3min. read

What's the Difference Between Agent-Based and Agentless Security?

In cybersecurity, agents represent specialized software components that are installed on devices for performing security-related "actions."

Those actions include, but are not necessarily limited to: 

- Security scanning and reporting 

- System restarting and rebooting 

- Applying software patches 

- Making changes to configurations 

- General system monitoring

Due to their nature, it is crucial that the agents perform well in diverse environments, and they must also be low impact and low maintenance. 

Agent-based systems are modeled on the pull communication style; in this case, the client is the central server that pulls the data from the agents on demand. Agents typically have to be installed on each machine following an automated process. Once the agents are configured, they can receive requests from the central server for the results of security-related actions and status updates.

Agentless Security

Agentless security, on the other hand, performs many of the same actions, just without the agents. In practice, this means that we can inspect and review security scans and vulnerabilities on a remote machine without having to install an agent on that system. You may have to install software on a different layer of the system (like networking) to capture associated risk metrics, but you won’t need to have direct access to the host to install any service.

Agentless systems, therefore, are based on the push communication style; in other words, the associated software pushes data to a remote system on a periodic basis. Because of the flexibility of this setup, agentless security solutions work well for baseline security monitoring. You can configure them to scan the whole infrastructure without having to install them to each subsystem. However, a central system still needs to be available to coordinate scanning and the deployment of patches.

On the other hand, you may need to install agent-based systems to certain hosts that require stricter controls. For example, if you have hosts that deal with financial data, you might want to maximize your use of available security technology by installing agents that can carefully monitor and protect those systems as well as improve their overall security posture.

Is Agentless or Agent-Based Security Better?

Since both agentless and agent-based security are widely used today, you may be wondering which one you should choose. Actually, you should use both in order to achieve comprehensive security. It is still important to understand the pros and cons of each one so that you know when to use them effectively.

To summarize, agentless systems have a number of features that make them appealing, including:

  • Quicker setup and deployment: You don’t need to have direct access to all hosts to perform security scans.
  • Less maintenance and lower provisioning costs.
  • Wider initial visibility and greater scalability.
  • Ideal for networks with large amounts of bandwidth.
  • Need for a center host available to perform actions.

On the other hand, agent-based systems have the following benefits over agentless systems:

  • Enable in-depth scanning and monitoring of hosts: Agents can perform more specialized scanning of components and services.
  • Can be used as a firewall, since it can block network connections based on filtering rules.
  • Offer runtime protection per host or per application.
  • Provide security controls, like the ability to block attacks and patch live systems.
  • Ideal for networks with limited bandwidth, locations within DMZ zones or laptops that can be out of network reach. You can install the agent in systems without network connectivity.
  • Do not need a central host since they can perform tasks independently: Once installed, the agent will run its set of actions on demand without needing to establish a connection to a server beforehand – even when it is disconnected from the enterprise network.

Now that you know the pros and cons of each type of service, you can make informed decisions about how to deploy each to protect your infrastructure components. By combining agent-based and agentless systems, you can realize the best of both worlds.

Prisma Cloud is one of the few enterprise security platforms that offers both agent-based and agentless security options under a single solution. To learn more, you can visit the official site at https://www.paloaltonetworks.com/prisma/cloud.


Related content

What Is Cloud Native Security?

Where monolithic application architectures are relatively static, cloud native application architectures are highly dynamic, posing cloud native application security challenges.

Navigating cloud native security

Better Together: Agentless Scanning and Agent-Based Protection for Comprehensiv...

Many in the security industry have been pondering recently whether “agentless” or “agents” are most effective. The answer is simple: use both for comprehensive security.

Both agent-based and agentless security in one platform

Bridging the Gap: Infrastructure as Code Security with Prisma Cloud

Shift left security aims to involve developers in security through automated feedback earlier in the development lifecycle.

Learn how integration reduces risk across the development lifecycle

Demo: Agentless + Agent-Based Security

Cloud native workload security shouldn't require you to compromise for someone else's architecture. See how simple and powerful the combination of agentless and agent-based securit...

Watch agentless and agent-based security in action