GenAI security tools are cybersecurity technologies that help organizations to govern the use of generative AI in the enterprise.
Why it matters: The generative AI genie is well and truly out of the bottle. But 58% of CISOs believe that the risks of AI outweigh the potential benefits.
Over the past 18 months, several cybersecurity vendors have launched security tools aiming to govern the usage of generative AI technologies.
In this article, we’ll outline a shortlist of the 10 GenAI security solutions, based on our own independent assessment of their capabilities.
Important note: This is a very hot topic in the cybersecurity industry and there is likely to be a large number of providers looking to capitalize on this emerging market. Use cases are likely to shift over time as new GenAI use cases come to market.
We highly recommend that all organizations consider their broader cybersecurity strategy before investing in a point solution around generative AI technologies.
LayerX offers an enterprise browser security solution that provides real-time visibility into user activities and protects against browser risks.
How it works: LayerX blocks access to malicious webpages via isolation and can prevent users from uploading sensitive content, per admin-configured policies. The solution is deployed as a browser extension with support for all major browsers.
LayerX has a dedicated set of use cases to support GenAI governance and it’s a common use case for purchasing the platform. Capabilities include:
The bottom line: LayerX takes a different approach to other vendors on this list by focusing on the browser as a way to secure the flow of sensitive data into generative AI applications. It’s a comprehensive web security platform, and the extension-based platform means it’s easy to deploy and doesn’t impact the end user experience.
Strac is a data discovery and protection solution that is optimised for cloud, SaaS, GenAI, and Endpoints. It allows you to scan current and historical data to give you accurate insights into risks and vulnerabilities.
How it works: The solution will continuously scan sensitive data to ensure that you remain compliant and that any issues are quickly identified
The bottom line: Strac is a versatile and proactive data protection solution. The new company is continually updating and improving features, ensuring that the UX only gets better. Its broad number of integrations, data types, and remediation actions make Strac a useful solution that covers a lot of bases. We would recommend Strac for midmarket and enterprise organizations.
Harmonic Security is a startup data security company with a dedicated solution for protecting sensitive data in the era of GenAI.
How it works: Harmonic provides visibility into AI adoption across the enterprise. Its set of pre-trained LLMs enables organizations to define sensitive information in natural language prompts, without the need for complex policy enforcement.
The bottom line: Harmonic offers an innovative solution specifically for GenAI use cases. It’s easy-to-use, with natural language prompts used in place of configuring policies or labelling data.
Zscaler Zero Trust Exchange (ZTE) is an enterprise zero trust platform that enables secure remote access for all users, workloads, IoT devices and business partners.
How it works: ZTE verifies user identities, assesses risks, and enforces policy-based controls before enabling users to connect to a workload, device, or application.
With ZTE you can build and enforce policies governing how users can interact with GenAI platforms to protect sensitive data.
The bottom line: Zscaler Zero Trust Exchange offers a powerful platform for zero trust network access across the enterprise. Governing GenAI usage is just one component of this platform, but it does offer a powerful suite of tools to protect organizations against harmful activity related to generative AI.
Proofpoint offers an enterprise DLP platform integrated into its endpoint, cloud, and email protection solutions.
How it works: Proofpoint identifies sensitive data and analyzes user behavior to help organizations catch attempts to save or leak that data.
Proofpoint allows you to configure granular policies to govern access to GenAI tools based on user behavior and content inputs. Features include:
The bottom line: Proofpoint DLP Transform is a leading platform for enterprise DLP with a comprehensive solution for managing GenAI usage policies. The platform is built on cloud-native architecture, enabling straightforward deployment and management.
PANW AI Access Security is a cloud-based solution dedicated to monitoring the adoption and usage of GenAI applications, and continuously monitoring AI risk. This solution is delivered as an extension of PANW’s enterprise data security solution.
How it works: The platform allows admins to govern AI usage, monitors content in real-time with centralized policy enforcement controls, and blocks harmful content in real-time.
The bottom line: PANW offers a granular solution with extensive DLP support and threat protection capabilities, as well as API-based integrations with AI platforms. As the platform leverages PANWs’ NFGW or Prisma Access solutions, it’s best suited for current PANW customers.
Next DLP’s Reveal Platform is an enterprise DLP solution that enforces data controls for endpoints, mobile devices, and cloud apps.
How it works: The platform uses machine learning, event enrichment, and anomaly detection engines to identify and classify sensitive data. It conducts individual user monitoring and classifies data as it is used, reducing the need for complex admin policies.
