According to a recent LinkedIn post from BonfyAI, the company is emphasizing what it describes as a security gap emerging as enterprises connect AI assistants like Claude Enterprise and Microsoft Copilot to data repositories such as SharePoint and Google Drive. The post argues that traditional data security models focused on classification and user permissions do not fully address whether an AI system should be allowed to use specific data, a challenge it refers to as “The Who” problem.
Meet Samuel – Your Personal Investing Prophet
- Start a conversation with TipRanks’ trusted, data-backed investment intelligence
- Ask Samuel about stocks, your portfolio, or the market and get instant, personalized insights in seconds
The company’s LinkedIn post highlights that many native AI connectors reportedly operate on user-level permissions alone, allowing AI agents to access everything visible to the connecting user without deeper content logic or contextual restrictions. BonfyAI positions its “Contextual Data Enforcement” capability as a layer that intermediates between AI clients and data sources, inspecting content in real time with an entity-aware engine already applied to email, files, and collaboration tools.
As shared in the post, BonfyAI also points to a new MCP server capability that enables AI agents to consult the platform during their reasoning processes rather than solely at endpoint interactions. This suggests a move toward continuous, context-aware policy enforcement for AI workflows, potentially appealing to enterprises seeking more granular controls over generative AI data usage and compliance in regulated sectors.
For investors, the post suggests that BonfyAI is targeting a growing niche at the intersection of AI adoption and data protection, where enterprises are concerned about governance, leakage, and regulatory exposure. If the company’s approach gains traction, it could strengthen BonfyAI’s positioning in the AI data security and DLP market, though ultimate financial impact will depend on customer adoption, integration with leading AI platforms, and competition from established cybersecurity vendors.

