Understand the Shift Toward AI-Driven Interactions: ​A Guide to MCP

Akamai Wave Blue

Feb 12, 2026

Maxim Zavodchik and Boris Kirzner

Maxim Zavodchik

Written by

Maxim Zavodchik

Maxim Zavodchik is an experienced security research leader with a proven track record in establishing, growing, and defining strategic vision for Threat Research and Data Science teams in Web Application Security and API Protection. When he’s not protecting life online, you can find him being a super dad and/or watching Studio Ghibli movies.

Boris Kirzner

Written by

Boris Kirzner

Boris Kirzner is a Senior Product Manager at Akamai, responsible for product vision, strategy, and operations of client-side protection products. He has a strong architectural design, software development, and security background, with more than 20 years of experience in creating cloud-based security products from inception to launch, including web applications protection, bot management, and client-side protection. Boris has a Master of Engineering degree in Information Systems and a Bachelor of Science degree in Computer Science from Technion — Israel Institute of Technology.

Share

Model Context Protocol (MCP) is rapidly emerging as the answer to a pressing question facing today’s leaders: How do I optimize my business for AI? 

Think of MCP as a Swiss Army Knife for AI: one interface, many possibilities, built from the tools your business chooses for AI to use.

Why MCP is gaining momentum: The business case for AI-driven interfaces

Enterprises now use AI for complex, business-critical tasks such as inventory management, booking processing, customer issue resolution, and workflow coordination. These capabilities require a secure, structured interface so AI can interact with applications. MCP supports this transition, enabling AI to act as a task executor rather than just an information provider.

Leading companies view MCP and similar protocols as the emerging standard interface among enterprise systems and AI. They expect these protocols to accelerate automation, improve user experiences, and unlock new business value.

MCP: New and evolving

MCP is new and evolving, with no established standards for development, deployment, exposure, or security. Tooling remains incomplete, best practices are still emerging, and the fast-changing AI landscape presents challenges even for the most experienced teams. Early adoption requires higher risk tolerance. Enterprises should balance rapid adoption with caution, recognizing both the opportunities and uncertainties.

The current environment creates pressure and uncertainty for business leaders. Rapid adaptation is necessary to remain competitive, but the evolving risk landscape complicates the identification of vulnerabilities and the implementation of safeguards. The attack surface is also expanding faster than most organizations can track, making risk assessment and control even more challenging.

Ultimately, enterprises will adopt MCP to gain agility, clarity, and security, and achieve business value while managing risk.

What MCP enables — and the decisions that leaders need to make

Although MCP can support various internal workflows, this blog post focuses on using MCP to expose or consume business capabilities in a structured, AI-friendly manner. These approaches will drive early customer-facing impact and competitive differentiation, which will require timely decisions from leaders.

Enterprises are gravitating toward two main adoption patterns:

  1. External AI applications consume your business services through MCP

  2. Your AI applications consume third-party business services via MCP

External AI applications consume your business services through MCP

This approach enables new AI-enhanced customer experiences. Retailers, hospitality brands, travel platforms, insurers, and software as a service (SaaS) providers are already exploring how AI agents such as ChatGPT, Alexa-based agents, or partner AI applications can search for products, book services, request quotes, or complete transactions. 

When businesses build agentic workflows on third-party platforms, they must expose MCP externally to give these workflows access to enterprise data and allow them to perform actions.

This creates significant business opportunities but also introduces new challenges, including:

  • New business interfaces become internet-facing. Through MCP, enterprise tools and APIs become accessible to external agents. Leaders must determine which capabilities to expose, at what level of detail, and with what safeguards.

  • Trust boundaries shift from users to agents. Organizations must establish criteria for trusting consuming agents, including which agents are allowed, what identities they present, and what data they can access.

  • Governance must be centralized and consistent. Without clear governance, teams risk creating shadow MCP servers or unmanaged tools, increasing the risk of data exposure, unauthorized actions, and compliance violations.

Executives must determine which workflows can be accessed by AI applications and how to securely expose them.

Your AI applications consume third-party business services via MCP

The second pattern involves enterprise AI assistants, agents, or copilots calling the external MCP servers that are provided by partners, suppliers, or industry platforms. This approach is already occurring in travel, financial services, logistics, ecommerce, and business-to-business SaaS.

This approach offers speed and expanded capabilities, but leaders must consider several factors, such as:

  • Business impact versus business risk: External MCP-driven capabilities can directly drive revenue through bookings, underwriting, or ordering, but they also introduce dependencies on external technologies, tool changes, and potential failure risks.

