{"id":331557,"date":"2024-11-19T09:00:44","date_gmt":"2024-11-19T17:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=331557"},"modified":"2024-11-19T11:02:28","modified_gmt":"2024-11-19T19:02:28","slug":"secure-ai-applications-through-code","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2024\/11\/secure-ai-applications-through-code\/","title":{"rendered":"Empower Developers to Secure AI Applications Through Code"},"content":{"rendered":"<p>We understand that every organization\u2019s AI security needs and infrastructure are different. Palo Alto Networks wants to enable AI security in a manner that best aligns with those needs. Some customers have told us they want to stop threats at the network layer with no app changes, while others want to detect and prevent threats in app code without changing their network, and \u200b\u200bsome want to do defense-in-depth with both options. Now, that choice is yours with <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/prisma-ai-runtime-security\">AI Runtime Security<\/a>.<\/p>\n<p>As organizations continue to build new AI applications and infuse existing applications with AI functionality, the risks of AI threats increase. However, all this growth comes with added risks. Hugging Face alone hosts over 1 million models, datasets and apps, and it has over 19 million users every month. Open-source technologies and a <a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/\" rel=\"nofollow,noopener\" >new wave of threats<\/a> means your developers need to prepare to defend your AI ecosystem.<\/p>\n<p>Earlier this year, Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/network-security\/ai-runtime-security-now-available\/\">enabled infrastructure security teams<\/a> to deploy a network layer enforcement to help secure AI ecosystems by protecting AI applications, models and data. Today, Palo Alto Networks is set to redefine AI security by offering AI security as code to our Palo Alto Networks product portfolio. In a market first, we are pleased to announce that AI Runtime Security is now available with both a network and API-based enforcement points.<\/p>\n<h2><a id=\"post-331557-_8g1wjsml79ad\"><\/a>AI Runtime Security-as-Code<\/h2>\n<p>Through this new API functionality, Palo Alto Networks brings AI security-as-code to market to enable AI security in a fast and easy way. Developers get access to a RESTful API and can embed the custom-generated code template within their existing application code. This enables the analysis of the payload within the prompts and responses users create between any developed AI apps and any models that power them. Customers send their prompts and model responses to the API in their app code and then receive a verdict. This indicates if a threat was detected, alongside the recommended action that should be taken.<\/p>\n<figure id=\"attachment_331640\" aria-describedby=\"caption-attachment-331640\" style=\"width: 662px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"662\"><span class=\"ar-custom\" style=\"padding-bottom:105.14%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-331640 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/11\/word-image-331557-1-1.gif\" alt=\"Screenshot of sample code \u2013 Implement API, API Key, Code Template.\" width=\"662\" height=\"696\" \/><\/span><\/div><figcaption id=\"caption-attachment-331640\" class=\"wp-caption-text\">Sample code template generated for developers to embed.<\/figcaption><\/figure>\n<p>To fine-tune their AI protection, organizations can define a security profile within <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/strata-cloud-manager\">Strata Cloud Manager<\/a> and then apply those policies universally. These profiles enable security teams to control how certain threats are handled (allow or block), such as with prompt injections, malicious URLs and sensitive data leaks.<\/p>\n<figure id=\"attachment_331653\" aria-describedby=\"caption-attachment-331653\" style=\"width: 546px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"546\"><span class=\"ar-custom\" style=\"padding-bottom:105.13%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-331653 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/11\/word-image-331557-2-1.png\" alt=\"Screen snapshot of Create Security Profile\" width=\"546\" height=\"574\" \/><\/span><\/div><figcaption id=\"caption-attachment-331653\" class=\"wp-caption-text\">Developers can define a security profile along with actions to be taken for each threat type.<\/figcaption><\/figure>\n<h2><a id=\"post-331557-_rzzx6cgjpdgl\"><\/a>Flexible Deployment with Granular Security<\/h2>\n<p>Due to its lightweight and flexible form factor, the AI Runtime Security API also provides significant advantages for nimble, AI-focused organizations:<\/p>\n<ul>\n<li><strong>Simple Deployment in Minutes<\/strong> \u2013 Customers with Strata Cloud Manager can start creating API keys and code templates for AI security within minutes.<\/li>\n<li><strong>Security for Any Public or Private Model<\/strong> \u2013 Allow developers the flexibility to build AI applications around the needs of their infrastructure. \u200b\u200bThe fully model-agnostic API can be used to secure any app to model interaction in any environment.<\/li>\n<li><strong>Secure AI Agent Development: <\/strong>Allow developers to secure AI agents on SaaS AI platforms using API calls from application code<\/li>\n<\/ul>\n<p>Additionally, the AI Runtime Security API enables developers to get granular control of their AI ecosystem:<\/p>\n<ul>\n<li><strong>Custom Error Responses<\/strong> \u2013 Allow users to understand why a prompt and\/or response was blocked through custom error responses.<\/li>\n<li><strong>Data Poisoning Scans<\/strong> \u2013 Ensure that the data fed to the model maintains its integrity. Developers can use the API to scan-batched training data for threats and poisoning before fine-tuning their models.<\/li>\n<\/ul>\n<p>All of these benefits and features are available to current users of <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/tools\/ngfw-credits-estimator\">Software NGFW credits<\/a>. Those customers are encouraged to take advantage of a free, 90-day trial of API-based Runtime Security today.<\/p>\n<h2><a id=\"post-331557-_5jghv0dooja2\"><\/a>Learn More about AI Runtime Security<\/h2>\n<p>To learn more about the full scope of capabilities of AI Runtime Security, visit our <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/prisma-ai-runtime-security\">product page<\/a>. If you're ready to discuss how we can help protect your AI application ecosystem, <a href=\"https:\/\/start.paloaltonetworks.com\/ai-runtime-security-contact-us.html\">contact us<\/a> to see a demo and get access to a free trial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Developers can now secure their AI applications with a few lines of code. Read the AI Runtime Security API intercept announcement.<\/p>\n","protected":false},"author":723,"featured_media":331667,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[6613,10021],"coauthors":[7477],"class_list":["post-331557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-ai","tag-ai-runtime-security","net_sec_category-ai-application-security","net_sec_category-next-generation-firewalls"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/11\/AdobeStock_321371261-edit-Op2-4.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/331557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=331557"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/331557\/revisions"}],"predecessor-version":[{"id":331683,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/331557\/revisions\/331683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/331667"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=331557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=331557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=331557"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=331557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}