Perly Consulting │ Beck Eco

The State of Play

A living index of AI adoption across industries — where established practice meets the bleeding edge
UPDATED DAILY

The AI landscape doesn't move in one direction — it lurches. Some techniques leap from experiment to table stakes in a single quarter; others stall against regulatory walls, technical ceilings, or organisational inertia that no amount of hype can dislodge. Knowing which is which is the hard part. The State of Play cuts through the noise with a rigorously maintained index of AI techniques across every major business domain — classified by maturity, evidenced by real-world adoption, and updated daily so you always know where you stand relative to the field. Stop guessing. Start knowing.

The Daily Dispatch

A daily newsletter distilling the past two weeks of movement in a domain or two — delivered to your inbox while the index updates in the background.

AI Maturity by Domain

Each dot marks the weighted maturity of practices within a domain — hover for a brief summary, click for more detail

DOMAIN
BLEEDING EDGEESTABLISHED

Identity & access anomaly detection

GOOD PRACTICE

TRAJECTORY

Stalled

AI that detects anomalous authentication and access patterns indicating compromised credentials or insider threats. Includes impossible travel detection and privilege escalation alerting; distinct from zero-trust policy enforcement which defines access rules rather than detecting violations.

OVERVIEW

Identity and access anomaly detection is a proven practice with a stubborn effectiveness gap. ML-driven behavioral analytics -- flagging impossible travel, privilege escalation, and credential misuse -- have been generally available across major SIEM and identity platforms since the early 2020s, with multiple Forrester TEI studies documenting ROI above 240%. The tooling is mature, the vendor ecosystem is consolidated, and budget commitment is strong. Yet identity breaches keep climbing. The central tension is not whether the technology works in controlled deployments but whether organisations can operationalise it at scale: tuning behavioral baselines, managing false-positive volumes that still overwhelm most SOC teams, and extending coverage to non-human identities that now vastly outnumber human users. The practice is firmly good-practice -- the question is execution quality, not viability.

CURRENT LANDSCAPE

The vendor ecosystem has fully consolidated around platform-integrated behavioral analytics with expansion to non-human identities accelerating in April-May 2026. Microsoft Sentinel's UEBA behaviors layer reached GA in January 2026; Exabeam extended Agent Behavior Analytics to Google Cloud agents (1,100+ deployments); LogRhythm-Exabeam merger finalized January 2026 consolidating SIEM with AI-driven analytics; and every major platform -- Darktrace, Securonix, Okta, CrowdStrike, Ping Identity -- ships competitive anomaly detection. Market momentum remains strong: 95% of organizations plan increased cybersecurity budgets with 44% citing AI as primary driver; UEBA market forecast at 47.2% CAGR (USD 4.35B 2025 → USD 65.1B 2032).

The capability-outcome gap has widened rather than closed. RSA 2026 survey shows 69% of organizations experienced identity breaches globally (92% in Australia), with 45% incurring costs exceeding $10M -- despite widespread UEBA platform availability. Cybersecurity Insiders April 2026 survey reveals 92% lack visibility into AI identities, 71% confirmed AI tool access but only 16% report effective governance, 95% doubt containment capability if compromise occurs. SANS 2026 ITDR survey exposed operational response lag: 68% detect identity attacks within 24 hours but only 55% contain within 24 hours. False positives persist as operational tax: Microsoft's impossible travel detection continues triggering alerts from Microsoft's own infrastructure, practitioners report 30-day baselines generating 200 daily anomalies with only 5 worth investigating, and analyst trust erodes as baselines drift.

Non-human identity anomaly detection is the acknowledged frontier with structural gaps. Machine identities outnumber humans by 45:1 to 100-500:1 depending on environment, yet only 12% have automated lifecycle management and only 7% of organizations achieve organization-wide AI adoption. Vendor marketing of AI agent anomaly detection expanded (five vendors announced frameworks at RSAC 2026) but critical gaps remain unresolved: dynamic scope creep, non-deterministic audit trails, cross-agent context poisoning. Cloud Security Alliance analysis argues the fundamental problem is governance model misalignment -- machine identities operate as "autonomous trust executors," making single-token compromise cascade differently than user compromise, requiring distinct behavioral baselines impossible to establish under traditional user-centric models.