  • Compliance challenges: Outsourced tool calls may violate enterprise compliance boundaries if data crosses regions, partners, or regulatory zones.

  • Reputational exposure: If an AI application misinterprets an external tool or produces faulty outputs due to external data, users will still associate the outcome with your brand. Leaders must define responsibility and establish effective guardrails.

Executives must determine when to rely on external MCPs and how to govern these dependencies to mitigate risk.

How to adopt MCP responsibly

Principles for safe MCP adoption

Across industries, early adopters implement strategies to maximize value and address common challenges.

  • Explicitly chosen MCP role: Clearly define whether your organization is exposing MCP for third-party AI applications or building AI applications that consume third-party MCPs. These are distinct adoption paths with different trust models, risk profiles, governance needs, and failure modes. Treating them as a single use case leads to unclear ownership, weak controls, and increased risk of exposure.

  • Internal experimentation and validation: Start with contained use cases in which AI applications interact only with internal MCP servers or are not yet exposed externally. This approach builds organizational experience and highlights governance and security needs early.

  • Controlled exposure: When exposing MCP externally, begin with read-only or low-risk workflows, such as allowing only specific AI agents. Implement stronger identity, policy, and schema controls before enabling transactions or sensitive operations.

  • Centralized governance: Organizations must standardize tracking, control, and auditing of MCP servers, tools, identities, and workflows.

  • Protection and response: Enterprises need real-time controls to authenticate agents, validate schemas, and block MCP and tool misuse before it causes data loss or disruption.

  • Continuous validation: Static controls become outdated quickly. As AI behaviors, schemas, and workflows evolve, leaders should anticipate ongoing schema drift, privilege drift, and new misuse patterns. Continuous testing and red-teaming are essential.

How to start

A practical first step is to make MCP use visible and intentional.

  • Early visibility: As organizations experiment with MCP, the immediate need is to determine whether MCP endpoints exist, who is interacting with them, and what actions are being requested. This visibility transforms MCP from an abstract concept into a concrete security concern that teams can address and prioritize.

  • Accidental exposure prevention: Equally important is avoiding accidental exposure. In early phases, many organizations benefit from a default posture: MCP is not externally accessible unless explicitly approved. This approach allows for experimentation while reducing the risk of unintended data access or automation abuse.

  • Consistent enforcement: From there, existing application security controls naturally extend to MCP-based interactions. This helps organizations distinguish legitimate AI access from abuse, apply consistent trust decisions, and monitor how this new interface layer evolves over time.

  • Measured progression: This approach allows organizations to move forward with MCP deliberately and learn from real activity, reduce unexpected exposure, and build confidence before broader adoption.

How Akamai can help

Akamai enables organizations to act now.

By building on our existing edge, API, and application security platform and extending it with MCP-aware intelligence, we help teams identify where MCP is emerging, apply practical guardrails during experimentation, and manage risk as exposure grows.

This approach allows organizations to adopt MCP today while relying on Akamai to evolve protection, visibility, and control as MCP use develops.

Akamai Wave Blue

Feb 12, 2026

Maxim Zavodchik and Boris Kirzner

Maxim Zavodchik

Written by

Maxim Zavodchik

Maxim Zavodchik is an experienced security research leader with a proven track record in establishing, growing, and defining strategic vision for Threat Research and Data Science teams in Web Application Security and API Protection. When he’s not protecting life online, you can find him being a super dad and/or watching Studio Ghibli movies.

Boris Kirzner

Written by

Boris Kirzner

Boris Kirzner is a Senior Product Manager at Akamai, responsible for product vision, strategy, and operations of client-side protection products. He has a strong architectural design, software development, and security background, with more than 20 years of experience in creating cloud-based security products from inception to launch, including web applications protection, bot management, and client-side protection. Boris has a Master of Engineering degree in Information Systems and a Bachelor of Science degree in Computer Science from Technion — Israel Institute of Technology.

Tags

Share

Related Blog Posts

Security
From Clawdbot to OpenClaw: Practical Lessons in Building Secure Agents
February 18, 2026
OpenClaw’s rapid rise exposed gaps in agent security. Learn how its security failures map to the OWASP Top 10 for Agentic Applications and how to secure AI agents.
Security
Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads
February 18, 2026
Struggling with AI security? Find out how microsegmentation and Zero Trust switching can protect your AI workloads and cloud environments.
Security
Industrialized Ransomware: Confronting the New Reality
February 10, 2026
Read about the new ransomware reality and what most security strategies get wrong. Learn how to protect your organization in 2026.