I spent last week auditing AI tool usage across my 40-person engineering org. What I found made me rethink everything about how we procure developer tools.
The Numbers That Changed My Mind
The market data is hard to ignore:
- Claude Code holds 54% of the AI coding market as of early 2026, just eight months after launch. It hit $1B ARR in six months – fastest in the coding tools category.
- Cursor crossed $2B in annualized revenue in Q1 2026. They just launched Cursor 3, replacing the traditional IDE layout with an agent-orchestration interface.
- Developer satisfaction tells the real story: Claude Code at 46% “most loved,” Cursor at 19%, GitHub Copilot at 9%.
But the number that actually matters? The most common developer stack in 2026 is now “Cursor for editing + Claude Code for complex tasks.” Developers are not choosing one tool – they are composing multi-tool workflows that match the task at hand.
What I Found in My Own Org
When I actually looked at what my teams were using:
- 31 of 40 engineers had personal Claude Code subscriptions (we only officially approved Copilot)
- 18 were running Cursor alongside their “official” IDE
- 7 had built custom workflows chaining both tools together
- Our security team had no visibility into any of it
This is not shadow IT in the traditional sense. Nobody is running rogue infrastructure. They are paying $20-40/month out of pocket because the approved tool is demonstrably slower for their daily work.
The Procurement Problem
Here is where it gets uncomfortable for engineering directors:
Enterprise software procurement cycles run 60-120 days on average. AI tools ship new capabilities weekly. By the time your approved tool passes security review, three alternatives have launched with better features. Gartner says 1 in 4 compliance audits in 2026 will include specific inquiries into AI governance – and “we only approved Copilot” is not a governance strategy when 77% of your engineers are using something else.
The traditional approach – evaluate, select, standardize, enforce – assumes the market moves slowly enough for a single tool to remain optimal. That assumption broke sometime around mid-2025.
What We Are Trying Instead
We moved to a traffic light framework:
- Green: Approved and supported (currently Copilot Enterprise + Claude Code Team). Security-reviewed, SSO integrated, audit-logged.
- Yellow: Tolerated with conditions. Must use corporate email, no proprietary code in prompts, quarterly review. Cursor falls here for us right now.
- Red: Blocked. Tools without SOC 2, no data retention controls, or that require sending code to unknown endpoints.
The key shift: we stopped trying to pick one winner and started governing the portfolio. Our security team focuses on data flow and access controls rather than tool selection.
The Questions I Am Wrestling With
- Budget reality: Do you expense multi-tool AI stacks for your team, or let developers self-fund the tools that make them productive?
- Security posture: How are you getting visibility into AI tool usage without becoming the “fun police” that drives adoption underground?
- Standardization ROI: Has anyone actually measured whether tool standardization delivers enough value to justify the productivity cost of restricting tool choice?
I am genuinely not sure we have landed in the right place. The “govern the portfolio” approach is more work than picking one tool, but the alternative – pretending our developers only use what we approved – felt like willful blindness.
What is your org doing? Especially curious to hear from other engineering leaders at companies with compliance requirements (fintech, healthcare, etc.) where the stakes of ungoverned AI tool usage are higher.