Securing AI models and agents without compromise: How F5’s acquisition of CalypsoAI will deliver end-to-end AI runtime protection

F5 Ecosystem | September 11, 2025

Managing cybersecurity in an AI world is more challenging than ever. As enterprises rapidly embrace generative and agentic AI tools, they face growing risks such as prompt injection attacks, data leakage, and compliance challenges. The dynamic and highly interconnected nature of AI applications, models, and APIs is expanding the attack surface, heightening regulatory scrutiny, and introducing operational blind spots.

Traditional point solution security tools struggle to keep pace with the complex and evolving AI threat landscape. Enterprises are tasked with integrating these powerful tools into their operations while ensuring compliance, safeguarding sensitive data, and avoiding operational delays—all at unprecedented pace and scale.

At F5, we believe securing AI workflows doesn’t mean sacrificing speed, user experience, or scalability. That’s why we’re excited to announce the acquisition of CalypsoAI, a pioneer in enterprise AI security that delivers adaptive protection, real-time threat monitoring, and audit-ready governance for AI systems. This acquisition positions F5 as the first company to deliver end-to-end protection for every app, API, and now AI model and agent, anywhere.

Together with CalypsoAI, we’re redefining enterprise AI security, enabling organizations to securely scale while mitigating risks, simplifying compliance, and delivering high-performance AI workflows. By bringing CalypsoAI’s capabilities to the F5 Application Delivery and Security Platform (ADSP), enterprises gain access to the world’s most comprehensive, end-to-end AI security solution, allowing them to secure their AI systems from pilot to production without compromise.

We sat down with James White, CTO of CalypsoAI, and Kunal Anand, Chief Innovation Officer at F5, to discuss how this groundbreaking solution simplifies enterprise AI security across the entire lifecycle of AI systems.

Q: Welcome to F5, James! Can you tell us about CalypsoAI’s mission and what brought you to this partnership?

James White: Thank you! Our mission at CalypsoAI has always been to empower organizations to adopt AI confidently and securely. With enterprises rapidly scaling AI, they face rising risks like adversarial attacks, rogue model behaviors, policy violations, and evolving compliance demands. Due to how fast AI is changing, these risks can’t be addressed by traditional tools, which leave gaps in protection and governance.

To address this, we’ve built solutions that secure AI workflows for all stages of AI maturity. This includes proactive attack testing through AI Red Teaming, real-time defenses delivered by solutions like runtime inspection and enforcement, and centralized observability and compliance to meet regulatory standards like GDPR and the EU AI Act.

Joining F5 allows us to expand our vision and seamlessly integrate these capabilities into one unified platform, enabling enterprises to test, deploy, and scale AI without compromising security.

Q: Kunal, how does this acquisition support F5’s vision for enterprise success?

Kunal Anand: AI isn't just another workload; it's a new, dynamic attack surface that bypasses traditional security. For decades, F5 has sat at the critical junction between applications and users. Securing AI models, agents, and data flows is the logical extension of our core mission.

Our vision is a single, adaptive platform that secures code, APIs, and now, the AI constructs that power modern applications. By integrating CalypsoAI’s AI-native security into our ADSP, we are making that vision a reality. This isn't about bolting on a new feature. It's about embedding AI protection into the application fabric itself. Enterprises can now build with AI, not just react to its risks. That is the difference between leading and merely participating in this shift.

Q: James, can you share more about the specific challenges CalypsoAI was built to address?

James White: As enterprises are looking to implement a new AI stack, AI workflows create a dynamic attack surface that introduces unique challenges:

  • AI Vulnerabilities: Risks include prompt injection attacks, data poisoning, and adversarial manipulations, which can compromise AI system integrity. One of the most pressing challenges noted by security professionals is the rise of Shadow AI, where unauthorized use of third-party AI services magnifies risks like data exfiltration and operational blind spots. Practitioners highlight that balancing AI’s data demands with cybersecurity principles often forces trade-offs that leave businesses choosing between effective AI and robust security.
  • Compliance Gaps: Regulations like GDPR and the EU AI Act require centralized oversight and accountability, but many organizations lack effective tools to streamline compliance for AI systems.
  • Shadow AI: Unmonitored or unauthorized use of third-party AI services increases risks like data exfiltration and operational blind spots.
  • Fragmented Security Tools: Many enterprises rely on disconnected tools or manual processes, which introduce inefficiencies and create bottlenecks.

