Connect with us

Funding & Business

Employee AI agent adoption: Maximizing gains while navigating challenges

Published

on


While agentic AI definitely marks a turning point in human-computer interaction, moving from tool use to collaboration, the next step is integrating these agents and actually deriving value. At VentureBeat’s Transform 2025, Matthew Kropp, managing director and senior partner at BCG, offered a game plan for workflow evolution, employee adoption, and organizational change.

“The companies that are at the top of this curve — what we call future built, the ones that are most mature — are seeing substantial results: 1.5 times more revenue growth, 1.8 times higher shareholder value,” Kropp said. “There’s value here, but we’re early.”

Deploy, reshape, invent

To take advantage and create value with AI and with agents, a company needs to determine where to focus, using a deploy, reshape, invent framework. AI is already being deployed in every enterprise, and will have agents within the next few years. But if you give an employee a chatbot, you haven’t changed the way the work is done. You have to rethink the work, and reshape functions, departments, and workflows by identifying where human work can be automated.

“We’re advising companies right now to focus on your three or four big rocks. If you have a big customer support organization, you should apply AI in customer support. It has a huge impact. If you have a big engineering organization, you should employ tools like Windsurf to reshape the way that you do engineering, software development.”

Invention is still in the very early stage, but enterprises should be thinking about how to use AI’s ability to be creative, reason, and plan. Look at services and products, and how you interact with customers: can you reinvent that using those capabilities?”

For instance, makeup company L’Oreal launched a virtual beauty advisor to scale that exclusive service beyond their retail locations, reinventing the way they think about interacting with their customers at scale.

Thinking beyond basic use cases

It’s also critical to think about how AI changes your business. There’s been a lot of focus in the last couple of years on cost reduction by replacing workers, but that isn’t big-picture thinking. AI amplifies the employees you currently have, dramatically increasing their productivity.

“This is what we’re seeing in software development,” he said. “I don’t think we’ll see companies laying off their software developers. We’re going to see a massive explosion in the amount of capability and features that software companies are building.”

In a study BCG conducted with Harvard, Wharton, and MIT, they asked 750 knowledge workers to write a business and marketing plan, with and without generative AI. The participants using GPT4 executed 25% faster, completed 15% more tasks, and the quality of their output was 40% better. And when given an LLM, the bottom performers in the baseline did just as well as the top performers.

“It brought everyone’s performance up, which is very powerful, because in most organizations the new joiners are less effective than more experienced people,” he said. “It has the ability to increase time to proficiency.”

AI can also surpass human scale, even open up new applications that were not previously possible. For example, in the medical space, outcomes for patients are significantly improved with preoperative and postoperative follow-up from a nurse, but implementing this has been cost-prohibitive — until the advent of AI nurses that can take on that task for a large patient population.

Overcoming the biggest hurdle: Adoption

While these tools are fantastic, people aren’t using them. BCG tracked the adoption of GitHub Copilot and productivity metrics for an organization with about 10,000 software engineers. The top 5% engineers doubled in productivity in four months, while 60% showed zero improvement, because they just didn’t adopt the tool at all.

Why won’t humans adopt? There are three reasons. First is capability ignorance. The second, habit inertia. The third is identity threat, and that is the hardest to overcome. Developers are asking, “If this AI can write code for me then who am I? What’s my value?”

“This is going to be the real work of the next three to five years,” Kropp said. “It’s getting people to use the agents.”

Strategies overcoming reluctance

There are a few valuable ways to overcome these challenges. Naturally, getting the right tool is the first step, and integrating it with the way people work by training them explicitly. It’s also critical to measure and celebrate adoption for those employees actively using the tools so that everyone else starts to see they need to get on this bandwagon.

Another important step is ramping up scarcity — that means taking away resources so employees need to do more with less. At the same time, it’s essential to redesign work processes hand-in-hand with those employees who are on the front lines. Don’t just identify laborious processes where manual work can be automated — identify the parts where humans bring value.

“We minimize the toil and we maximize the joy,” Kropp said. “We’re left with a much more efficient process, a much more efficient company, a much more productive workforce, and jobs that people like to be in.”



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Funding & Business

Trump’s Copper Tariffs Set to Include Products for Power Grids, Data Centers

Published

on




US President Donald Trump’s plan to impose 50% import tariffs on copper are set to include the kinds of materials used for power grids, the military and data centers.



Source link

Continue Reading

Funding & Business

CISO dodges bullet protecting $8.8 trillion from shadow AI

Published

on


Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now


VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, reveals why enterprise browsers are quickly becoming the frontline defense against shadow AI in its many forms.   

Evans faced a critical challenge in October 2023. Standing before Clearwater Analytics’ board, he had to confront concerns that employees might inadvertently expose data that could potentially compromise the firm’s $8.8 trillion assets under management.  

“The worst possible thing would be one of our employees taking customer data and putting it into an AI engine that we don’t manage,” Evans told VentureBeat. “The employee not knowing any different or trying to solve a problem for a customer…that data helps train the model.”

Here is our conversation with Evans, edited for length and clarity

VentureBeat: How do you see AI shaping cybersecurity today?

