Governance and guardrails for GenAI

Safely drive employee productivity and innovation with public GenAI apps and LLMs

All major public LLM vendors capture user data for model training.

Every 100 business user prompts contain 32 instances of Personally Identifiable Information (PII). 

34% of AI-generated content contains financial, legal or SW code topics where hallucinations may go undetected.

Source: NROC Security user base

Solution overview

Why NROC Security

Visibility & insight

Monitor how the organization uses GenAI, assess risks, and prove compliance. Develop AI policies with facts.

Real-time monitoring

Dashboard and insights on apps, usage, data in prompts, content created and security friction

Facts on risk exposure

Metrics on classified data in prompts and the riskiest topics in created content

Compliance record

Logs about every prompt, response and policy action - referencing the users’ corporate identities

Access governance to GenAI apps

Allow access to the right AI for the task at hand

Authenticated GenAI usage

Single Sign-On (SSO) for users utilizing their corporate IDs, even when using private IDs on consumer apps

Gated access to Gen AI apps

Access controlled using customizable policies that consider the app’s risk profile

Prompt & response guards

Enforce policies to both prompts and responses based on out-of-the box guardrails

Prompt content guardrails

Guardrails to prevent PII, IP and data leakage, prompt injections and jailbreaks, saving users from accidental data leakages

Response content guardrails

Ability to define use case boundaries for each app, e.g. such as if software code creation is allowed

User guidance and accountability

Real-time cues to support safe GenAI usage, while explicitly asking users to evaluate and accept a risk

Data flow guards

Right data for the right AI, with the ability to block some data from any AI

Proprietary AI-based categorization

Categorization of prompts based on topic and files based on content, without relying on pre-made labels

How it works

Unique cloud-based
proxy architecture

Easy to deploy, certified for security, and
compliant with workplace privacy regulations.

Easy to deploy

Redirection of AI traffic only

Several options to direct AI-related web traffic to the proxy:

  • Proxy auto-configuration (PAC) in workstations
  • Proxy chaining from an existing SWG/SASE solution
  • Rules in a DNS proxy

SSO-based user authentication

Configuration can be pushed to workstations using common Device Management solutions

No endpoint agents or plugin to install

Works with common SSO providers to authenticate end users on their corporate IDs

Compliant with requirements and regulations

Security and compliance

Certified for SOC2 type 1, in progress for type 2. Compliant with GDPR. ISO 27k on the roadmap

ISO 27001
NROC Security is SOC2 type 1 certified
SOC2 Type 1
GDPR

Workplace privacy

Configuration and admin role options to facilitate deployments subject to workplace privacy regulations

Okta
EntraID

Audit and log management

Log forwarding to SIEM is possible via S3 bucket.

S3 bucket

Available in AWS Marketplace

Safely allow more GenAI at work and drive continuous learning and change