News

MCPTotal Unfurls Hosting Service to Secure MCP Servers

  • Michael Vizard--securityboulevard.com
  • published date: 2025-10-15 00:00:00 UTC

None

<p>MCPTotal today launched a hosting service to secure the Model Context Protocol (MCP) servers that are now starting to be more widely deployed to streamline data access for artificial intelligence (AI) applications and agents.</p><p>Company CEO Gil Dabah said the Secure Model Context Protocol (MCP) Platform developed by MCPTotal provides a centralized approach to scanning for rogue MCP servers that are being used by cybercriminals to exfiltrate data.</p><p>Originally developed by Anthropic, MCP has become a de facto standard for accessing data via a set of servers that are now being rolled out by nearly every provider of an IT platform. While MCP servers facilitate interoperability, they also create yet another platform that needs to be secured.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>Based on a hub-and-gateway architecture, the Secure MCP Platform limits deployment of MCP servers using a catalog that, via a simple graphical interface, provides access to hundreds of MCP servers that have been vetted for deployment by cybersecurity professionals.</p><p>In addition to providing authentication and credential vaulting, the Secure MCP Platform acts as an AI-native firewall to monitor traffic and enforce policies in real time, said Dabah.</p><p>In contrast, legacy security products and newer offerings for securing large language models (LLMs) are not able to monitor MCP traffic and when needed enforce policies, which creates a need for a platform that surfaces supply chain exposures, prompt injection vulnerabilities, rogue MCP servers, data exfiltration, and authentication gaps, said Dabah.</p><p>The goal is to provide IT teams with an ability to securely host, monitor and sandbox servers so employees can safely use MCP without manually handling application programming interface (API) keys, he added.</p><p><a href="https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1.jpg"><img fetchpriority="high" decoding="async" class="alignnone wp-image-2073120" src="https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1-300x169.jpg" alt="" width="502" height="283" srcset="https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1-300x169.jpg 300w, https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1-1024x576.jpg 1024w, https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1-768x432.jpg 768w, https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1-1536x864.jpg 1536w, https://securityboulevard.com/wp-content/uploads/2025/10/MCPTotal-Dashboard-V1.jpg 1920w" sizes="(max-width: 502px) 100vw, 502px"></a></p><p>It’s not clear how many rogue MCP servers might already have been deployed, but usage of shadow AI tools, platforms and services is on the rise. Most of them to varying degrees, make it possible for AI agents to access sensitive data. However, it’s also been shown that cybercriminals are already starting to compromise MCP servers to exfiltrate data. Cybersecurity researchers at Koi Security <a href="https://securityboulevard.com/2025/10/the-first-malicious-mcp-server-is-a-warning-shot-for-ai-cybersecurity/">detected malicious code within an MCP server</a> that connects AI systems with Postmark email services. The code covertly copies every email and exfiltrates it back to the entities that created the malicious MCP server that was downloaded 1,643 times before being detected.</p><p>It’s more a question of when rather than if additional MCP servers will be compromised. Given the varied types of AI applications and agents being deployed, MCP servers are going to become a honeypot for cyberattacks once adversaries fully appreciate the scope of access they might be able to gain. Unfortunately, many MCP servers are likely to be deployed without cybersecurity teams even being aware they exist until there is an actual incident.</p><p>Hopefully, cybersecurity teams will proactively scan for MCP servers that can be replaced with more secure implementations. That approach doesn’t put cybersecurity teams in the awkward position of outright banning an emerging technology that is playing a critical role in enabling the deployment of AI applications, noted Dabah.</p><p>One way or another, cybersecurity teams will soon be assuming responsibility for securing MCP servers. Exercising more control sooner than later over which ones are deployed in the first place promises to make rising to that challenge a whole lot easier.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/10/mcptotal-unfurls-hosting-service-to-secure-mcp-servers/" data-a2a-title="MCPTotal Unfurls Hosting Service to Secure MCP Servers"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fmcptotal-unfurls-hosting-service-to-secure-mcp-servers%2F&amp;linkname=MCPTotal%20Unfurls%20Hosting%20Service%20to%20Secure%20MCP%20Servers" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fmcptotal-unfurls-hosting-service-to-secure-mcp-servers%2F&amp;linkname=MCPTotal%20Unfurls%20Hosting%20Service%20to%20Secure%20MCP%20Servers" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fmcptotal-unfurls-hosting-service-to-secure-mcp-servers%2F&amp;linkname=MCPTotal%20Unfurls%20Hosting%20Service%20to%20Secure%20MCP%20Servers" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fmcptotal-unfurls-hosting-service-to-secure-mcp-servers%2F&amp;linkname=MCPTotal%20Unfurls%20Hosting%20Service%20to%20Secure%20MCP%20Servers" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fmcptotal-unfurls-hosting-service-to-secure-mcp-servers%2F&amp;linkname=MCPTotal%20Unfurls%20Hosting%20Service%20to%20Secure%20MCP%20Servers" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>