Evans: The attacks have become significantly more sophisticated. If you consider it from the perspective of a bad actor, the phishing emails and attempts we receive have become much more complex. However, AI also possesses response capabilities.

I like to explain it to our board, as the ultimate cat-and-mouse game. As bad actors start to use AI to advance phishing, or perhaps expedite the time it takes for exploits to emerge after vulnerabilities are announced, there’s the opposite side of security practitioners using AI to help advance how we respond.

VentureBeat: How is AI helping your defensive capabilities?

Evans: We’ve begun integrating AI into our security playbooks. By doing so, our security analysts now spend less time searching and hunting. The AI is involved in the security operations center (SOC) product, conducting its initial triage analysis and saying, “Based on previous things that we’ve seen and things in my model, this is where I’d like to guide you.”

On the defensive side, we’re really starting to see AI come into play. CrowdStrike, Sentinel One, Microsoft Defender, the traditional extended detection and response (EDR) products were using some machine learning, and they would get to a probability of maybe 85% that this could be a threat, but we’re not really sure. However, AI enriches the EDR engine’s ability to reach a higher probability rate of identifying a threat.

VentureBeat: What keeps you up at night when it comes to AI and cybersecurity?

Evans: The thing that does worry me quite a bit is the deepfakes. You read multiple stories about people using deepfakes to impersonate a CEO to initiate wire transfers. Those are concerning because they do look very, very real.

But the biggest concern? The worst possible thing would be one of our employees taking customer data and putting it into an AI engine that we don’t manage, and then it becomes data that helps train the model.

VentureBeat: How did you explain this shadow AI risk to your board?

Evans: I remember when one of the first board meetings I was in, they asked me, “So what are your thoughts on ChatGPT?” I said, “Well, it’s an incredible productivity tool. However, I don’t know how we could let our employees use it, because my biggest fear is somebody copies and pastes customer data into it, or our source code, which is our intellectual property.”

But I didn’t just come to the board with my concerns and problems. I said, “Well, here’s my solution. I don’t want to stop people from being productive, but I also want to protect it.” When I came to the board and explained how these enterprise browsers work, they’re like, “Okay, that makes much sense, but can you really do it?”

VentureBeat: Walk me through your evaluation and deployment process for Island.

Evans: After that October 2023 board meeting, we started a pretty long due diligence process. We took a look at some of the major vendors in the enterprise browser space.

I’ll share with you ultimately why we went with an Island. We needed to be able to control what browsers people are using on their endpoints. It doesn’t do any good to deploy an enterprise browser when somebody can go and download Opera or “Frank’s browser of the month” and use it, and it just bypasses all of the Island controls.

The other reason we went with Island was truly because of the speed of the deployment. I remember being on a call with Island salespeople, and they’re saying, “We believe we can get this deployed in your company in a matter of weeks.” I’m like, “Oh, that’s BS.”

VentureBeat: But they delivered?

Evans: They took it as a personal challenge! We started our Island deployment in April 2024 with about 200 people. We went the extension route first; the Island extension in Chrome and Edge.

It wasn’t until July when the board asked, “How is it going?” And I said, “How about I just show you?” I pulled up a screenshot because, you know, Murphy’s Law demos always fail. So I showed them screenshots, “Here I am on ChatGPT. I tried to paste something in. I got the prompt: ‘Island policy prevents you from doing this.’”

They’re like, “Wow, this is fantastic! But people can still utilize the tool to ask good questions?” I said, “Yeah, absolutely. They just can’t put data into it.”

VentureBeat: Do you feel that Island assures you and reduces the risk of Shadow AI?

Evans: It definitely has helped us get a handle on shadow AI. No security tool is 100% perfect. Having deployed Island, we definitely sleep a lot easier. We can feel reasonably comfortable that if an employee is going to an AI instance that we don’t have licensed, they can use it, but can’t paste data or upload files.

It’s also helped us identify where we have gaps. Employees found this really great AI widget thing, they come to the security team, “Hey, look, check this out.” And then we can come back to our product development teams and figure out how we help enable this, not just for our employees, but for our customers.

VentureBeat: How do you defend against deepfakes?

Evans: That’s a tough one to wrap your arms around. We have an excellent security awareness program. We ask employees to use common sense. Do you really think Sandeep Sahai, our CEO, is going to call you up and ask you to buy him Apple gift cards?

We’ve set up a lot of checks and balances, kind of like the two-person buddy check system. There’s no technology solution for something like that. It’s a human problem that we’ve had to implement a human solution.

VentureBeat: What advice would you give other CISOs facing shadow AI?

Evans: This isn’t just about blocking, it’s about enablement. Bring solutions, not just problems. When I came to the board, I didn’t just highlight the risks; I proposed a solution that balanced security with productivity.

Welcome to the shadow AI arms race

Evans’ insights reveal how quickly shadow AI has become an existential threat to every data-intensive business.  

“We see 50 new AI apps a day, and we’ve already cataloged over 12,000,” Itamar Golan, CEO of Prompt Security, told VentureBeat, quantifying what security teams are calling their worst nightmare since ransomware.

