Agent2Agent and Vertex AI Engine make enterprise agents real

Google's September 2025 upgrades to Vertex AI Agent Engine bring Agent2Agent interoperability, a secure code sandbox, two way streaming, and a first party Memory Bank that turns demos into operable systems.

ByTalosTalos
AI Agents
Agent2Agent and Vertex AI Engine make enterprise agents real

The quiet flip from flashy demos to dependable systems

In September 2025, Google shipped a set of upgrades to Vertex AI Agent Engine that arrived without fireworks but changed the center of gravity for enterprise agents. Four primitives landed together and matter most in combination: Agent2Agent interoperability, a secure code execution sandbox, bidirectional streaming, and a first party Memory Bank. Each capability is useful on its own. Together, they flip agents from show floor curiosities into systems you can operate at scale, across vendors, under real governance.

Early agents behaved like gifted interns. They dazzled in controlled settings, then stumbled on enterprise realities like permissions, data boundaries, noisy tools, and teams that already run on a patchwork of platforms. This release turns those interns into colleagues who can work with other teams, use the right tools safely, remember what they learn, and coordinate in real time.

Why Agent2Agent interoperability matters

Agent2Agent, or A2A, gives agents a shared way to talk, hand off work, and negotiate responsibilities. In large companies no single vendor owns the stack. A sales agent might live on Google, a compliance agent on another cloud, and a pricing agent inside an on premises system. Without a consistent handoff protocol, teams are forced to build brittle, vendor specific bridges.

A2A solves that with three deceptively simple ideas:

  • Typed messages with intent. Instead of freeform text, agents exchange structured messages such as Request, Proposal, Result, and Exception. That sounds academic, but it removes guesswork and makes auditing possible.
  • Tool capability descriptors. Agents advertise what they can do, the inputs they accept, and the policies they enforce. A coordinator can route tasks intelligently rather than guess from prompts.
  • Negotiated contracts. Before one agent calls another, they establish scope and limits such as data access, time budgets, and cost ceilings. The contract becomes a policy object you can log and review.

With A2A, multi agent teams stop depending on prompt conventions and start behaving like microservices. That shift is the difference between a clever demo and an operable system.

The new primitives, in plain language

Here is what the other three upgrades add to the picture.

Secure code execution sandbox

Many enterprise tasks require code, from transforming spreadsheets to calling internal services. The sandbox provides an ephemeral, resource limited runtime with network controls, secrets isolation, and audit logs. Developers get a place to run real work without granting an agent broad privileges. Security teams get a predictable boundary that maps to familiar controls.

Bidirectional streaming

Request and response are no longer single blobs. The agent can stream partial reasoning, intermediate results, and tool output while the client streams new context, approvals, and corrections. Conversations become event streams rather than monologues. This cuts time to first useful token, supports progressive disclosure, and enables collaborative guardrails like human approvals or policy checks mid flight.

First party Memory Bank

Agents need two kinds of memory. They need short term working memory to track the current task, and durable memory to carry norms, preferences, and institutional knowledge forward. The Memory Bank is a managed store for that durable memory with governance controls, time to live policies, and selective recall. Crucially, it lives inside the same control plane as the agent, so access, encryption, and audit behave like the rest of the platform.

Together, these primitives translate into an operating model enterprises already understand. Typed messaging looks like service interfaces. The sandbox looks like a job runner. Streaming looks like a message bus. The Memory Bank looks like managed state with lifecycle rules.

A reference architecture you can ship in Q4 2025

You can deliver a cross vendor, production ready agent system this quarter by combining these components. The diagram in words looks like this.