TIER HISTORY

ResearchJan-2018 → Jan-2018
Bleeding EdgeJan-2018 → Jan-2021
Leading EdgeJan-2021 → Jan-2022
Good PracticeJan-2022 → present

EVIDENCE (123)

— SANS survey of hundreds of organizations: 68% detect identity attacks within 24h but only 55% contain them—reveals operational maturity gap despite anomaly detection adoption at scale.

— CrowdStrike extends ITDR to cloud identities using AI behavioral analysis trained on trillions of events to detect unauthorized access patterns and privilege escalation anomalies in hybrid environments.

— Splunk official documentation: 6 operationalized UEBA detections (abnormal RDP login, administrative activity, email temporal patterns) deployed in production cloud environments—demonstrates detection capability at enterprise scale.

— Critical assessment of production UEBA barriers: behavioral baseline drift, stale models in cloud-native deployments, 42% of teams deploying without tuning—documents operational constraints limiting anomaly detection effectiveness at scale.

— Operationalized KQL detection patterns for identifying compromised AI agent identities via legacy Azure AD Graph API abuse—extends anomaly detection to non-human identities with production-ready rules.

— Critical examination of UEBA implementation gap: entity fragmentation, contaminated baselines from shared accounts, IdP-only blindness—entity governance quality determines anomaly detection accuracy in production deployments.

— Comprehensive detection framework for AI agent privilege escalation across six monitoring areas (identity, connectors, data access, instructions, privilege changes, approval evasion)—addresses emerging scope gap in non-human identity anomaly detection.

— Technical analysis of identity threat detection with concrete attack metrics (600M identity attacks/day, ransomware 2.75x YoY growth) and detection signatures for Kerberoasting, DCSync, Golden Ticket lateral movement anomalies.

