Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

Protect AI expands efforts to secure LLMs with open source acquisition

Jan 31, 2024 - venturebeat.com
Seattle-based startup Protect AI has acquired Laiyer AI, the lead firm behind the LLM Guard open-source project, to enhance its AI security platform. The financial terms of the deal were not disclosed. The acquisition will allow Protect AI to extend its AI security platform's capabilities to better protect organizations against potential risks from the development and usage of large language models (LLMs). The LLM Guard open-source project helps govern the usage of LLM operations, offering input controls to protect against prompt injection attacks and limit the risk of personally identifiable information leakage.

Protect AI plans to develop a commercial offering called Laiyer AI, providing additional performance and enterprise capabilities not present in the core open-source project. The company will also integrate the LLM Guard technology into its broader platform approach to protect AI usage from the model development and selection stage through to deployment. Protect AI's long-term goal is to have a comprehensive approach to enterprise AI security, allowing organizations to invoke one policy at an enterprise level that encompasses all forms of AI security.

Key takeaways:

  • Seattle-based startup Protect AI is expanding its AI security platform through the acquisition of Laiyer AI, the lead firm behind the LLM Guard open-source project.
  • The acquisition will enhance Protect AI's capabilities in securing organizations against potential risks from the development and usage of large language models (LLMs).
  • Protect AI plans to keep the core LLM Guard technology open source while developing a commercial offering called Laiyer AI that will provide additional performance and enterprise capabilities.
  • Protect AI's ultimate goal is to have a comprehensive approach to enterprise AI security, integrating its tools with its Radar platform and existing security tools used by organizations.
View Full Article

Comments (0)

Be the first to comment!