SlideShare a Scribd company logo
1
SECURITY AND GOVERNANCE
FOR GENERATIVE AI
http://AGATSoftware.ai
SECURITY
GOVERNANCE
THE
PROBLEMS
Usage control and data
protection concerns limit
companies from leveraging
Generative AI.
1 in 3 enterprises prohibit using
public Generative AI
Source : Gartner 2023
AI Governance webinar
Connecting AI models to company data can lead to
data privacy violations
AI models and applications aren’t innately reliable and
secure.
Employees rely on AI for business operations.
can lead to Business Financial or reputational harm
3
Solution Overview
• Governance:
Risk management Firewall ensuring Compliance
and Responsible AI usage with real-time AI usage
control.
• Security:
Securely use AI with zero data exposure
with a private AI solution.
Empower users with responsible and secure AI
for generating insights from your company’s data.
Cloud AI Services
AI Firewall
Gemini Copilot
ChatGPT Custom AI
Private AI
Local AI Services
BusinessGPT
AI Firewall
Gemini Copilot
ChatGPT Custom AI
5
BusinessGPT AI Firewall
Audit and monitoring AI usage
Measure risk based on defined company
policies.
Manage risks by defining rules
blocking/allowing AI usage.
Compliance – Maintain compliance with
regulations like EU AI ACT and AI RMF.
Define Responsible AI for your company.
AI Governance for on-prem and public service like ChatGPT
Mitigating AI risks with visibility and control of AI
usage
6
BusinessGPT Supported Use Cases
6
Questions & documents
ChatGPT
Gemini
Copilot
Custom
AI
In-house AI
Third-party AI
External user
Internal user
Connecting company data
Using public Chatbots
Grounding
Using custom systems
1
4
3
2
Sales/support
Chatbot
Using Company Chatbot
Internal user
7
AI Firewall
Auditing Policies
Responsible AI by Safeguard and Monitoring Risks
Data Classification
Monitor and
measure usage.
Data Classification
Usage classification
Define risks and actions
for AI usage
Firewall modules
AI Firewall for Risk Management and Prevention
Record every question/answer
AUDITING
Automatic usage classification by
topics
Identify usage risk levels per
user
8
AI GOVERNANCE FEATURES
AI POLICIES
Define action – Block/Allow
Define risk-based company AI usage
policies
Inspect and apply rules based on source
data and Q&A content.
Set rules per user/ group
Permitted / Forbidden Access
Regular expression
Natural language AI
System rules (PII, HIPPA, Finance, Self-
harm, Sexual , Violence etc)
Content Sensitivity classification
Company Data Sensitivity level
Questions and answers topics
Questions and answers categories
DATA CLASSIFICATION
Classification of data and Q&A
Use data classification for policy risk
AI Usage detection and
classification
9
Benefits of BusinessGPT
Control AI usage across platforms:
ChatGPT, Gemini, Copilot, Internal and external
AI systems
Secure sensitive data by regulations
PII, HIPPA, Finance
Mitigate OWASP risks:
Prompt injection, Prompt leak, Jailbreak,
DDoS.
Manage AI Usage:
Users, Content, Activity
Handle risks:
Reputational damage, IP lost, Financial
Business Loss
Meet industry standards:
NIST AI RMF and ISO standards.
Implement AI Governance
Internal Policies
Meet industry standards:
NIST AI RMF (Risk
Management Framework) and ISO
42001 (Artificial intelligence
Management system)
10
BusinessGPT Governance Topologies
Forward traffic to BusinessGPT Proxy
Captures all browsers and applications
BusinessGPT
API Service
Existing AI System
Network Proxy Browser Extension
AI Firewall
Service API
Connect your AI system with
restAPI
Open Ai
Copilot
Gemini
Open Ai
Copilot
Gemini
BusinessGPT
Proxy
BusinessGPT
Firewall
Browsers and
apps
Browsers
BusinessGPT
Private AI
12
Secure on-prem/ Private Cloud.
Data does not leave company control.
Data connectors – Grounding.
Connect to main company data sources
Manage sensitivity classification.
Prevent the use of sensitive data in AI
Sync source Access Control permissions
Generate answers based on data access.
Private AI module- Capabilites
End-to-end private AI solution
BusinessGPT Private AI
Supported Data Sources
Microsoft:
Teams chats, Team
channels, Teams
meeting transcripts,
One Drive,
SharePoint, Email
(Exchange /Outlook),
Planner.
Google:
Meeting
transcripts, Drive,
Gmail.
Slack:
Channels,
Chats.
Zoom:
Meeting
transcripts.
Webex:
Spaces, Direct
messages,
Meeting
transcripts.
CRM & Tasks
Planner,
Monday, Asana
Coming soon:
Secure AI on prem topology
14
AI Models supported:
• Mistral
• Llama2
Start your
AI Business Journey
Contact Details:
www.agatsoftware.ai