HISTORY

  • 2018: UEBA emerged as a distinct product category with major vendor launches. Microsoft released ATA for Active Directory anomaly detection; Splunk, Exabeam, and Rapid7 released or updated UEBA platforms with machine learning for insider threat and lateral movement detection. Integration with SIEM and threat intelligence workflows became standard, and a Levi Strauss & Co deployment of Exabeam's Smart Timelines showed real-world productivity gains.
  • 2019: UEBA consolidated into mainstream platforms and cloud-first architectures. Microsoft released Azure Sentinel (GA) with built-in Investigation Priority risk scoring; Splunk advanced UBA 5.0 with customizable ML models and Starbucks live production deployment. Research validated adoption: Exabeam/Ponemon found security teams waste 25% on false positives. However, production systems revealed persistent tuning challenges—Microsoft's own impossible travel alerts generated high false positives despite ML suppression, indicating the practice remained operationally intensive at scale.
  • 2021: Vendors expanded UEBA capabilities into new domains while consolidation pressures emerged. Microsoft extended Azure Sentinel UEBA to SAP threat monitoring; Splunk acknowledged product lifecycle consolidation with UBA reaching end-of-sale in 2025. Market research confirmed growth: anomaly detection market forecast reached $5B+ by 2026 at 15.3% CAGR. Community implementations (Elastic, Splunk) documented practical impossible travel detection patterns, but operational challenges persisted—false positive management and model tuning remained labor-intensive for large deployments.
  • 2022-H1: UEBA moved into mainstream enterprise deployment with measurable ROI and analyst validation. Forrester TEI study reported 245% ROI for UEBA-integrated SIEM across BFSI, manufacturing, and retail; Obsidian Security documented January 2022 customer deployment detecting phishing-triggered account compromise via impossible travel alerting. Analyst recognition (GigaOm Radar) validated vendor differentiation on agent efficiency and risk scoring. However, deployment challenges remained visible: practitioners reported frequent false positives from Microsoft identity protection despite 14-day learning periods; Microsoft Sentinel experienced UEBA feature enablement bugs requiring backend fixes. Operational burden of tuning and suppressing false positives persisted despite broader adoption.
  • 2022-H2: Identity anomaly detection confirmed mainstream adoption with analyst recognition (Gartner ITDR trend, Magic Quadrant SIEM leadership for Microsoft Sentinel) and continued research innovation (fuzzy particle swarm algorithms for improved accuracy). Major vendors (Datadog, LogRhythm, Microsoft, Exabeam, IBM, Splunk) shipped or enhanced UEBA/identity threat detection capabilities. However, critical assessments revealed persistent barriers: independent deployment evaluations (Marskidata Sentinel study) documented high cost and usability complexity; security researchers warned against 'fake UEBA' relying on statistical models rather than machine learning; practitioner reports highlighted false positive alert fatigue and tuning burdens. Market expansion into cloud-native identity (AWS, Azure), entity behavior (device context), and specialized domains (SAP, Office 365) proceeded in parallel with operational challenges limiting deep adoption.
  • 2023-H1: UEBA moved into full operational deployment with continued ROI validation and orchestration maturity. Forrester 2023 TEI study for LogRhythm documented 258% ROI, 90% false positive reduction, and $2.24M NPV over three years; Netskope published real-world case studies of UEBA detecting insider threats and account compromise. Vendor ecosystem matured: Exabeam released Outcomes Navigator for detection coverage visualization, Palo Alto published automated impossible travel playbooks in XSOAR, and CrowdSec released technical implementation guides. However, structural adoption barriers persisted: platform usability and cost remained friction points; operationalizing UEBA across large user populations required sustained tuning effort and analyst time investment, limiting velocity among mid-market enterprises despite leader ROI.
  • 2024-Q1: Vendor product development accelerated while deployment barriers remained entrenched. Microsoft and Splunk released feature updates and security hardening for UEBA platforms; Splunk published open-source tooling (Zeppelin notebooks) for data validation and model monitoring to improve deployment scalability. A multinational insurance company conducted successful UEBA proof of concept for insider threat detection, advancing to SIEM RFP inclusion. Academic research documented persistent limitations: data quality concerns, high implementation costs, and ongoing model maintenance challenges limiting adoption velocity. Impossible travel detection matured as a methodological standard with vendor and open-source tooling, yet operational complexity—tuning false positives, managing alert fatigue—continued to constrain mid-market adoption despite strong ROI documented in enterprise deployments.