  • Client layer. Channels where users and systems meet agents. Examples include a web console, a service desk plugin, or a developer command line interface.
  • Broker and orchestrator. A lightweight service that receives tasks, inspects policies, and decides which agent or tool gets the next step. It speaks A2A to external agents and the native protocol to Vertex agents.
  • Identity and policy stack. Everything runs under signed identities. Map users and agents to roles, scope down secrets, and use policy objects to set guardrails on data, time, spend, and network egress.
  • Tool and data adapters. Connectors to your systems of record and systems of engagement. Wrap each tool with a capability descriptor that A2A can advertise.
  • Code sandbox. An ephemeral runtime for transformations and glue code. Only the sandbox can reach sensitive endpoints, and only with scoped tokens.
  • Memory and state. Short term conversation state lives with the session. Durable institutional memory lives in the Memory Bank with explicit schemas, retention rules, and approvals for write access.
  • Telemetry and evaluation. Centralized logs for messages, tool calls, resource usage, and outcomes. An evaluation harness runs regression suites on the tasks that matter, like invoice matching or procurement approvals.

A basic deployment flow looks like this:

  1. A user starts a request in the web console. The browser opens a streaming session and sends an initial task with the user identity attached.
  2. The orchestrator checks policy and consults the Memory Bank for relevant durable memory. It enriches context and forwards a typed Request to the lead agent.
  3. The agent plans the work. For code steps, it emits a sandbox job with a spec that declares timeouts, resource limits, and required secrets by name, not by value.
  4. If the plan requires external agents, the orchestrator initiates A2A handshakes. Each external agent responds with a Proposal that includes scope and expected cost. The orchestrator selects one or more and issues a contract.
  5. As tools run, the agent streams partial results. The console can ask clarifying questions or inject approvals without ending the turn.
  6. Results are written to the target system. A durable memory update is proposed. A human or policy engine approves the write. The Memory Bank stores the lesson with metadata, including provenance and retention.
  7. Telemetry flows to analytics. Your evaluation harness runs post hoc checks on accuracy, cost, and timing.

You can build this structure with a small team because the heavy lifting is in the platform. The new pieces replace custom glue that used to consume months.

A concrete use case: invoice resolution across systems

Imagine a global manufacturer with a backlog of mismatched invoices. Today, analysts bounce between an enterprise resource planning tool, a vendor portal, and a document system. A multi agent team resolves these mismatches in minutes.

  • The intake agent receives an exception from the enterprise resource planning system and streams a summary to the analyst.
  • The documents agent extracts fields from scans, runs a quick code transform in the sandbox, and normalizes line items.
  • The pricing agent checks contracts and discounts, some of which are stored as durable memory snippets from past negotiations.
  • A vendor agent from a partner platform joins via A2A to fetch shipment data that your company does not store.
  • A compliance agent verifies tax handling, logs the policy checks, and requires a one click approval for large corrections.
  • The orchestrator commits updates to the enterprise resource planning tool and records a new memory: the vendor accepts a specific reconciliation pattern when freight charges appear on the second page.

The change is not only speed. Every step is auditable, data stays in policy, and the team can prove why a correction happened.

What to build first, second, and third

If you are starting in Q4 2025, resist the urge to wire every system. Build three slices that teach the platform how to work.

  • Slice 1: run a single task end to end with streaming and the sandbox. Pick a task that mixes retrieval, transformation, and a write. Prove you can stream partial results, execute code safely, and post to a production system.
  • Slice 2: add A2A with one external agent. Choose a partner agent that brings data or expertise you do not own. Define a contract, test failure modes, and measure latency and cost.
  • Slice 3: write to the Memory Bank with human approval. Design memory schemas that separate preferences, facts, and norms. Use time to live rules so old beliefs retire.

When these are solid, scale horizontally. Add more tools, more agents, and more channels.

Interop across vendors without the pain

Real interoperability requires more than a shared message shape. Treat A2A as a boundary that hides your internal choices and respects those of your partners.

  • Normalize capabilities. Represent tools as capability descriptors with input and output schemas, side effects, and policy tags. Publish only what you are willing to support.
  • Translate politely. If a partner uses a different format for tool calls, keep a translator at the edge. Do not leak internal idiosyncrasies into the contract.
  • Keep contracts small. Bound each engagement by time, data scope, and spend. Renew if needed. Small contracts reduce blast radius and make billing simpler.
  • Share provenance. Include signatures and hashes for critical outputs so downstream agents can verify lineage without calling back to you.

