Traditional stacks still look at slices of the problem, an endpoint, a SaaS app, a proxy, an LLM firewall, but agents don’t respect those boundaries. A single agent task can traverse file repositories, SaaS tools, LLMs, MCP servers, and outbound channels in minutes, while most controls only see one hop of that flow.
Bonfy’s CEO and Co‑Founder, Gidi Cohen, recently outlined why data security for AI agents is now a multi‑dimensional problem in his Substack article, “Data Security for AI Agents: The Missing Dimension.” Building directly on that perspective, this post explains how Bonfy translates that problem statement into a concrete, enterprise-ready solution, closing the gaps across west–east data flows, north–south agent control planes, and the often overlooked realm of data in use inside agent reasoning loops.
Bonfy’s adaptive content security platform is built as a multi-channel engine that governs data at rest, in motion, and in use across email, files, SaaS apps, collaboration tools, AI systems, and AI agents. Instead of treating “agent security” as a new silo, Bonfy extends the same contextual, entity-aware controls you already use for human workflows into increasingly autonomous AI workflows.
On the west–east axis, agents amplify the classic risks: overshared files in SharePoint or Google Drive, sensitive records scattered across CRMs and ITSM tools, and confidential content moving through email and collaboration channels. As Gidi notes, what used to be relatively simple, human-driven flows are now multi-hop journeys involving LLMs, RAG pipelines, internal automations, and agents that read, write, and send data autonomously.
Bonfy addresses this surface by:
This gives organizations the west–east visibility Gidi calls for: understanding what data agents can touch, where it resides, and how it moves across channels long before it shows up inside an agent reasoning loop.
The harder dimension in Gidi’s article is the north–south control plane — how agents interpret instructions, assemble context, invoke tools, call MCP servers, and orchestrate multi-step workflows with delegated, privileged, authority. That’s where traditional controls struggle, because the most sensitive handling happens in transient, in-memory contexts that never exist as a single file or network object.
Bonfy’s architecture is explicitly designed to instrument this plane without forcing you into a new agent framework or security model:
In other words, Bonfy makes the north–south plane data‑aware rather than configuration-only, so you can reason about what agents actually see, use, and emit — not just how they were configured on paper.
Gidi highlights data in use as the missing dimension: the transient, token-level context that blends user prompts, retrieved documents, tool responses, and intermediate reasoning steps, often spanning multiple trust domains and surfaces. That is precisely the gap Bonfy’s MCP server is designed to close.
Bonfy delivers three complementary control layers for agent workflows:
During a multi-step workflow, the agent can be instructed to:
All three layers run on the same platform, with the same policies, knowledge graph, and explainability, so you don’t end up with one product for email, another for SaaS, and a third bolted onto your agent stack. This is exactly the multi-dimensional, real-time protection model Gidi argues is required when data in use extends beyond the model into MCP servers, APIs, and downstream systems.
Gidi notes that effective protection for agents requires visibility that is multi-channel, multi-state, entity-aware, and workflow-aware — all at once. Bonfy is built so those characteristics are not add-ons, but core design principles:
This directly addresses the gap Gidi highlights between local control coverage and end-to-end risk understanding: security teams stop seeing only fragments (an email alert here, a web event there) and start seeing the full multi-dimensional exposure pattern behind agent-driven workflows.