  • 2024-Q2: Identity threat detection and response (ITDR) accelerated toward standardization while market demand remained constrained by adoption gaps. Cisco's acquisition and at-scale validation of Oort for identity threat detection signaled vendor consolidation in dedicated ITDR platforms. Analyst recognition (Sayers, CyberRisk Alliance IAM survey) noted ITDR tools converging on standardized detection capabilities while only 27% of organizations reported high confidence in effective access controls. Vendor ecosystem continued positioning UEBA as augmentation to major SIEM platforms (Exabeam/Sentinel), and IBM/other vendors published public tutorial guidance establishing impossible travel and credential misuse detection as standard methodologies. However, business adoption drivers remained incomplete: a Ping Identity survey found 48% of IT leaders lack confidence in defenses against AI-driven identity fraud and only 45% deploy multi-factor authentication, indicating significant adoption gaps despite mature technical capabilities.
  • 2024-Q3: UEBA market growth accelerated with strong vendor consolidation momentum. Market forecasts projected USD 1.04B (2024) expanding to USD 11.22B (2031) at 40.5% CAGR, driven by rising sophisticated cyber-attacks and regulatory requirements. Exabeam and LogRhythm finalized merger (July 2024), consolidating AI-driven UEBA analytics with on-premises SIEM platforms and signaling vendor confidence in specialized identity anomaly detection tools. Vendor ecosystem remained mature: major platforms (Splunk, Sentinel, LogRhythm, Darktrace, Securonix) shipped competing UEBA capabilities with documented strengths and persistent adoption barriers (complexity, cost, implementation time). Okta and major IAM vendors continued integrating impossible travel detection and velocity-based anomaly rules natively. However, business-level adoption gaps persisted despite technical maturity—only 27% of organizations reported high confidence in access controls, indicating identity governance gaps that anomaly detection alone cannot remedy. Operational barriers (tuning, false positive management) continued limiting adoption velocity in mid-market segments despite decade-long practice maturity.
  • 2024-Q4: Identity and access anomaly detection reached ubiquity in vendor platforms while operational adoption barriers persisted. Microsoft Sentinel passed 25,000 customers with UEBA as core capability; Cortex XSIAM delivered 244% ROI and 85% alert reduction via behavioral analytics (Forrester TEI); market forecasts confirmed rapid expansion at 47.2% CAGR (UEBA market USD 4.35B 2025 → USD 65.1B 2032). However, SANS 2024 survey revealed 64% of SOC teams overwhelmed by false positives and 73% struggle with detection rules, perpetuating operational complexity barriers. Real-world incident showed impossible travel detection still missed in production (BEC case, Azure AD). Identity governance remained weak: 97% of orgs challenged by identity verification, only 45% deploy MFA, 69% of SOC incidents identity-related, only 27% confident in access controls. Capability maturity was firm, but adoption velocity was constrained by alert fatigue, implementation complexity, and foundational governance gaps that tooling alone could not address.
  • 2025-Q1: Market growth accelerated while implementation challenges persisted. UEBA market forecast USD 3.19B (2025) expanding to USD 13.71B (2030) at 33.9% CAGR. Microsoft integrated Security Copilot with Sentinel UEBA for AI-augmented threat prioritization; Exabeam launched cloud-native Fusion SIEM/XDR with UEBA integrated (500+ organizations deployed). Real-world case study: Blue Zebra Insurance (Australia) achieved 25% reduction in incident response time and 50% improvement in resolution time after Sentinel deployment. Survey data showed 46% of organizations prioritize ITDR as top IAM goal, 78% planning increased identity security spending, 94% adopting AI-driven identity solutions. However, critical vulnerability emerged: real $3M BEC loss incident revealed that MDR providers still fail to escalate impossible travel alerts due to low confidence in IP geolocation accuracy—exposing a critical implementation dependency that vendors had not fully solved despite decade-long maturity. Capability advancement was clear, but the gap between marketing narratives and operational reliability in high-stakes deployments remained unresolved.
