovery practice also has its machine learning and AI.
Because all of these agentic AI tools don’t yet interact seamlessly, channel partners could deliver the required customization. This will allow each AI system to accept triggers from the others and provide greater overall visibility of the IAM ecosystem. That’s a huge opportunity for the channel to step in and help enterprises manage the risk from NHIs, while enabling them to deliver analytical insights like never before.

Robert has more than three decades of security experience, with a specialization in Identity security.
His responsibilities include working with customers to develop a strategy to solve their security challenges as well as helping set the future direction of the One Identity portfolio.
Over the years, Robert has implemented solutions and advised customers in all major industries as well as local, state and federal governments.
-
Apple just released an emergency patch for a zero-day exploited in the wild
News Apple is warning millions of users of iPhones, iPads and Macs to update their software to protect against an out-of-bounds write vulnerability
-
Google's new Jules coding agent is free to use for anyone – and it just got a big update to prevent bad code output
News Jules came out of beta and launched publicly earlier this month, but it's already had a big update aimed at improving code quality and safety.
-
Passwords are a problem: why device-bound passkeys can be the future of secure authentication
Industry insights AI-driven cyberthreats demand a passwordless future…
-
Cybersecurity complexity and the channel
Industry Insights Channel partners must tackle cybersecurity complexity to drive outcomes and build trust
-
The rise of GhostGPT – Why cybercriminals are turning to generative AI
Industry Insights GhostGPT is not an AI tool - It has been explicitly repurposed for criminal activity
-
How the IT channel can help on the route to cybersecurity regulatory compliance
Industry Insights New regulations have transformed the cybersecurity landscape and the channel has an important role in helping organizations adapt
-
Strategies for guarding against emerging cyber risks and invisible threats
Industry Insights Attacks are evolving at a rapid pace, here are the key areas where the channel can help businesses bolster their defenses for the year ahead
-
The AI challenge for the channel
Industry Insights The democratization of AI has forced channel partners to evolve from security product resellers to strategic cyber resilience advisors
-
How the channel can simplify cybersecurity to build trust and agility for SMBs
Industry Insights There's an opportunity for the channel to move from tech resellers to trusted advisors on security and help alleviate the security burden on SMBs
-
Elevating compliance standards for MSPs in 2025
Industry Insights The security landscape is set to change significantly in the years to come with new regulations coming into effect next year, here's how the channel needs to adapt