Zscaler Blog
Get the latest Zscaler blog updates in your inbox
AI for Segmentation: The Limits of AI Policy Optimizers and Private Access Co-Pilots
The industry is having the wrong conversation about AI for private access. Security leaders are being presented with two limited paths, both disguised as the future of ZTNA.
On one hand, there is AI being used as a Policy Optimizer, a smarter way to manage the complex firewall rules traditionally used to segment data centers and private app environments. On the other hand, there is the rise of the AI Co-Pilot, a conversational assistant designed to make first-generation ZTNA architectures easier to administer. Both approaches share a critical flaw: they use AI to make a broken, network-centric model more manageable, not to replace it. They are renovations, not a future solution.
The true destination for AI in securing private access is not better assistance, but a clear path towards genuine autonomy, a system that can act on its own to reduce risk. That journey isn't possible with a chat interface bolted onto a firewall or a ZTNA 1.0 architecture still dependent on network segments. It requires a fundamentally different foundation.
To understand why these approaches are hitting a wall and why a different architecture is required, one must first confront the massive, hidden problem at the heart of every enterprise: the private application landscape.
The Iceberg Hiding in Your Network
An organization's private application landscape is like an iceberg. The small, visible tip represents the handful of mission-critical apps that are known and actively managed. Yet even for this small set, creating and maintaining strict access policies is a difficult, manual process that consumes significant time and resources. And in reality, this is only a tiny fraction of the total landscape.
Just below the surface lies the first layer of hidden risk: the inventoried apps. They are listed in a CMDB, but with little to no data on who actually needs access, creating significant exposure. The real danger lurks in the massive, submerged base of the iceberg: the unaccounted-for apps. This dynamically growing mass of shadow IT has no clear owner, no documentation, and creates a vast, undefended attack surface ripe for lateral movement.

An AI co-pilot, by analyzing logs and network data, can only offer surface-level observations about this chaos. It might generate an alert like, "New traffic detected to an unknown server," but its utility effectively ends there. Because it lacks a true understanding of the complex application landscape, and more importantly, the architectural power to actually solve the root problem, it can only ever point out a symptom. It’s a notification about a single crack on the iceberg's surface, with no ability to reveal the immense, hidden danger below. You are still navigating blind.
See the Whole Iceberg, Then Eliminate the Attack Path
The real breakthrough isn't getting a better tool to explore the problem. It's realizing you can eliminate the problem altogether. The goal isn't to become an expert navigator of a high-risk environment; it's to transform it into a low-risk, fully visible one. This is the shift from an administrative mindset to an architectural one. Instead of asking, "How can I write rules to secure this chaos?" The better question is, "How can I design a system where this chaos can't exist?" This architectural shift is the mandatory first step before any AI strategy can succeed.

Think of it like constructing a modern skyscraper. No one would install a sophisticated, AI-powered smart building system to optimize the elevators and HVAC if the structure itself had a crumbling foundation and faulty wiring. The system would just become incredibly efficient at reporting on constant failures. First, you must secure the foundation, an architecture that is inherently simple and safe. Only on top of that secure foundation can AI truly help you get ahead, delivering the speed, scale, and autonomous capabilities that were impossible before.
The immediate challenge, however, is that the market is now saturated with AI products all claiming to solve this very problem. On the surface, they sound alike. They promise “automated discovery” and “policy mapping,” creating significant confusion for technology leaders.
So how do you cut through the noise and identify a solution that truly eliminates the problem, rather than just managing it more efficiently? The key is to scrutinize the architectural philosophy each AI was built to serve. When you do, you'll find two dominant, yet flawed, approaches have shaped the market.
Understanding the AI Segmentation Landscape: The Optimizer, The Co-Pilot, and The Autonomous System
1. The Policy Optimizer (The Firewall-Centric Approach)
This philosophy grew out of the world of firewalls. For decades, security meant writing rules: source IP, destination IP, port. The goal of AI in this world is to make that process more efficient. This AI acts as a Policy Optimizer, sifting through logs to help you write better firewall rules. The fundamental limitation: This approach keeps you trapped in the endless cycle of managing a complex rule base. The AI helps you manage the problem, but it doesn't eliminate it.
2. The Co-Pilot for Private Access (The ZTNA 0.5 Approach)
This philosophy represents a step forward, born from first-wave ZTNA. Its AI acts as a helpful Cloud Assistant or "co-pilot," but remains tethered to network-centric concepts. Its recommendations reveal its constraints as it might suggest "narrowing a 10.0.0.0/16 subnet to a 10.0.0.0/24," helping you turn big network segments into smaller ones. The fundamental limitation: This approach still forces you to manage network topology. The AI helps you become a more precise network segment manager, but you are still managing segments on a network that allows for lateral movement.
Zscaler's Autonomous User-to-App Segmentation represents the right way, and it’s crucial to understand this is not simply a better version of the same game, it's a different game entirely. This is a true industry-first Autonomous System, built on a zero trust architecture that renders the underlying network irrelevant.
The reason it makes the work of managing rules and subnets obsolete is that it fundamentally changes the unit of security. Instead of managing network constructs (IPs, subnets, ports), our AI engine operates on a higher plane: the direct relationship between business entities (a verified user and a specific application). You cannot be stuck managing network rules when the system itself doesn't use them to determine access. This new paradigm is what allows our AI to move beyond assisting and towards full autonomy. Here's how:
1. It Sees Every Application, Not Just the Known Ones.
Operating inline, the AI automatically discovers and groups all applications as they are accessed, including all the unaccounted-for shadow IT, instantly bringing your hidden attack surface into the light.

2. It Segments with Quantifiable Intelligence, Not Vague Suggestions.
The AI engine analyzes live traffic to identify segmentation opportunities, presenting a data-driven blueprint like: "These 12 applications appear to be MongoDB databases accessed only by the Dev-Ops team."

3. It Proves the Impact Before You Commit.
The system proves the value of any recommendation, showing you precisely how a new policy will transform your posture, for example, by moving from 6,000 potentially exposed users down to the 59 observed users who actually need access.

4. It Simplifies Action to a Single Click.
Once you see the proven benefit, you aren't left with a manual task. With one click, an AI-powered recommendation is converted into a secure application segment and is ready to be applied as policy. The entire workflow from discovering risk, to generating a solution, to proving its value, to implementing it is seamless and eliminates the risk of human error.

5. It Delivers Continuous Insights to Strengthen Your Posture.
Security is not a one-time project. Our system creates a continuous feedback loop to prevent policy rot. It helps you visualize exposure, eliminate unused "allow" policies that represent latent risk, and refine overly-permissive rules over time. This is the full lifecycle of zero trust segmentation, made simple. The choice is no longer just about which AI is better, but which architectural philosophy will truly secure your future.

Your AI strategy will ultimately reflect your architectural philosophy. Will it be defined by making a complex past more manageable, or by building a radically simpler, more secure future?
See how that future works in practice.
Was this post useful?
Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.
Get the latest Zscaler blog updates in your inbox
By submitting the form, you are agreeing to our privacy policy.


