Tuskira has launched a fully autonomous AI Analyst Workforce designed to simulate threats, validate security controls, and take action against adversarial AI across SIEM, EDR, identity, and firewall tools.
The new solution introduces a fleet of specialist AI agents for different stages of the detection-to-response workflow, replacing much of the manual effort required by security teams with automated, goal-driven systems. According to Tuskira, this advancement moves security automation beyond current agentic AI and provides a dedicated AI analyst for every significant step in the detection and defence process.
The platform aims to tackle high-priority cybersecurity issues, including the rise of AI-facilitated attacks and the operational impacts of alert fatigue and analyst burnout. Tuskira's system enables both human-machine collaboration and fully autonomous execution in areas such as triage, validation, and rapid response. The company states that its AI Analysts have the capacity to simulate real-world cyberattacks, assess the robustness of defensive measures, and autonomously respond across multiple security technologies.
Piyush Sharma, Chief Executive Officer and co-founder of Tuskira, highlighted the challenges security teams face. "Security teams are overwhelmed because they lack the time and resources to respond to what they're detecting fast enough," said Sharma. "Tuskira replaces manual triage with an autonomous AI workforce that validates exposures, closes the loop from detection to defense, and keeps teams ahead of threats, without burning them out."
Among its features, the solution provides Autonomous SIEM Optimisation, which continually evaluates detection coverage, enriches alerts with context, and modifies rules to cut down on false positives and eliminate any blind spots. Tuskira says this upgrade can replace static detection mechanisms with adaptive, evolving defences—reducing the demand for ingesting superfluous log data and improving the cost-efficiency of security operations.
Highlighting the business impact, early users of Tuskira's platform have seen a 99% reduction in alert noise and a 50% faster response to threats. Further metrics include an 80% reduction in manual triage caused by automated signal enrichment and a 50% reduction in operational costs by supplementing existing staff with AI Analysts.
Tuskira's AI Analyst Workforce includes purpose-built agents mapped to the traditional roles found in security teams such as VM, SOC, GRC, and AppSec, delivering measurable KPIs for each. Each specialised AI Analyst operates across the stack, leveraging AI-curated data from over 150 security tools and a digital twin of the client's digital environment to identify real risks and prompt necessary actions.
The core analysts within the automated roster include a Zero-Day Analyst for detecting new attack types using anomaly models and threat intelligence and providing proactive mitigation with current controls. The Threat Intel Analyst works to correlate emerging indicators of compromise and tactics, techniques, and procedures with internal telemetry to uncover stealthy threats in context.
Other specialised roles encompass the Defence Optimisation Analyst, tasked with real-time simulation of threats and tuning controls; the Vulnerability Analyst, which assesses the true risk of vulnerabilities; and the Alert Analyst, which handles alert triage and generates remediation actions for risks such as lateral movement and exposed credentials.
Tuskira's technology incorporates continuous Autonomous SIEM Optimisation intended to ensure that the system adjusts dynamically to changing threats, continuously enriching threat alerts and tuning security rules. This is designed to support teams in maintaining high signal fidelity without an excess of false alarms or unnecessary data ingestion.
The firm identified urgent priorities for their platform as preventing breaches through AI-powered Continuous Threat Exposure Management, analysing and responding to zero-day threats with behaviour-based intelligence, and improving alert investigation and resolution across identity, endpoint, and infrastructure domains.
The company's mission, as stated, is to deploy self-learning AI analysts that maintain and manage cybersecurity risks, turning static defences into adaptive, self-tuning systems. Tuskira's agents work to autonomously analyse incoming threats and vulnerabilities, validate and optimise defences in real-time, and manage exposures continuously to speed up response, strengthen protection, and reduce operational costs in line with the evolving threat environment.
Whether organisations are coping with advanced cyber threats, high alert volumes, or the need to prioritise vulnerabilities, Tuskira's suite of AI Analysts is positioned to help address these tasks without the typical complexity or strain experienced by human teams.