Next DLP offers several features that allow IT teams to manage the use of GenAI applications, including:
The bottom line: Next DLP offers a comprehensive data security platform focusing on ease of use, insider risk, and user behavior monitoring. It’s a strong choice for organizations looking to invest in a DLP platform with GenAI governance capabilities.
Forcepoint One (FONE) is a cloud-based Security Service Edge (SSE) platformthat provides a suite of integrated security services that secure access to websites and applications.
How it works: FONE combines multiple security capabilities. It features a cloud access security broker, which provides secure access to cloud apps. It has a fully integrated data security (DLP) platform for cloud, web, private apps, and endpoint devices. Finally, it offers a robust ZTNA service, which ensures secure access to private apps and clouds for all users.
Forcepoint One Data Security and Forcepoint One ZTNA can be used to build a robust set of security controls governing how users can interact with GenAI applications. Features include:
The bottom line: Forcepoint offers a leading SSE platform. The advantage of this service is the combination of DLP and ZTNA controls, which allows you to control both the data shared with and access to GenAI applications for all users and devices. This is an enterprise platform, and GenAI controls are just one use case of the suite. We recommend FONE for teams already considering investment in an SSE platform.
Darktrace’s ActiveAI Security Platform utilizes AI to provide visibility into security posture, detect risks in real-time, and provide automated responses to known and unknown threats.
How it works: Darktrace monitors all network traffic and uses machine learning models to detect anomalous behavior. This allows it to detect threats in real time and shut them down with autonomous responses. Darktrace offers products for email, identity, cloud, network, and endpoint threats.
Darktrace launched risk and compliance models specifically governing GenAI use cases in June 2023. These capabilities allow users to monitor and respond to activity in GenAI apps.
The bottom line: Darktrace’s ActiveAI Security Platform is a strong solution for governing GenAI use cases, with extended visibility and autonomous responses to potential security incidents. A strong advantage is its coverage for custom AI applications, which minimizes the risks of security breaches for self-built GenAI apps.
Cisco Secure Access is a cloud-based SSE solution that securely connects any user to any application, provides a central management console for security teams, and enforces data security controls across the enterprise.
How it works: Cisco Secure Access combines multiple security technologies into a single console. This includes ZTNA to enable secure access to apps, a secure web gateway, a CASB for discovering cloud apps and enforcing DLP policies, and an integrated firewall service.
Several capabilities of Cisco Secure Access can be used to build out comprehensive admin policies for governing GenAI usage. These include:
The bottom line: Cisco offers a comprehensive solution for governing GenAI use. A key benefit of this solution is that it tackles the problem from multiple angles; it uses web filtering, app discovery, and data loss protection controls to provide multi-layered control for GenAI use. Cisco Secure Access is an enterprise focused network security tool – and as with several other vendors on this list, GenAI is just one use case.
Antimatter is an innovative data security tool that sits between data and applications – including GenAI applications – and ensures that permissions and polices are enforced as data is shared.
How it works: First, teams connect their data sources. Supported apps include Zendesk, Hubspot, and SharePoint. Antimatter then pulls in all permissions from these apps, and uses this to map onto new applications, ensuring data is kept secure however it is used, according to company policies. Admins can view all data usage in the admin console.
Antimatter provides several features to govern GenAI usage, including:
The bottom line: Antimatter is an innovative startup. The platform helps you to quickly and seamlessly roll out GenAI protection by mapping existing application permissions across new use cases.
There are several security challenges posed by generative AI:
While some organizations may think it sensible to block the use of GenAI altogether, we wouldn’t recommend taking this step. There are many valuable use cases for AI in the business – and a ban is only likely to force users into using GenAI tools in a personal capacity for work-related tasks, pushing control out of reach of your security team.
Expert Insights’ CEO Craig MacAlpine recently outlined his 5 recommendations for companies looking to invest in a GenAI solution:
Joel Witts is the Content Director at Expert Insights, meaning he oversees all articles published and topics covered. He is an experienced journalist and writer, specialising in identity and access management, Zero Trust, cloud business technologies, and cybersecurity. Joel is a co-host of the Expert Insights Podcast and conducts regular interviews with leading B2B tech industry experts, including directors at Microsoft and Google. Joel holds a First Class Honours degree in Journalism from Cardiff University.
Laura Iannini is an Information Security Engineer. She holds a Bachelor’s degree in Cybersecurity from the University of West Florida. Laura has experience with a variety of cybersecurity platforms and leads technical reviews of leading solutions. She conducts thorough product tests to ensure that Expert Insights’ reviews are definitive and insightful.