Model Context Protocol (MCP) is rapidly emerging as the answer to a pressing question facing today’s leaders: How do I optimize my business for AI?
Think of MCP as a Swiss Army Knife for AI: one interface, many possibilities, built from the tools your business chooses for AI to use.
Why MCP is gaining momentum: The business case for AI-driven interfaces
Enterprises now use AI for complex, business-critical tasks such as inventory management, booking processing, customer issue resolution, and workflow coordination. These capabilities require a secure, structured interface so AI can interact with applications. MCP supports this transition, enabling AI to act as a task executor rather than just an information provider.
Leading companies view MCP and similar protocols as the emerging standard interface among enterprise systems and AI. They expect these protocols to accelerate automation, improve user experiences, and unlock new business value.
MCP: New and evolving
MCP is new and evolving, with no established standards for development, deployment, exposure, or security. Tooling remains incomplete, best practices are still emerging, and the fast-changing AI landscape presents challenges even for the most experienced teams. Early adoption requires higher risk tolerance. Enterprises should balance rapid adoption with caution, recognizing both the opportunities and uncertainties.
The current environment creates pressure and uncertainty for business leaders. Rapid adaptation is necessary to remain competitive, but the evolving risk landscape complicates the identification of vulnerabilities and the implementation of safeguards. The attack surface is also expanding faster than most organizations can track, making risk assessment and control even more challenging.
Ultimately, enterprises will adopt MCP to gain agility, clarity, and security, and achieve business value while managing risk.
What MCP enables — and the decisions that leaders need to make
Although MCP can support various internal workflows, this blog post focuses on using MCP to expose or consume business capabilities in a structured, AI-friendly manner. These approaches will drive early customer-facing impact and competitive differentiation, which will require timely decisions from leaders.
Enterprises are gravitating toward two main adoption patterns:
External AI applications consume your business services through MCP
Your AI applications consume third-party business services via MCP
External AI applications consume your business services through MCP
This approach enables new AI-enhanced customer experiences. Retailers, hospitality brands, travel platforms, insurers, and software as a service (SaaS) providers are already exploring how AI agents such as ChatGPT, Alexa-based agents, or partner AI applications can search for products, book services, request quotes, or complete transactions.
When businesses build agentic workflows on third-party platforms, they must expose MCP externally to give these workflows access to enterprise data and allow them to perform actions.
This creates significant business opportunities but also introduces new challenges, including:
New business interfaces become internet-facing. Through MCP, enterprise tools and APIs become accessible to external agents. Leaders must determine which capabilities to expose, at what level of detail, and with what safeguards.
Trust boundaries shift from users to agents. Organizations must establish criteria for trusting consuming agents, including which agents are allowed, what identities they present, and what data they can access.
Governance must be centralized and consistent. Without clear governance, teams risk creating shadow MCP servers or unmanaged tools, increasing the risk of data exposure, unauthorized actions, and compliance violations.
Executives must determine which workflows can be accessed by AI applications and how to securely expose them.
Your AI applications consume third-party business services via MCP
The second pattern involves enterprise AI assistants, agents, or copilots calling the external MCP servers that are provided by partners, suppliers, or industry platforms. This approach is already occurring in travel, financial services, logistics, ecommerce, and business-to-business SaaS.
This approach offers speed and expanded capabilities, but leaders must consider several factors, such as:
Business impact versus business risk: External MCP-driven capabilities can directly drive revenue through bookings, underwriting, or ordering, but they also introduce dependencies on external technologies, tool changes, and potential failure risks.
Compliance challenges: Outsourced tool calls may violate enterprise compliance boundaries if data crosses regions, partners, or regulatory zones.
Reputational exposure: If an AI application misinterprets an external tool or produces faulty outputs due to external data, users will still associate the outcome with your brand. Leaders must define responsibility and establish effective guardrails.
Executives must determine when to rely on external MCPs and how to govern these dependencies to mitigate risk.
How to adopt MCP responsibly
Principles for safe MCP adoption
Across industries, early adopters implement strategies to maximize value and address common challenges.
Explicitly chosen MCP role: Clearly define whether your organization is exposing MCP for third-party AI applications or building AI applications that consume third-party MCPs. These are distinct adoption paths with different trust models, risk profiles, governance needs, and failure modes. Treating them as a single use case leads to unclear ownership, weak controls, and increased risk of exposure.
Internal experimentation and validation: Start with contained use cases in which AI applications interact only with internal MCP servers or are not yet exposed externally. This approach builds organizational experience and highlights governance and security needs early.
Controlled exposure: When exposing MCP externally, begin with read-only or low-risk workflows, such as allowing only specific AI agents. Implement stronger identity, policy, and schema controls before enabling transactions or sensitive operations.
Centralized governance: Organizations must standardize tracking, control, and auditing of MCP servers, tools, identities, and workflows.
Protection and response: Enterprises need real-time controls to authenticate agents, validate schemas, and block MCP and tool misuse before it causes data loss or disruption.
Continuous validation: Static controls become outdated quickly. As AI behaviors, schemas, and workflows evolve, leaders should anticipate ongoing schema drift, privilege drift, and new misuse patterns. Continuous testing and red-teaming are essential.
How to start
A practical first step is to make MCP use visible and intentional.
Early visibility: As organizations experiment with MCP, the immediate need is to determine whether MCP endpoints exist, who is interacting with them, and what actions are being requested. This visibility transforms MCP from an abstract concept into a concrete security concern that teams can address and prioritize.
Accidental exposure prevention: Equally important is avoiding accidental exposure. In early phases, many organizations benefit from a default posture: MCP is not externally accessible unless explicitly approved. This approach allows for experimentation while reducing the risk of unintended data access or automation abuse.
Consistent enforcement: From there, existing application security controls naturally extend to MCP-based interactions. This helps organizations distinguish legitimate AI access from abuse, apply consistent trust decisions, and monitor how this new interface layer evolves over time.
Measured progression: This approach allows organizations to move forward with MCP deliberately and learn from real activity, reduce unexpected exposure, and build confidence before broader adoption.
How Akamai can help
Akamai enables organizations to act now.
By building on our existing edge, API, and application security platform and extending it with MCP-aware intelligence, we help teams identify where MCP is emerging, apply practical guardrails during experimentation, and manage risk as exposure grows.
This approach allows organizations to adopt MCP today while relying on Akamai to evolve protection, visibility, and control as MCP use develops.
Tags