The ecosystem is converging on these ideas across platforms. You can see similar patterns in how AWS AgentCore’s September update moved agents closer to enterprise native, and in how Agentforce 3 makes agents production grade centered governance as a first class feature. For connectors and tool catalogs, the push toward common descriptors echoes the momentum behind Boomi brings MCP to Agentstudio.

Security and governance in practice

Security is where many agent initiatives stall. The new primitives allow a conservative posture without killing velocity.

  • Threat model the tools. For each tool, list data access, network egress, and side effects. Place tools behind the sandbox when possible. For tools that must reach sensitive systems, require short lived tokens issued per job.
  • Enforce least privilege with policy objects. Policies set data filters, cost ceilings, and time budgets. Contracts inherit from policy and must be logged.
  • Block prompt injection at the edges. Use input sanitizers and a catalog of known bad patterns. Add canary instructions to detect hostile overrides.
  • Keep humans in the loop for writes and memory updates. Require approvals for irreversible actions and grant one time privileges rather than long lived roles.
  • Log at the message and tool level. Capture who asked, what was asked, the plan, tool invocations, results, and any external contracts. This is the audit trail regulators expect.

The result is a system that can pass internal review without becoming a fortress no one uses.

Operating the fleet, with numbers that matter

Once you move from pilots to production, run the agent fleet like an application platform. Pick a handful of metrics that tie to outcomes and publish them where executives already look.

  • Time to first token and time to task completion. Streaming should cut the first significantly while keeping the second predictable.
  • Cost per resolved case and cost variance. Contracts and policy objects help cap spend spikes.
  • Assist rate and deflection rate. Track how often the system resolves a task end to end and how often it provides a useful partial result that saves human time.
  • Error classes, not just counts. Separate hallucination with low stakes from policy violations and failed commits. Each class has a different owner and fix.
  • Memory hit rate. Measure how often durable memory accelerates a task and how often it is rejected by policy or humans.

When the numbers move, roadmaps move.

How these primitives reshape enterprise roadmaps

Agent programs have lived in two extremes. Either a showpiece pilot that never touched core systems, or a sprawling custom build that could not survive a platform change. The September 2025 package creates a middle path that is both practical and forward looking.

  • Standardized handoffs. A2A means business units can procure agents from different vendors and still work together. Enterprise architecture teams will publish standards for contracts, capability descriptors, and audit requirements. Procurement will ask for A2A compliance by default.
  • Safer autonomy. The sandbox and policy objects make it feasible to grant agents scoped autonomy. Teams can authorize low risk writes and code transforms without weeks of review, while reserving high risk actions for approvals.
  • Memory as a first class asset. The Memory Bank will push product teams to curate durable knowledge rather than bury it in prompts. Expect playbooks and norms to be encoded as memory with owners and expiration dates. Compliance teams will welcome a consistent place to review and purge.
  • Real time collaboration. Streaming changes the user experience. Agents will begin to narrate, ask clarifying questions, and show work in progress. Designers will craft patterns for repair, correction, and escalation inside the flow.
  • Vendor strategy. With A2A in place, enterprises can build fleets that include specialized agents from niche vendors. Core platforms will compete on governance, performance, and ecosystem depth rather than lock in. The winning roadmap prioritizes clean contracts over proprietary glue.

What to watch in the next two quarters

A few inflection points will signal whether the ecosystem is realizing the promise.

  • Cross vendor incident response. Security teams pilot joint playbooks where a detection agent from one vendor contracts a containment agent from another while your internal compliance agent records the chain of custody.
  • Agent catalogs in enterprise marketplaces. Expect catalogs where capability descriptors are validated, policies are pre attached, and trials run in a shared sandbox.
  • Pricing models that bill by contract. As A2A contracts become the unit of work, billing will follow. This will simplify chargebacks and make costs track value more closely.
  • Memory governance reviews. Audit and legal teams start treating durable memory as a regulated record in certain industries. The Memory Bank will need clear retention features and export controls.

A playbook for leaders

If you oversee an enterprise agent program, give your teams concrete tasks.

