Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Long-running, unsupervised agents execute untrusted code, hold production credentials, and make real API calls. NVIDIA OpenShell makes that safer. Here's how Cohesity is applying it across AI resilience.
The real problem with autonomous agents is not privilege. It’s trust.
The next generation of AI is autonomous, long-running agents that plan, execute, and evolve over extended periods of time. As NVIDIA demonstrated at GTC 2026, agents now create their own sub-agents, develop specialized skills, and operate professional tools without human supervision. OpenClaw crossed 200K GitHub stars in just a few weeks, outpacing PyTorch and Linux. The agentic era is here.
But there is a foundational problem that the industry has not solved yet. It is not that agents need elevated privileges—most of what agents do works fine in user space. The problem is that useful agents may do things that are inherently unsafe, regardless of privilege level:
This is why the old model—“god mode agents with broad access trying to police themselves”— does not work. Rules that live inside the agent process can be bypassed. The safety layer must be outside the agent, not inside it.
NVIDIA OpenShell, part of the NVIDIA Agent Toolkit, solves this by applying a security model inspired by browsers. Each agent session is isolated. Every action is policy-enforced before it executes. The runtime implements guardrails and provides safety.
OpenShell is an open-source runtime that combines Linux kernel isolation with a programmable policy engine.
The environment is designed to be safe, even if the agent does not follow its own instructions. OpenShell enforces this at the runtime, where it cannot be bypassed.
At Cohesity, AI resilience is our vision for protecting the agentic enterprise through the entire lifecycle of a cyberattack or disruption: detect threats, validate that recovered systems are clean, and ensure continuity for the new generation of agentic AI workloads. Across all these functions, we are increasingly using AI agents to automate workflows that were previously manual, slow, and error prone.
But each of these workflows puts agents in contact with something potentially dangerous — untrusted code, production credentials, adversarial content, or compromised infrastructure. The pattern is the same: the agent automating a security-critical workflow must itself be protected from the threats it is designed to handle.
OpenShell gives us the runtime to do that. Here is how we plan to apply it across the many needs of AI resilience.
Cohesity Data Cloud performs threat scanning across backup snapshots using Google Threat Intelligence, including behavioral malware detonation via Google Private Scanning. When a scan surfaces suspicious files, infrastructure and security teams review behavioral reports—process activity, registry modifications, network calls, payload behavior—to decide whether the code is malicious or benign and then to restore or quarantine.
Today, much of this triage is manual. We are building AI agents that automate the workflow: scan backup snapshots at scale, identify unknown files, submit them for sandbox detonation, interpret the behavioral reports, and recommend recovery actions.
These agents handle adversarial content by design. A malware report describes what malicious code does: the processes it spawns, the network endpoints it contacts, and the registry keys it modifies. An agent processing this data—making API calls to Google Threat Intelligence, correlating IOCs across snapshots, holding Cohesity Data Cloud credentials—must be isolated from the rest of the environment. A prompt injection embedded in a knowledge base — that was itself compromised by malware—could subvert the triage agent if it runs unsandboxed.
OpenShell provides the isolation layer: the triage agent can access approved threat intelligence endpoints and Cohesity APIs per policy, but cannot reach production infrastructure, other agents, or external services. This way, the agent that orchestrates threat analysis is itself protected from the threats it analyzes.
Cohesity Data Cloud provides policy-based protection for data across on-premises data centers, edge sites, and public clouds (AWS, Azure, GCP). The policy is often derived from the characteristics of data and surrounding infrastructure. Agent access to varied resources exacerbates the already difficult problem of defining and enforcing such a policy.
The policy engine and runtime enforced permission in OpenShell would allow the Cohesity engine to suggest and apply needed protection between the agents and the enterprise resources they consume or transform. Cohesity can deduce the correct policy and permissions by combining previously known characteristics with new agent access patterns for data and resources in consideration.
Cohesity RecoveryAgent orchestrates incident response with blueprint-driven automation. AI agents increasingly drive these workflows, deciding which snapshots to recover, what scans to run, and how to sequence multi-tier application restores. They hold infrastructure credentials and execute scripts against recovered VMs that may contain dormant malware.
The protection provided by the OpenShell runtime is critical because a recovery test gone wrong—a compromised VM reaching back to the orchestrator, a malicious script phoning home —could pivot into the production environment. As a runtime, OpenShell restricts which endpoints the orchestration agent can reach, which credentials it can see, and what cross-agent communication is allowed. Recovery automation becomes safer to run frequently, which means more rehearsal, which means faster recovery when it matters.
The agentic ecosystem—the tools used for development and runtime of agents is growing faster than any team can build backup connectors by hand. We are exploring using long-running agents to develop prototype connectors to these platforms as we get requests to support new platforms, analyze their APIs, generate connector code, and validate backup and restore cycles autonomously. These agents install packages from public registries, hold platform credentials, and make authenticated calls to production APIs. OpenShell provides the isolation to make this safe: verified packages only, scoped credentials, approved network endpoints, and cross-agent containment.
We see OpenShell-style runtime containment as foundational to securing long-running agents. Compliance monitoring agents that evaluate data sovereignty policies. Data classification agents that scan unstructured content for PII. Capacity forecasting agents that interact with cloud billing APIs. Each follows the same pattern: the agent needs autonomy to be useful, but that autonomy must be bounded by guardrails the agent cannot override. OpenShell provides that boundary.
According to Gartner®, “33% of enterprise software applications will include agentic AI by 2028, up from less than 1% in 2024.” Additionally, Gartner predicts that by 2028, 25% of enterprise breaches will be traced back to AI agent abuse, from both external and malicious internal actors.
The common thread across all our use cases is that the agents automating security-critical work are themselves attack surfaces.
Long-running agents will enable 28 million professional developers and 1 billion knowledge workers to create self-evolving AI assistants. Every one of those agents will carry state that matters to the business: configurations, memory, workflow logic, and compliance policies. All of it needs protection. Cohesity’s goal is to make these agents resilient. The agents that deliver this resilience need a runtime that guarantees they cannot cause the very disasters they are designed to prevent.
NVIDIA OpenShell gives us that runtime. Not by restricting what agents can accomplish, but by enforcing where, how, and with whose credentials they operate. We are excited to be among the first to put it to work across AI Resilience.
Cohesity and NVIDIA are also working on NemoClaw, an open-source stack that simplifies running OpenClaw always-on assistants, more safely, with a single command. As part of the NVIDIA Agent Toolkit, it installs the NVIDIA OpenShell runtime—a secure environment for running autonomous agents, and open-source models like NVIDIA Nemotron.
Learn more:
Written By
Vasu Murthy
Chief Product Officer
Swami Ramany
GVP, Product Management