* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [Next-Generation Firewalls](https://www2.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/) * A Brand New Fight: Securi... # A Brand New Fight: Securing Your AI-Powered Applications [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-ai-apps-by-design%2F) [](https://twitter.com/share?text=A+Brand+New+Fight%3A+Securing+Your+AI-Powered+Applications&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-ai-apps-by-design%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fsecure-ai-apps-by-design%2F&title=A+Brand+New+Fight%3A+Securing+Your+AI-Powered+Applications&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/secure-ai-apps-by-design/&ts=markdown) \[\](mailto:?subject=A Brand New Fight: Securing Your AI-Powered Applications) Link copied By [Anand Oswal](https://www.paloaltonetworks.com/blog/author/anand-oswal/?ts=markdown "Posts by Anand Oswal") May 07, 2024 6 minutes [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [Accelerating Security with Precision AI](https://www.paloaltonetworks.com/blog/tag/accelerating-security-with-precision-ai/?ts=markdown) [AI](https://www.paloaltonetworks.com/blog/tag/ai/?ts=markdown) [network security](https://www.paloaltonetworks.com/blog/tag/network-security/?ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust/?ts=markdown) How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It's a burning question for security professionals looking for ways to embrace AI usage across their organizations. Employees are adopting AI applications at an unprecedented rate, and the players in every major industry are gaining a competitive edge by introducing their own AI-powered applications. The challenge? This adoption of AI comes with an expanded attack surface that must be secured. To meet the urgency of these needs, we've just announced the upcoming availability of three new products powered by [Precision AI™](https://www.paloaltonetworks.com/precision-ai-security). * [**AI Access Security**](https://www.paloaltonetworks.com/network-security/ai-access-security) is designed to eliminate the data and security risks associated with employees accessing and using Generative AI (Gen AI) applications. * [**AI Security Posture Management (AI-SPM)**](https://www.paloaltonetworks.com/prisma/cloud/ai-spm) enables rapid Gen AI application development by reducing risk in the AI application stack and supply chain. * [**AI** **Runtime Security**](https://www.paloaltonetworks.com/network-security/ai-runtime-security) gives you runtime protection against new attacks targeting your AI ecosystem. * Public preview and general availability of these platform components are slated to be announced soon. In the meantime, here's a sneak preview of what's to come: **Safeguarding Employee AI Adoption Becomes Essential** It's important to note that, for all their extraordinary capabilities, AI-powered applications and large-language models (LLMs) open up new data security issues and expand the attack surface. As adoption snowballs, these applications become a more enticing, and more profitable, target for attackers. A recent [Salesforce survey](https://www.salesforce.com/news/stories/ai-at-work-research/) of over 14,000 workers found that 55% of employees use unapproved Gen AI at work and, with dozens of new AI applications being launched every month, it's only a matter of time before there are AI applications for every employee and every use case. This is a new type of shadow IT usage, which can expose your organization to data leakage and malware. At the same time, according to [TechTarget's Enterprise Strategy Group](https://www.techtarget.com/esg-global/survey-results/generative-ai-for-cybersecurity-an-optimistic-but-uncertain-future/), 85% of businesses have proprietary LLMs planned or already built into products generally available to their customers. There's no going back. This revolutionary evolution of technology also means that shadow IT is morphing into shadow AI. People tend to gravitate toward what's convenient, which can make things really inconvenient for maintaining a robust security posture. But with AI Access Security, information security professionals will gain visibility and control over hundreds of third-party AI applications, prevent sensitive data leaks with comprehensive data classification capabilities and continue to secure their devices, applications and networks against threats originating from insecure or compromised AI platforms. ![AI Access Security.