More Related Content

Similar to BusinessGPT - Security and Governance for Generative AI

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
HajeJanKamps
 
Common - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptxCommon - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptx
Alok Ranjan
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AITrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
David J Rosenthal
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
Gokul Alex
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
UlfMattsson7
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
ResearchFox
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
John M Walsh
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays
 

Similar to BusinessGPT - Security and Governance for Generative AI (20)

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Common - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptxCommon - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptx
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AITrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 

Recently uploaded

8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 

Recently uploaded (20)

8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 

BusinessGPT - Security and Governance for Generative AI

  • 1. 1 SECURITY AND GOVERNANCE FOR GENERATIVE AI http://AGATSoftware.ai
  • 2. SECURITY GOVERNANCE THE PROBLEMS Usage control and data protection concerns limit companies from leveraging Generative AI. 1 in 3 enterprises prohibit using public Generative AI Source : Gartner 2023 AI Governance webinar Connecting AI models to company data can lead to data privacy violations AI models and applications aren’t innately reliable and secure. Employees rely on AI for business operations. can lead to Business Financial or reputational harm
  • 3. 3 Solution Overview • Governance: Risk management Firewall ensuring Compliance and Responsible AI usage with real-time AI usage control. • Security: Securely use AI with zero data exposure with a private AI solution. Empower users with responsible and secure AI for generating insights from your company’s data. Cloud AI Services AI Firewall Gemini Copilot ChatGPT Custom AI Private AI Local AI Services
  • 5. 5 BusinessGPT AI Firewall Audit and monitoring AI usage Measure risk based on defined company policies. Manage risks by defining rules blocking/allowing AI usage. Compliance – Maintain compliance with regulations like EU AI ACT and AI RMF. Define Responsible AI for your company. AI Governance for on-prem and public service like ChatGPT Mitigating AI risks with visibility and control of AI usage
  • 6. 6 BusinessGPT Supported Use Cases 6 Questions & documents ChatGPT Gemini Copilot Custom AI In-house AI Third-party AI External user Internal user Connecting company data Using public Chatbots Grounding Using custom systems 1 4 3 2 Sales/support Chatbot Using Company Chatbot Internal user
  • 7. 7 AI Firewall Auditing Policies Responsible AI by Safeguard and Monitoring Risks Data Classification Monitor and measure usage. Data Classification Usage classification Define risks and actions for AI usage Firewall modules AI Firewall for Risk Management and Prevention
  • 8. Record every question/answer AUDITING Automatic usage classification by topics Identify usage risk levels per user 8 AI GOVERNANCE FEATURES AI POLICIES Define action – Block/Allow Define risk-based company AI usage policies Inspect and apply rules based on source data and Q&A content. Set rules per user/ group Permitted / Forbidden Access Regular expression Natural language AI System rules (PII, HIPPA, Finance, Self- harm, Sexual , Violence etc) Content Sensitivity classification Company Data Sensitivity level Questions and answers topics Questions and answers categories DATA CLASSIFICATION Classification of data and Q&A Use data classification for policy risk AI Usage detection and classification
  • 9. 9 Benefits of BusinessGPT Control AI usage across platforms: ChatGPT, Gemini, Copilot, Internal and external AI systems Secure sensitive data by regulations PII, HIPPA, Finance Mitigate OWASP risks: Prompt injection, Prompt leak, Jailbreak, DDoS. Manage AI Usage: Users, Content, Activity Handle risks: Reputational damage, IP lost, Financial Business Loss Meet industry standards: NIST AI RMF and ISO standards. Implement AI Governance Internal Policies Meet industry standards: NIST AI RMF (Risk Management Framework) and ISO 42001 (Artificial intelligence Management system)
  • 10. 10 BusinessGPT Governance Topologies Forward traffic to BusinessGPT Proxy Captures all browsers and applications BusinessGPT API Service Existing AI System Network Proxy Browser Extension AI Firewall Service API Connect your AI system with restAPI Open Ai Copilot Gemini Open Ai Copilot Gemini BusinessGPT Proxy BusinessGPT Firewall Browsers and apps Browsers
  • 12. 12 Secure on-prem/ Private Cloud. Data does not leave company control. Data connectors – Grounding. Connect to main company data sources Manage sensitivity classification. Prevent the use of sensitive data in AI Sync source Access Control permissions Generate answers based on data access. Private AI module- Capabilites End-to-end private AI solution
  • 13. BusinessGPT Private AI Supported Data Sources Microsoft: Teams chats, Team channels, Teams meeting transcripts, One Drive, SharePoint, Email (Exchange /Outlook), Planner. Google: Meeting transcripts, Drive, Gmail. Slack: Channels, Chats. Zoom: Meeting transcripts. Webex: Spaces, Direct messages, Meeting transcripts. CRM & Tasks Planner, Monday, Asana Coming soon:
  • 14. Secure AI on prem topology 14 AI Models supported: • Mistral • Llama2
  • 15. Start your AI Business Journey Contact Details: www.agatsoftware.ai

Editor's Notes

  1. vv