  • Publish a contract standard. Define required fields for scope, identity, data categories, spend caps, and retention. Provide a linter that blocks non conforming contracts from production.
  • Approve a starter capability schema. Keep it small enough to be adopted, rich enough to be useful. Add side effect tags like write, delete, or external call so policy can reason about risk.
  • Fund an evaluation bench. Select ten tasks that represent real value, like claims reconciliation or quote generation, and run them nightly across versions. Tie go or no go decisions to these results.
  • Create a memory council. Appoint owners for durable memory categories, set time to live defaults, and require provenance for every write.
  • Set a target for interop. Pick two non Google agents to integrate through A2A before the end of the quarter. Use the exercise to flush out translation issues and policy gaps.

These actions turn a vendor release into lasting momentum rather than another announcement in the rearview mirror.

The bottom line

The September 2025 upgrades brought the boring but essential parts of engineering to the agent world, and that was the point. Interoperability through A2A, safe execution through the sandbox, real time collaboration through streaming, and durable knowledge through the Memory Bank add up to an operable foundation. With these primitives, enterprise teams can ship multi agent systems that cross vendor lines, respect policy, and improve month after month. The era of one off demos is over. The era of agent fleets that pull their weight has begun.

Other articles you might like

AgentKit and ChatGPT Apps Make Agents a Native Platform

AgentKit and ChatGPT Apps Make Agents a Native Platform

At DevDay 2025, OpenAI turned agents into a first class platform. AgentKit and ChatGPT Apps combine runtime, safety, and distribution so startups can ship permissioned workflows with computer use and connectors from day one.

GitHub Copilot Agent Goes GA, DevOps Adds a New Teammate

GitHub Copilot Agent Goes GA, DevOps Adds a New Teammate

GitHub’s autonomous coding agent for Copilot is now generally available, bringing draft pull requests, auditability, and enterprise guardrails to the software lifecycle. Pilot it in 30 days and measure real impact.

Agentforce 3 Makes AI Agents Production Grade for Enterprises

Agentforce 3 Makes AI Agents Production Grade for Enterprises

Agentforce 3 turns AI agents into accountable, production-grade services with a Command Center for observability, grounded citations, automatic model failover, and FedRAMP High. Here is the playbook to adopt it.

AWS AgentCore’s September update makes agents enterprise native

AWS AgentCore’s September update makes agents enterprise native

AWS AgentCore just added VPC networking, PrivateLink, CloudFormation, and tagging on September 25, 2025. These controls move agents from demos to governed production. Learn how to design for security, cost, and scale.

Comet’s background assistant makes the browser an agent

Perplexity Comet’s background assistant is now public, showing how the browser can host real agents that plan, act, and ask for consent before they click. Here is what changes, why it matters, and how to try it today.

Neo4j bets $100M to make graph memory the agent norm

On October 2, 2025, Neo4j unveiled Aura Agent in early access and a native MCP server, backed by a $100M investment. The goal is to move enterprise agents from brittle vector recall to persistent, explainable graph memory.

Instant Checkout Goes Live: ACP Turns Chat Into Commerce

On September 29 to 30, 2025, OpenAI and Stripe introduced Instant Checkout and the Agentic Commerce Protocol. Learn how ACP standardizes agent to merchant transactions, what changes for Etsy and Shopify sellers, and how to adopt it in 90 days.

Boomi brings MCP to Agentstudio, the USB-C for agents

Boomi brings MCP to Agentstudio, the USB-C for agents

Boomi’s September 2025 update brings Model Context Protocol to Agentstudio, turning existing connectors into safe, schema-based tools that agents can discover, trust, and govern. See what it unlocks now and how to adopt it with confidence.

Microsoft Security Store puts autonomous agent teams in charge

Microsoft Security Store puts autonomous agent teams in charge

Microsoft’s Security Store pairs a no code builder with a curated marketplace so SOCs can deploy coordinated AI agents that investigate, enforce, and learn under guardrails. Here is how to evaluate, adopt, and govern the shift.