Skip to Content

Is using AI browsers at work a security violation according to Gartner?

How do agentic AI browsers threaten enterprise cybersecurity protocols?

Your cybersecurity strategy requires an immediate pivot regarding web access tools. Effective December 1, 2025, Gartner advises Chief Information Security Officers (CISOs) to block all “AI browsers” and “agentic” web tools. This recommendation stems from a critical risk assessment: current security protocols cannot adequately protect enterprise data from the autonomous capabilities of these new platforms. Unless your IT department can certify zero risk—a near impossibility with current technology—strict prohibition is the only safe course of action.

The Shift from Passive Surfing to Autonomous Action

To understand the threat, you must distinguish between traditional and agentic browsing. Standard browsers display information for you to read. New AI browsers, such as OpenAI’s Atlas, Perplexity’s Comet, and AI-enhanced versions of Chrome and Edge, act as agents. These tools do not just display data; they process it. They summarize documents, execute searches, and autonomously complete transactions. This transition from passive viewing to active participation introduces vulnerability. When a browser can click buttons and fill forms on your behalf, it becomes a high-value target for malicious actors.

The Mechanics of Data Leakage

The architecture of AI browsers creates an inherent privacy flaw. These tools function by utilizing a “side-car” or sidebar interface that constantly communicates with a cloud-based Large Language Model (LLM). To provide summaries or context, the browser sends the contents of your active tabs—including proprietary data, customer records, or internal communications—to a third-party server.

Gartner analysts Dennis Xu and Evgeny Mirolyubov highlight that default settings prioritize user experience over data sovereignty. Consequently, sensitive session data flows into external AI backends by default. For an enterprise, this equates to a continuous, uncontrolled data breach. Mitigating this requires complex, centralized management of privacy settings that most organizations are not yet equipped to handle.

The Threat of Prompt Injection

The most distinct danger lies in “prompt injection.” This occurs when a website contains hidden instructions designed to manipulate the AI agent. Because the AI browser reads the code of the page to assist the user, it can be tricked by malicious commands embedded in that code.

Consider the implications for corporate integrity. An employee visiting a compromised site could unknowingly trigger their browser to navigate to a phishing page or surrender login credentials. In more severe scenarios involving supply chain management, a compromised vendor site could manipulate the browser into altering order quantities or delivery schedules. The agent follows the instruction because it cannot distinguish between a user command and a malicious website command.

Why Employee Training Is Insufficient

You might consider training employees to use these tools safely, but Gartner advises against this reliance. Human error remains the weakest link in cybersecurity. The “Cybersecurity Must Block AI Browsers for Now” report indicates that employees often bypass security for convenience. Staff may use AI agents to automate mandatory training or expedite procurement tasks, ignoring protocols.

Expecting users to discern which tab data is safe to send to an AI backend places an unrealistic cognitive burden on the workforce. The probability of accidental data exposure is too high to manage through policy alone.

Strategic Recommendation

The consensus is clear: the utility of AI browsers does not currently justify the security debt they create. Until vendors can guarantee that agentic functions operate in a sealed, local environment without susceptibility to external manipulation, these tools have no place on corporate networks. Direct your security teams to blacklist known AI browsers and disable agentic extensions in standard browsers immediately. Innovation is valuable, but not when it compromises the foundational security of the enterprise.