  • 2025-Q2: Identity anomaly detection expanded scope to include machine and service identities while vendor security maintenance intensified. SailPoint's 2024-2025 report confirmed that mature identity programs achieve 87% more visibility and control of non-human identities (40%+ of total identities in most organizations); Identiverse 2025 (3,000+ attendees) highlighted industry consensus on AI-driven behavioral analytics for anomaly detection with vendor standardization around flagging abnormal access patterns and automating access reviews. However, security vulnerabilities continued: Splunk released UBA 5.4.2 (May 2025) addressing 13 CVEs, demonstrating that security maintenance complexity persisted alongside operational tuning burdens. Identity governance expansion toward machine identities and AI agents remained a critical adoption driver, but implementation challenges—alert fatigue, false positive management, and vendor security patch cycles—continued constraining velocity in mid-market deployments despite enterprise-scale ROI validation.
  • 2025-Q3: Identity anomaly detection reached peak mainstream adoption with standardized capabilities across all major platforms, yet adoption barriers intensified through three mechanisms: (1) vendor lock-in deepened as enterprises contracted for bundled AI platform agreements with reduced switching flexibility (Forrester, August 2025); (2) identity security confirmed as top cloud risk with 100% organizational mandate but identity governance deficits persisted (CSA, September 2025); (3) vendor supply chain risk escalated with Splunk releasing multiple security patches across Q3 (AV25-470, July 2025) documenting ongoing CVE burden for production UEBA systems. UEBA market growth projections remained aggressive (47.2% CAGR 2025-2032) and technical scope expanded toward machine identities, yet real-world deployment velocity remained constrained by false positive fatigue, tuning complexity, and foundational IAM governance gaps that anomaly detection tooling alone could not resolve. Capability had matured from "emerging" to "pervasive," but the implementation-effectiveness gap persisted at organizational scale.
  • 2025-Q4: Standalone UEBA products faded while platform-integrated anomaly detection accelerated. Splunk announced end-of-sale and end-of-support for UBA (December 2025, end-of-support December 2026), formalizing vendor consolidation toward integrated platforms; ITDR market forecast accelerated to 20.3% CAGR ($5.6B 2025 → $29.4B 2034); RSA survey revealed 69% of organizations globally and 92% in Australia experienced identity breaches (27-point YoY increase), signaling urgent market demand despite persistent deployment challenges. However, Q4 2025 operational assessments documented unresolved barriers: IT Professor analysis showed 30-day baselines generating 200 daily anomalies with only 5 real threats (40 analyst-hours/week), and systems failing to detect slow-cook attacks or lateral movement via legitimate access. SailPoint data confirmed AI-enablement multiplier effect (4x more likely to deploy advanced ITDR), yet 64% of SOC teams remained overwhelmed by false positives, 44% of organizations lacked UEBA adoption despite 64% identifying insider threats as top risk. Capability maturity remained firm across all major platforms, but operational deployment velocity persisted constrained by tuning complexity, alert fatigue, vendor consolidation lock-in, and foundational identity governance deficits that tooling alone could not remedy. The practice transitioned from decade-long "emerging to mainstream" narrative toward "plateau of mature deployment with persistent adoption gaps."
  • 2026-Jan: Vendor platform consolidation and UEBA feature advancement continued while machine identity automation gaps and production tuning challenges emerged. Exabeam and LogRhythm announced merger (January 2026) consolidating SIEM and behavioral analytics capabilities; Microsoft Sentinel released UEBA behavior layer GA (January 2026) aggregating raw logs into structured insights; market growth projections remained strong (UEBA market $1.87B→$2.29B 2025-2026 at 23.11% CAGR; ITDR $5.6B→$29.4B 2025-2034 at 20.3% CAGR). However, ManageEngine Q1 2026 survey revealed critical adoption gaps: machine identities outnumber humans 100-500:1 with only 12% automated lifecycle management and only 7% organization-wide AI adoption, signaling immature automation infrastructure for non-human identity anomaly detection. Production deployments exposed persistent tuning challenges: Microsoft Defender impossible travel detection triggered false positives from Microsoft's own infrastructure (OneDrive/SharePoint), revealing ML algorithm limitations and alert fatigue even in major vendor implementations. The practice remained technically mature and economically justified (ROI studies documented 244-258% returns), yet operational deployment barriers—false positive management, alert saturation, machine identity automation deficits—persisted as constraints on adoption velocity, particularly for scope expansion to non-human identities.