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/05/AI-Access-Security-landing-page.png) AI Access Security. **Visibility Fortifies AI Supply Chain Integrity** Of course, employee use of third party AI isn't the only way AI is making its way into the enterprise. Innovative organizations realize they can improve both their top and bottom line by supercharging their own applications with AI. As that happens, new AI components get added to application stacks, which increases the potential for exposure of sensitive data via training datasets and inference datasets. Addressing this means infusing security into both the AI supply chain and AI runtime. Reducing security risks in the AI development supply chain will be increasingly important to our customers as they need to identify vulnerabilities and exposure in their AI-based applications. AI-SPM helps infosec teams, product managers and developers discover newfound visibility into AI application code, models and associated resources. By identifying and tracing the lineage of AI components and data used in building new applications, this Prisma Cloud module will go a long way toward avoiding the introduction of vulnerabilities in the AI development supply chain. To reduce data exposure --- as well as misconfigurations and excessive access --- AI-SPM includes comprehensive model risk analysis features. All this will add up to being able to defend against the exposure of sensitive data by classifying the entire AI stack with data security across model resources. **Using AI Protects the Entire AI Ecosystem at Runtime** To protect AI apps, models and data from the brand-new threats to AI ecosystems at runtime, we're introducing AI Runtime Security to meet the challenges of prompt injections, malicious responses, LLM denial-of-service, training data poisoning --- as well as foundational runtime attacks, such as malicious URLs, command and control and lateral threat movement. Self-learning AI runtime security capabilities protect all AI applications, models and data with no code changes. With these capabilities in place, AI Runtime Security offers comprehensive protection for all AI-specific attacks with AI Model Protection, AI Application Protection and AI Data Protection. AI Runtime Security is being designed to prevent direct and indirect prompt injections, model denial of service (DoS) and training data from tampering or poisoning, all while blocking sensitive data extraction. ![AI Runtime Security.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/05/AI-APP-Command-Center-1.png) AI Runtime Security. **Palo Alto Networks Secures Enterprise Adoption of AI** With the explosion of AI adoption, the network and data security attack surface is growing significantly. At Palo Alto Networks, as leaders and early adopters of AI in network security, we understand how this impacts our customers' security posture. But it's a new day and a brand-new fight, and we're here to help our customers in making the most of securing AI and safely increasing their innovation. To find how to become an early adopter, find the details [here](https://start.paloaltonetworks.com/experience-precision-ai). *This blog contains forward-looking statements that involve risks, uncertainties and assumptions, including, without limitation, statements regarding the benefits, impact, or performance or potential benefits, impact or performance of our products and technologies. These forward-looking statements are not guarantees of future performance, and there are a significant number of factors that could cause actual results to differ materially from statements made in this blog. We identify certain important risks and uncertainties that could affect our results and performance in our most recent Annual Report on Form 10-K, our most recent Quarterly Report on Form 10-Q, and our other filings with the U.S. Securities and Exchange Commission from time-to-time, each of which are available on our website at investors.paloaltonetworks.com and on the SEC's website at www.sec.gov. All forward-looking statements in this blog are based on information available to us as of the date hereof, and we do not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made.* *** ** * ** *** ## Related Blogs ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown) [#### Learn how to protect your AWS AI applications at AWS re:Inforce 2024](https://www2.paloaltonetworks.com/blog/network-security/aws-reinforce-2024/) ### [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Strengthening Your DNS Protection with Advanced DNS Security](https://www2.paloaltonetworks.com/blog/network-security/precision-ai-advanced-dns/) ### [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Strata Copilot - Accelerating to an Autonomous Cybersecurity Future](https://www2.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/) ### [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Announcing the First Unit 42 Network Threat Trends Research Report](https://www2.paloaltonetworks.com/blog/network-security/unit-42-network-threat-trends-research/) ### [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Managing User Identity in a Cloud-First World](https://www2.paloaltonetworks.com/blog/network-security/user-identity-in-a-cloud-first-world/) ### [Hybrid Cloud Data Center](https://www.paloaltonetworks.com/blog/network-security/category/hybrid-cloud-data-center/?ts=markdown), [Network Perimeter](https://www.paloaltonetworks.com/blog/network-security/category/network-perimeter/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Calculate Your Organization's Big Virtual Firewall ROI Potential](https://www2.paloaltonetworks.com/blog/network-security/calculate-virtual-firewalls-roi-potential/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language