![]()
Symmetry Systems, the Data+AI security company, announced a series of new and expanded capabilities in its quarterly platform update that give security teams deeper visibility, faster investigation, and new ways to access the intelligence in the Symmetry Identity x Data Graph.
Enterprise AI adoption is outpacing security teams’ ability to govern it. Most organizations deploying AI in its many forms across business-critical workflows still lack the tooling to answer fundamental questions: How prevalent is shadow AI in the organization? Which AI applications can access sensitive data? Who granted that access? How much is the use of AI costing us? How is it changing over time? Who or what is reliant on AI-generated data? Symmetry’s latest updates address that gap directly.
“These aren’t separate features. They’re one platform getting smarter,” said Mohit Tiwari, Co-Founder and CEO of Symmetry Systems. “Every enhancement this quarter reinforces the same thesis: the relationships between identities, permissions, and data are the most important thing in security, and the Identity x Data Graph is the best way to understand them. We’re making that graph faster, more explorable, and accessible from the tools security teams already use.”
Symmetry AIGuard Enhancements
Symmetry continues to expand Symmetry AIGuard, its solution for monitoring and controlling how AI models interact with sensitive enterprise data. AIGuard enforces policies that prevent unauthorized access and data leakage โ without slowing down the adoption of AI. This quarter’s updates further solidify AIGuard as an essential layer in any organization’s AI security stack.
Among the enhancements, Symmetry is introducingย tokenย usage tracking in beta, giving organizations granular insight into how AI tokens are consumed across models, users, and applications. By correlatingย tokenย consumption with data access patterns, security teams can detect anomalous or excessive usage that may indicate data exfiltration, prompt injection abuse, or unauthorized model interactions. A sudden spike in tokens consumed against a sensitive data store now surfaces as an actionable alert, not a line item on a cloud bill.
Also Read:ย CIO Influence Interview with Gihan Munasinghe, CTO of One Identity
Reimagined Interactive Graph Visualization
The Symmetry Identity x Data Graph maps every relationship between human identities, non-human identities, permissions, data stores, and operations across an organization’s cloud environment. This quarter, the team has fundamentally re-engineered how teams interact with it. The updated visualization engine delivers real-time layout and calculation at a scale most tools cannot approach โ handling environments with over one million nodes and millions of edges without sacrificing responsiveness. Where traditional security tools struggle to render graphs with tens of thousands of objects, Symmetry’s engine keeps the full picture interactive and explorable.
Key enhancements include dynamic search and filtering to instantly isolate specific identities or data stores across the full graph, timelapse visualizations that reveal how access relationships and risk posture drift over time, and custom layout and aesthetic controls that let teams tailor the graph for different audiences โ from a security review to a board presentation. Combined with broad performance improvements across rendering, navigation, and data loading, a security analyst investigating a toxic access path can now trace it across a million-node environment in seconds โ something that previously required custom queries and hours of manual correlation.
Claude Code Integration with the Symmetry Identity x Data Graph
The most exciting announcement of the quarter connects Claude Code directly to the Symmetry Identity x Data Graph โ bringing natural language risk analysis into the security engineering workflow.
A security engineer opens their terminal, connects Claude Code to the Symmetry graph, and types:ย “Which service accounts have write access to PII data stores but haven’t been used in 90 days?”ย Within seconds, Claude Code queries the full graph โ spanning permissions, operations, identities, and data classifications โ and returns a prioritized list of high-risk findings with the context needed to act on them. No custom query language. No dashboard hunting. Just a question and an answer grounded in the complete data map.
The integration enables practitioners to ask complex, contextual questions about access paths and policy violations in plain English, prioritize the highest-risk issues in their environment without writing custom queries, and embed data security intelligence directly into engineering, incident response, and compliance workflows.
“Claude Code integration is the logical next step in a broader ecosystem strategy to meet security teams wherever they work. Building on our integration capability to support workflows from their IDE to their SIEM to their Slack channel,” added Tiwari.
Catch more CIO Insights:ย CIO as Orchestrator of Cross-Functional Digital Strategy
[To share your insights with us, please write toย psen@itechseries.com ]

