Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1462516

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1462516

IDC PeerScape: Practices for Securing AI Models and Applications

PUBLISHED:
PAGES: 7 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC PeerScape describes the best practices for securing AI models and applications."Cybersecurity vendors are securing their AI applications and models by protecting APIs, monitoring model inputs and outputs, and proactively looking for weaknesses," said Michelle Abraham, research director, Security and Trust at IDC. "They have well-thought-out protections in place using existing security technologies as well as new technologies designed for GenAI."

IDC PeerScape Figure

Executive Summary

Peer Insights

  • Practice 1: Protect APIs and Connections to AI Infrastructure as Well as the AI Infrastructure Itself
    • Challenge
    • Examples
      • Broadcom
      • CrowdStrike
      • IBM
      • Trend Micro
    • Guidance
  • Practice 2: Use Verified and Tested Foundation Models
    • Challenge
    • Examples
      • Broadcom
      • Cisco
      • CrowdStrike
      • IBM
      • Trend Micro
    • Guidance
  • Practice 3: Monitor Model Inputs and Outputs to Detect and Respond to Attacks Against AI
    • Challenge
    • Examples
      • IBM
      • Cisco
      • Splunk
    • Guidance
Product Code: US51992824

IDC PeerScape Figure

Executive Summary

Peer Insights

  • Practice 1: Protect APIs and Connections to AI Infrastructure as Well as the AI Infrastructure Itself
    • Challenge
    • Examples
      • Broadcom
      • CrowdStrike
      • IBM
      • Trend Micro
    • Guidance
  • Practice 2: Use Verified and Tested Foundation Models
    • Challenge
    • Examples
      • Broadcom
      • Cisco
      • CrowdStrike
      • IBM
      • Trend Micro
    • Guidance
  • Practice 3: Monitor Model Inputs and Outputs to Detect and Respond to Attacks Against AI
    • Challenge
    • Examples
      • IBM
      • Cisco
      • Splunk
    • Guidance
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!