We have a firm commitment to Generative AI Security, and strive to stay at the forefront of Generative AI security risks and mitigation techniques. This page is an indication to vendors and customers as to the approaches we have in place to mitigate LLM security concerns.

Active Protections

Active Protections

Data Exfiltration

Data Exfiltration

Phishing

System Manipulation

Phishing

System Manipulation

Generative AI Security Trust Center

Generative AI Security Trust Center

Generative AI Security Trust Center

Active Protections

Data Exfiltration

Phishing

System Manipulation

Personally Identifiable Information

Secrets

Google Drive Documents

SECURED

Zendesk Tickets

SECURED

External Webpages

SECURED

Local File Uploads

SECURED

Private Git Repositories

SECURED

Public Git Repositories

SECURED

Personally Identifiable Information

Personally Identifiable Information

Secrets

Secrets

Google Drive Documents

Google Drive Documents

Zendesk Tickets

Zendesk Tickets

External Webpages

External Webpages

Local File Uploads

Local File Uploads

Private Git Repositories

Private Git Repositories

Public Git Repositories

Public Git Repositories

SECURED

SECURED

SECURED

SECURED

SECURED

SECURED

Data sent to Large Language Models

Data sent to Large Language Models

Data sent to Large Language Models

Amazon Bedrock | Model Hosting

Amazon Bedrock | Model Hosting

Weaviate | Vector Database

Weaviate | Vector Database

Data and Model Residency

Data and Model Residency

Data and Model Residency

Generative AI Application Security Controls

Generative AI Application Security Controls

Gen AI Application Security Controls

Customer Data Privacy

Direct querying data exfiltration risk mitigated

Direct querying data exfiltration risk mitigated

RAG systems checked for data exfil risks

RAG systems checked for data exfil risks

Data sources checked for indirect risks

Data sources checked for indirect risks

End Customer Security


Phishing risk mitigated

Phishing risk mitigated

Attacker driven misinformation risk mitigated

Attacker driven misinformation risk mitigated

National security risk content mitigated

National security risk content mitigated

Malware download risk mitigated

Malware download risk mitigated

Automatic action manipulation risk mitigated

Automatic action manipulation risk mitigated

Profane content risk mitigated

Profane content risk mitigated

LLM Application Risk Assessment

LLM Application Security Pentest conducted

LLM Application Security Pentest conducted

LLM Application Security Monitoring

High risk LLM inputs, outputs, and actions tracked

High risk LLM inputs, outputs, and actions tracked

Historical traceability of risky events maintained

Historical traceability of risky events maintained

Alerting system in place for suspicious events

Alerting system in place for suspicious events

LLM Application IP Security


Company IP exfiltration risk mitigated

Company IP exfiltration risk mitigated

Customer IP exfiltration mitigated

Customer IP exfiltration mitigated

LLM Application Access Controls

Automated LLM actions analyzed for risk

Automated LLM actions analyzed for risk

Internal data writes analyzed for adversarial content

Internal data writes analyzed for adversarial content