  • 2026-Feb: Critical operational barriers and architectural limitations surfaced despite peak vendor maturity. Microsoft Sentinel released UEBA behaviors layer GA with new Defender portal widget (February 2026); 95% of organizations planned increased cybersecurity budgets with 74% targeting double-digit growth, 44% driven by AI (Exabeam survey). However, negative signals emerged across multiple dimensions: RSA survey documented 69% of organizations experienced identity breaches in 2026, 45% facing costs exceeding $10M; Lumos report revealed 96% faced identity incidents with 48% unable to detect threats in real-time; critical infrastructure assessment (Curwell analysis) highlighted detection ceiling and inability to fuse multi-domain data (IT, OT, HR, physical); production deployments exposed privacy law violations, fragile baselines, and unsustainable false positive load (Doering analysis). Machine identities remained unautomated: only 12% with automated lifecycle management and 7% organization-wide AI adoption. The practice remained technically mature and economically advocated (95% budget increase plans) yet constrained by operational barriers—alert fatigue, false positive load, privacy/legal risks, multi-domain data fusion limitations—and architectural gaps preventing real-world effectiveness at scale, particularly for non-human identity expansion.
  • 2026-Mar: Non-human identity anomaly detection accelerated as tier-1 funding validated market expansion while detection maturity tensions persisted. Oasis Security and Linx Security closed Series B rounds ($120M and $50M respectively) targeting machine identity governance, AI agent behavioral monitoring, and continuous anomaly detection evolution away from periodic identity reviews. MITRE D3FEND formally classified UBA/UEBA with 12 defensive subtechniques, validating anomaly detection as standardized practice category. However, critical gaps in emerging scope remained: RSAC 2026 vendors announced AI agent identity frameworks but left dynamic scope creep, non-deterministic audit trails, and cross-agent context validation unresolved. Real-world deployments demonstrated practical limitations: Constella neobank case study showed behavioral-only anomaly detection defeated by infostealer-supplied sessions (41% fraud reduction required threat intelligence integration); DuckDuckGoose report documented 868,000 synthetic media variants monthly with identity verification systems unable to keep pace with generator velocity. Vendor ecosystem signal remained positive (Exabeam Agent Behavior Analytics GA, Microsoft Sentinel UEBA production scale), but scope expansion to non-human identities and AI agents exposed fundamental detection capability gaps alongside operational barriers. Signal balance: capability maturity advancing but architectural limitations intensifying as practice expands beyond human identity baselines.
  • 2026-Apr: Vendor platform advancement accelerated for both human and non-human identity anomaly detection. Microsoft Sentinel Entity Analyzer reached GA with AI-driven explainable identity/URL risk analysis; Ping Identity launched Identity for AI (GA) with Agent Detection providing runtime behavioral monitoring for autonomous agents. Exabeam extended Agent Behavior Analytics to Google Cloud ADK, achieving 1,100+ customer deployments with 50% investigation time reduction. Gartner IAM Summit 2026 established continuous context-aware behavioral monitoring for AI agents as foundational control. However, critical gaps emerged: SANS 2026 ITDR survey revealed detection-response gap (68% detect within 24h but only 55% contain), Cybersecurity Insiders survey showed 92% lack visibility into AI identities with 86% lacking formal policies, and ExtraHop documented architectural blind spot where IdP-based detection misses encrypted credential abuse. Cloud Security Alliance analysis argued NHI anomaly detection fundamentally misaligns with user-centric governance models: single compromised token cascades across systems differently than user compromise. Vendor consolidation continued with LogRhythm-Exabeam merger (January 2026) and Splunk ending UBA standalone product (December 2025, support ending December 2026).
  • 2026-May: Non-human identity spending surged with SpecterOps and Omdia survey (500+ security leaders) showing 75% increased identity security spending YoY and 35% reporting full attack path management implementation—while 92% still lack visibility into AI identities and 95% doubt containment capability. CrowdStrike reached GA for Falcon Identity Protection for Microsoft Entra ID, extending AI behavioral analytics trained on trillions of events to hybrid cloud identities. The detection-governance gap sharpened on both technical and operational fronts: Panther analysis found 42% of teams deploy UEBA without tuning (producing behavioral baseline drift), Elastic documented entity record fragmentation and contaminated baselines from shared accounts as core accuracy blockers, and SANS confirmed 68% detect identity attacks within 24 hours but only 55% contain them. New tooling addressed the AI agent gap specifically: AADGraphActivityLogs reached GA with KQL detection patterns for compromised service principals, and Orchestrik published a six-area privilege escalation detection framework for AI agents—but Lyrie data quantifying 600M identity attacks per day underscored the scale mismatch between detection maturity and threat volume.

TOOLS