The onslaught of unauthorized AI use and apps has triggered intense competition among security vendors. “Most traditional management tools lack comprehensive visibility into AI apps,” Vineet Arora, CTO of WinWire, explained to VentureBeat, pinpointing exactly why shadow AI flourishes as legacy security architectures are blind to it.

The vendor ecosystem has crystallized into four distinct battlegrounds, each with its weapons and weaknesses.

Enterprise browsers lead the charge. Foremost among them is Island, which recently raised a $250 million funding round, a vote of confidence from the investor community. While Island bets on pre-encryption visibility, Google Chrome Enterprise attacks shadow AI differently, weaponizing its market dominance and Google’s security stack. Chrome Enterprise Premium delivers data loss prevention (DLP) controls that block data flows to ChatGPT and other AI tools, prevent cross-profile contamination and enforce real-time content scanning. The platform exposes shadow AI usage patterns while blocking both accidental pastes and deliberate exfiltration. Strategic partnerships with Zscaler and Cisco Secure Access amplify Chrome’s reach to create an ecosystem where zero-trust principles extend directly to AI interactions.

SASE/SSE platforms deliver enterprise-scale defense. Netskope and Zscaler bring scale to shadow AI defense through their cloud-native security access service edge (SASE) architectures. Both platforms process billions of transactions daily across global infrastructures, with Netskope specifically advertising its ability to monitor AI application usage across enterprises. Their key limitation: When 73.8% of workplace ChatGPT usage occurs through personal accounts, SSL/TLS encryption prevents platforms from inspecting content, forcing them to rely on traffic patterns and metadata, leading to visibility gaps where shadow AI operates undetected.

Traditional DLP vendors struggle to adapt. Legacy vendors Forcepoint and Microsoft Purview have a strong legacy to trade on when it comes to battling shadow AI. Forcepoint claims 1,700-plus classifiers while Purview leverages AI to triage tasks. But here’s the problem: They’re retrofitting 20th-century architectures for 21st-century threats. These platforms excel at compliance checkboxes and policy templates but fail to keep up with AI’s quicker pace.

As Daren Goeson, Ivanti’s SVP of product management for UEM told VentureBeat: “AI-powered endpoint security tools can analyze vast amounts of data to detect anomalies and predict potential threats faster and more accurately than any human analyst.” Traditional DLP operates at audit speed. Shadow AI moves at machine speed.

Specialized solutions fill critical gaps. Innovation thrives in the niches that legacy vendors ignore. One example is Ivanti Neurons, which delivers comprehensive device discovery through its UEM platform, exposing shadow AI hiding in endpoints that traditional tools miss. Mike Riemer, Ivanti’s Field CISO, sees the bigger picture: “Security professionals will effectively leverage the capabilities of gen AI to analyze vast amounts of data collected from diverse systems.” Nightfall, for its part, targets developer teams with transformer models, claiming 2x detection accuracy for API based AI tools.

Comparing Shadow AI Defense Solutions

VendorTypeKey StrengthsLimitationsBest For
Check Point HarmonyBrowser extensionLeverages existing infrastructureLimited to extensionCheck Point customers
ForcepointTraditional DLP1,700+ classifiers, regulatory complianceLegacy architectureHighly regulated industries
Google Chrome EnterpriseEnterprise browserMarket dominance, native integrationLess specialized controlsGoogle Workspace organizations
IslandEnterprise browserPre-encryption visibility, zero latency, Rapid deploymentHigher cost per userEnterprises with sensitive data
Ivanti NeuronsUEM PlatformComprehensive device discoveryNot browser-specificAsset management focus
Microsoft PurviewDLP PlatformNative Microsoft integration, AI-powered triageMicrosoft-centricMicrosoft 365 enterprises
NetskopeSASE/SSE PlatformComprehensive coverage, 370+ AI app monitoringPost-encryption complexityLarge distributed enterprises
NightfallAI-Native DLP2x detection accuracy, Transformer modelsAPI-only approachDeveloper-centric teams
Talon Cyber SecurityEnterprise BrowserBrowser + extension optionsNewer to marketSecurity-conscious SMBs
ZscalerSASE/SSE Platform536B daily transactions, true zero-trustCloud-only approachCloud-first organizations

VentureBeat analysis

What’s driving the market to move so fast? VentureBeat’s analysis found 74,500-plus shadow AI apps actively deployed across major consulting firms alone, and that’s growing 5% monthly. By mid-2026, that number could hit 160,000. Each represents a potential data breach, compliance violation, or competitive intelligence leak.

Arora’s prescription cuts through vendor hype: “Organizations must define strategies with robust security while enabling employees to use AI technologies effectively. Total bans often drive AI use underground, which only magnifies the risks.”



Source link
Continue Reading

Funding & Business

Pimco Sees Japan Wooing Capital as Tariffs Spur Diversification

Published

on

Japan has emerged as a prime destination for global investors as the trade war triggers a reassessment of capital flows into the US, according to Pacific Investment Management Co.



Source link

Continue Reading

Trending