Cisco Motific reduces GenAI security, trust, and compliance risks

Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations.
Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and security teams to rapidly deliver trustworthy GenAI capabilities across their organizations with control over sensitive data, security, responsible AI, and cost.
Since the expansion and breadth of access to GenAI, 97% of companies have reported that the urgency to deploy AI-powered technology has increased.
Many organizations face challenges in ensuring the AI being utilized includes trustworthy, use-case specific data that complies with organizational policies.
One of the biggest hurdles facing organizations is the ability to tailor GenAI applications and solutions on knowledge bases and data sources that are custom to their specific use cases.
Current and clean data are critical to operating effectively and can be achieved via techniques such as Retrieval Augmented Generation.
It is time-consuming for companies to provision and manage GenAI assistants and APIs, integrate models across providers, and hire the talent to manage the process.
Instead, they look for a product that can accelerate their AI deployments with minimal investment.
Motific, a model and vendor agnostic product, supports the entire GenAI journey from assessment, through experimentation, to production.
Deploy GenAI faster and more effectively: Motific cuts GenAI deployment times from months to days with compliance controls for over-usage, overrun spending, and integration of organization-specific data sources.
With just a few clicks, Motific automatically configures assistants, abstracted APIs, and RAG on organization-wide data sources and foundation models while delivering optimal accuracy, cost, security, and access control.
Reduce risk and ensure continual compliance: Motific provides built-in policy controls that organizations can use or customize in days, allowing companies to provision based on their own internal policies.
These automated controls are built for sensitive data such as personally identifiable information, security such as prompt injection and access controls, and trust-related risks such as toxicity and hallucinations.
The platform offers enterprise controls for security, sensitive data, and trustworthiness that can accurately detect and mitigate issues or risks between user inputs and Large Language Model responses.
Track return on investment and business insights while optimizing costs: Motific tracks business process and prompt usage intelligence with ROI and cost analysis, including consolidated monitoring audit trail and key metrics tracking of all user requests.
The product deters shadow AI usage in organizations by providing visibility into use of unapproved third-party GenAI capabilities and helping IT admins provision organizationally compliant alternatives.
Motific can also establish cost budgets and estimations to prevent runaway spend.
Motific was created from Outshift, Cisco's internal incubation engine.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 06 Feb 2024 15:13:04 +0000


Cyber News related to Cisco Motific reduces GenAI security, trust, and compliance risks