The integration of CalypsoAI's purpose-built solutions into the F5 ADSP directly addresses these challenges, providing proactive, real-time protection at every stage—from pilot to production.

Q: Kunal, what are the key benefits customers can expect from bringing CalypsoAI to the F5 ADSP?

Kunal Anand: It delivers full-lifecycle AI security. Three benefits are immediate:

  • Harden Models Before Deployment. Think of it as continuous, automated red-teaming for your AI. CalypsoAI fires thousands of adversarial prompts at your models, discovering and fixing vulnerabilities in hours, not weeks. Teams ship resilient systems faster.
  • Protect Runtime AI. This is not a passive log scanner. It's a real-time shield that sits in the data path, actively blocking prompt injections, data exfiltration, and other attacks without compromising performance. We prevent the breach, not just report on it.
  • Unified Observability for AI. AI systems can feel like a black box, creating massive operational blind spots. CalypsoAI observes every prompt, response, and data interaction across your entire AI estate. This turns ambiguity into clear insight, allowing teams to troubleshoot issues, detect drift, and maintain a complete, audit-ready record of AI behavior. You can't secure what you can't see.
Q: James, what makes CalypsoAI’s approach transformative for enterprises?

James White: Our approach is both proactive and continuous. For example, during development, our Red Teaming tools simulate adversarial attacks to pressure-test AI systems, ensuring vulnerabilities are addressed before deployment. Post-deployment, live monitoring and runtime protection systems detect and respond to anomalous behavior and attacks like data exfiltration in real time.

This layered security approach gives enterprises the tools to protect against risks from pilot to production, streamline compliance, and accelerate their AI innovation—securely. CalypsoAI is the established industry expert in post-deployment AI model security. Our solutions give us unique insights into measuring and benchmarking how vulnerable the world’s most used generative AI and agentic AI models. Our CASI security index and Agentic Warfare Resistance leaderboards rank the top 10 models in each of these respective areas, helping enterprises better understand which models to deploy and the inherent risks they face in deploying them.

Q: Kunal, why will this partnership be a game-changer for enterprise AI security?

Kunal Anand: The current approach is broken and enterprises know it. The market is selling a patchwork of niche AI security tools that solve 10% of the problem while creating 100% more operational overhead. Enterprises are being forced to act as systems integrators for their own security.

This is a game-changer because it’s an integration, not an add-on. We are collapsing the stack. We're embedding AI security across our F5 ADSP. It becomes a native capability of the infrastructure, not another box to manage. And because it's F5, that platform runs wherever you need it — hardware, software, or SaaS, in any cloud. A unified platform always beats a frankenstack of point solutions. That is the game-changer.

In an AI-first world, securing AI operations is not optional—it’s mission-critical. With F5 and CalypsoAI combined, enterprises now have the tooling, governance, and control they need to innovate without compromise.

Share

About the Author

Kunal Anand
Kunal AnandChief Product Officer

Kunal Anand leads the F5 product organization as Chief Product Officer. Responsible for product vision, strategy, and execution, he ensures development of breakthrough solutions that solve critical challenges and create exceptional experiences for customers. In his previous role as Chief Technology and AI Officer, Kunal charted the company’s technology and AI strategy and vision. Prior to F5, Kunal held the dual role of Chief Technology Officer and Chief Information Security Officer at Imperva. His journey to Imperva began in 2018 with the acquisition of Prevoty, an application security startup he co-founded in 2013. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab. Kunal has over 15 years of experience in AI and machine learning, ranging from model training, employing AI-driven algorithms to enhance products, and designing and implementing AI architectures. Kunal holds a Bachelor of Science degree in computer science from Babson College.

More blogs by Kunal Anand

Related Blog Posts

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

F5 Silverline: Our Data Centers are your Data Centers
F5 Ecosystem | 06/22/2021

F5 Silverline: Our Data Centers are your Data Centers

Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us