Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried Tecno’s modular phone concept at MWC – and it quickly got weird

    March 4, 2026

    USB Hubs Can Save You Lots of Hassles—Here Are 5 We Like Best in 2026

    March 4, 2026

    Google and Epic look to bury the hatchet with new app store settlement

    March 4, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»AI & Software»Proliferation of on-premise GenAI platforms is widening security risks
    AI & Software

    Proliferation of on-premise GenAI platforms is widening security risks

    Michael ComaousBy Michael ComaousAugust 4, 20254 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Proliferation of on-premise GenAI platforms is widening security risks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The three months to the end of May this year saw a 50% spike in the use of generative artificial intelligence (GenAI) platforms among enterprise end users, and while security teams work to facilitate the safe adoption of software-as-a-service (SaaS) AI frameworks such as Azure OpenAI, Amazon Bedrock and Google Vertex AI, the use of unsanctioned on-premise shadow AI now accounts for half of AI application adoption in the enterprise and is compounding security risks, according to a report.

    The study, compiled by data protection and threat prevention platform supplier Netskope, examined the gathering shift among users to relying on on-premise GenAI platforms, which they are mostly using to build out their own AI agents and applications.

    These platforms, which include tools such as Ollama, LM Studio and Ramalama, are now the fastest-growing category of shadow AI, due to their relative ease of use and flexibility, said Netskope. But, in using them to expedite their projects, employees are granting the platforms access to enterprise data stores and leaving the doors wide open to data leakage or outright theft.

    “The rapid growth of shadow AI places the onus on organisations to identify who is creating new AI apps and AI agents using GenAI platforms and where they are building and deploying them,” said Ray Canzanese, director of Netskope Threat Labs.

    “Security teams don’t want to hamper employee end users’ innovation aspirations, but AI usage is only going to increase. To safeguard this innovation, organisations need to overhaul their AI app controls and evolve their DLP [data loss prevention] policies to incorporate real-time user coaching elements.”

    Probably the most popular way to use GenAI locally is to deploy a large language model (LLM) interface, which enables interaction with various models from the same “store front”.

    Ollama is the most popular of these frameworks by some margin. However, unlike the most widely used SaaS options, it does not include inbuilt authentication, which means users must go out of their way to deploy it behind a reverse proxy or a private access solution that is appropriately secured with fit-for-purpose authentication. This is not an easy ask for the average user.

    Agentic shadow AI is like a person coming into your office every day, handling data, taking actions on systems, and all while not being background-checked or having security monitoring in place
    Netskope report

    Furthermore, while OpenAI, Bedrock, Vertex et al provide guardrails against model abuse, Ollama users must take steps themselves to prevent misuse.

    Netskope said that while on-premise GenAI does have some benefits – for example, it can help organisations leverage pre-existing investment in GPU resources, or help them build tools that better interact with their other on-premise systems and datasets – these may well be outweighed by the fact that in using them, organisations bear sole responsibility for the security of their GenAI infrastructure in a way that would not be happening with a SaaS-based option.

    Netskope’s analysts are now tracking approximately 1,550 distinct GenAI SaaS applications, which its customers can easily identify by running focused searches for unapproved apps and personal logins within its platform for activity classed as “generative AI”. Another way to track usage is to monitor who is accessing AI marketplaces such as Hugging Face.

    Besides identifying the use of such tools, IT and security leaders should consider formulating and enforcing policies that restrict employee access to approved services, blocking unapproved ones, implementing DLP to account for data sharing in GenAI tools, and adopting real-time user coaching to nudge users towards approved tools and sensible practice.

    Adopting continuous monitoring of GenAI use and conducting an inventory of local GenAI infrastructure against frameworks provided by the likes of NIST, OWASP and Mitre is also advisable.

    “Agentic shadow AI is like a person coming into your office every day, handling data, taking actions on systems, and all while not being background-checked or having security monitoring in place,” warned the report’s authors.

    GenAI onpremise platforms Proliferation risks Security widening
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleWi-Fi smart bulbs are cheap and easy. They can also leave you hanging
    Next Article One more reason to stick with wired earbuds? Kamala Harris warns ‘I’m just telling you that’s a little bit more secure’ than wireless earbuds after her experience in intelligence briefings
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    3 Mins Read

    This fake Google Security check can steal your passwords. Here’s how to stay safe

    4 Mins Read

    A Meta AI security researcher said an OpenClaw agent ran amok on her inbox 

    2 Mins Read

    Lawsuit: EPA revoking greenhouse gas finding risks “thousands of avoidable deaths”

    4 Mins Read

    Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents

    1 Min Read

    Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts

    10 Mins Read

    The DJI Romo robovac had security so poor, this man remotely accessed thousands of them

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025564 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Our Picks

    I tried Tecno’s modular phone concept at MWC – and it quickly got weird

    March 4, 2026

    USB Hubs Can Save You Lots of Hassles—Here Are 5 We Like Best in 2026

    March 4, 2026

    Google and Epic look to bury the hatchet with new app store settlement

    March 4, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.