Cisco Motific reduces GenAI security, trust, and compliance risks - Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and ...
9 months ago Helpnetsecurity.com
Aim Security Raises $10M to Secure Generative AI Enterprise Adoption - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)-Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in seed funding. Aim Security was founded by ...
9 months ago Darkreading.com
Flow Security Launches GenAI DLP - PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module. This move makes Flow Security the ...
11 months ago Darkreading.com
Achieving Continuous Compliance - If you've ever explored regulatory compliance and cybersecurity, you'll understand the importance of continuous compliance in the digital age, where evolving technology and regulations require constant vigilance. This article will cover the ...
11 months ago Feeds.dzone.com
Akto Launches Proactive GenAI Security Testing Solution - With the increasing reliance on GenAI models and Language Learning Models like ChatGPT, the need for robust security measures have become paramount. Akto, a leading API Security company, is proud to announce the launch of its revolutionary GenAI ...
9 months ago Darkreading.com
AI Market Research: The Pivotal Role of Generative AI in Cyber Security - What researchers are learning about GenAI and cyber security. Pair AI with cyber security and the possibilities are staggering. For many security professionals, it's a foregone conclusion that incorporating intelligence into cyber security will ...
5 months ago Blog.checkpoint.com
GenAI Regulation: Why It Isn't One Size Fits All - With President Biden calling on Congress to pass bipartisan data privacy legislation to accelerate the development and use of privacy-centric techniques for the data that is training AI, it's important to remember that excessive regulation can stifle ...
8 months ago Cybersecurity-insiders.com
Zero Trust Security Framework: Implementing Trust in Business - The Zero Trust security framework is an effective approach to enhancing security by challenging traditional notions of trust. Zero Trust Security represents a significant shift in the cybersecurity approach, challenging the conventional concept of ...
9 months ago Securityzap.com
Zero-Trust Architecture in Modern Cybersecurity - Clearly, organizations need more robust cybersecurity protections in place, which is leading many to adopt a zero-trust architecture approach. Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where ...
8 months ago Feeds.dzone.com
Leveraging Automation for Risk Compliance in IT - Organizations often encounter the challenge of managing complex technology ecosystems while ensuring data security, compliance, and risk management. One crucial aspect of this challenge is risk compliance in IT environments, specifically Linux ...
11 months ago Securityboulevard.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
11 months ago Helpnetsecurity.com
Legal, compliance and privacy leaders anxious about rapid GenAI adoption - Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. Gartner experts have identified four key ...
10 months ago Helpnetsecurity.com
Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development - PRESS RELEASE. Zero trust security is a proactive and robust approach to cybersecurity that addresses modern threats by continuously verifying and monitoring all network activities. While its implementation can be complex and resource-intensive, the ...
4 months ago Darkreading.com
How to Get PCI Compliance Certification? Steps to Obtain it - To mitigate the risk of such breaches, PCI compliance establishes stringent security protocols. In this blog let's understand how to get PCI Compliance certification. PCI DSS is a security standard for card transactions, which includes detailed ...
6 months ago Securityboulevard.com
The Imperative for Zero Trust in a Cloud-Native Environment - The security policy is dynamically updated with the changes of users, devices, data and external risks. Due to the dynamic, containerized and microservice characteristics of cloud-native environments, traditional boundary security protection policies ...
11 months ago Securityboulevard.com
The 7 Core Pillars of a Zero-Trust Architecture - The zero-trust framework is gaining traction in the enterprise due to its security benefits. Organizations are increasingly adopting a zero-trust model in their security programs, replacing the traditional perimeter-based security model. The ...
5 months ago Techtarget.com
Inside the strategy of Salesforce's new Chief Trust Officer - In this Help Net Security interview, Arkin discusses a collaborative approach to building trust among customers, employees, and stakeholders, focusing on transparency, shared responsibility, and empowering others to integrate trusted and responsible ...
9 months ago Helpnetsecurity.com
Why a Zero Trust Security Policy Matters and Steps to Implementation - Adaptability: In a world where business operations span across multiple environments, from on-premises data centers to cloud-based applications, a flexible security approach is essential. Zero trust provides precisely that, ensuring that your ...
10 months ago Securityboulevard.com
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
6 months ago Securityboulevard.com
Navigating the Future: Zero Trust and SSE in Cybersecurity Leadership Strategies - This article delves into two potent concepts shaping the future of information security: Zero Trust and Security Service Edge. In this new reality, organizations require adaptable security measures to keep pace with the changing tides. At its ...
6 months ago Cybersecurity-insiders.com
Coming March 2024: How to Prepare for PCI DSS Version 4.0 Compliance - A 2022 Verizon report claims that only 43% of assessed organizations maintained full compliance in 2020. With the March 2024 deadline fast approaching, businesses that process and store card data are racing to implement the 13 new requirements in ...
10 months ago Securityboulevard.com
Identity Verification and Access Control with No Trust Assumed - Zero trust is a security model that is becoming increasingly important in the world of cybersecurity. In 2023, we will see more vendors offering complete zero trust products and services, and more businesses attempting to implement it. Zero trust is ...
1 year ago Securityweek.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
1 month ago Cyberdefensemagazine.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
10 months ago Techtarget.com
Schneier on Security - At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. We trust their intentions, and know that those intentions will inform their actions. We might not know someone personally, or know their ...
11 months ago Schneier.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)