{"id":18072,"date":"2026-03-17T13:02:50","date_gmt":"2026-03-17T12:02:50","guid":{"rendered":"https:\/\/www.asecus.ch\/?p=18072"},"modified":"2026-03-24T09:48:08","modified_gmt":"2026-03-24T08:48:08","slug":"ai-security","status":"publish","type":"post","link":"https:\/\/www.asecus.ch\/en\/products\/ai-security\/","title":{"rendered":"AI Security"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1qp9h-cdaf47e8796b2eb57e11c072a4ee63f6\">\n.avia-section.av-1qp9h-cdaf47e8796b2eb57e11c072a4ee63f6{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.asecus.ch\/wp-content\/uploads\/2020\/08\/header-img-5.png);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\nmargin-top:0px;\nmargin-bottom:0px;\n}\n.avia-section.av-1qp9h-cdaf47e8796b2eb57e11c072a4ee63f6 .av-section-color-overlay{\nopacity:0.6;\nbackground-color:#05668d;\n}\n<\/style>\n<div id='mobile-max-heigth'  class='avia-section av-1qp9h-cdaf47e8796b2eb57e11c072a4ee63f6 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first  avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='250'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:250px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718\">\n#top .av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718{\npadding-bottom:0;\ncolor:#ffffff;\nfont-size:70px;\n}\nbody .av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-special-heading-tag{\nfont-size:70px;\n}\n.av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-subheading{\nfont-size:18px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-special-heading-tag{\nfont-size:25px;\n}\n.av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-subheading{\ndisplay:none;\n}\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kfnxjroq-9254f4e2287ef17df5c7f5a387bd5718 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling  top-special-heading av-inherit-size'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >AI Security<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-kdoilnci-edaa6224d97149cabc8cfe307b05f6b3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='av-mini-hide avia_textblock'  itemprop=\"text\" ><div class=\"breadcrumb breadcrumbs avia-breadcrumbs\"><div class=\"breadcrumb-trail\" ><span class=\"trail-before\"><span class=\"breadcrumb-title\">You are here:<\/span><\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/\" title=\"Asecus\" rel=\"home\" class=\"trail-begin\"><span itemprop=\"name\">Home<\/span><\/a><span itemprop=\"position\" class=\"hidden\">1<\/span><\/span><\/span> <span class=\"sep\">\/<\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/products\/ai-security\/\" title=\"AI Security\"><span itemprop=\"name\">AI Security<\/span><\/a><span itemprop=\"position\" class=\"hidden\">2<\/span><\/span><\/span><\/div><\/div>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcom12tj-524b27619b124ade1fe89cdccca84ac0\">\n.avia-section.av-kcom12tj-524b27619b124ade1fe89cdccca84ac0{\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kcom12tj-524b27619b124ade1fe89cdccca84ac0 alternate_color avia-section-no-padding avia-no-border-styling  avia-builder-el-3  el_after_av_textblock  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1magt-06e475b6cf22ffa09d392d67ae562de8\">\n.flex_column.av-1magt-06e475b6cf22ffa09d392d67ae562de8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1magt-06e475b6cf22ffa09d392d67ae562de8 av_one_full  avia-builder-el-4  el_before_av_one_third  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2yrwms-909946131d26bd9761ff557b52afd9be\">\n#top .av-special-heading.av-2yrwms-909946131d26bd9761ff557b52afd9be{\nmargin:50px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-2yrwms-909946131d26bd9761ff557b52afd9be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2yrwms-909946131d26bd9761ff557b52afd9be .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-2yrwms-909946131d26bd9761ff557b52afd9be .av-special-heading-tag{\nfont-size:25px;\n}\n}\n<\/style>\n<div  class='av-special-heading av-2yrwms-909946131d26bd9761ff557b52afd9be av-special-heading-h2 blockquote modern-quote  avia-builder-el-5  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >AI Security \u2013 Identify risks. Stay in control.<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div><div class='flex_column_table av-a7wpe-78ec8aeb5349a3b18c04715a35ad2b20 sc-av_one_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7wpe-78ec8aeb5349a3b18c04715a35ad2b20\">\n.flex_column.av-a7wpe-78ec8aeb5349a3b18c04715a35ad2b20{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7wpe-78ec8aeb5349a3b18c04715a35ad2b20 av_one_third  avia-builder-el-6  el_after_av_one_full  el_before_av_two_third  icon-half first flex_column_table_cell av-equal-height-column av-align-top av-hide-on-mobile av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdq1pzti-6ad5627022ffa3e7c2093815a89219ae\">\n.avia-image-container.av-kdq1pzti-6ad5627022ffa3e7c2093815a89219ae img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kdq1pzti-6ad5627022ffa3e7c2093815a89219ae .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kdq1pzti-6ad5627022ffa3e7c2093815a89219ae av-styling- avia-align-center  avia-builder-el-7  avia-builder-el-no-sibling  small-logo'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-18062 avia-img-lazy-loading-not-18062 avia_image ' src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/ai-security-1.svg\" alt='Symbol f\u00fcr KI-Sicherheit und vernetzten Schutz' title='ai-security'   itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><\/div><div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7wpe-4-6fad25c1ed1637520dc0a36c65d58095\">\n.flex_column.av-a7wpe-4-6fad25c1ed1637520dc0a36c65d58095{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7wpe-4-6fad25c1ed1637520dc0a36c65d58095 av_two_third  avia-builder-el-8  el_after_av_one_third  el_before_av_hr  flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  column-top-margin'     ><p><section  class='av_textblock_section av-kdive95n-3d7c1dfc4d9ba2d684eaa9a7361f0602 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Generative AI and large language models (LLMs) are increasingly being integrated into business processes, ranging from developer tools to knowledge management and autonomous AI agents.<\/p>\n<p>However, these technologies give rise to new security risks. Unlike traditional IT systems, LLMs do not clearly distinguish between data and instructions. As a result, content can appear manipulative and influence AI systems.<\/p>\n<p>Companies must therefore adapt their security architecture and governance to this new technology.<\/p>\n<h3 data-pm-slice=\"1 1 &#091;&#093;\">Common AI Security Risks<\/h3>\n<ul class=\"ProsemirrorEditor-list\" data-pm-slice=\"3 3 &#091;&#093;\">\n<li class=\"ProsemirrorEditor-listItem\" data-list-indent=\"1\" data-list-type=\"bulleted\"><strong>Shadow AI<br \/>\n<\/strong>Employees use external AI tools and inadvertently disclose sensitive data.<\/li>\n<li class=\"ProsemirrorEditor-listItem\" data-list-indent=\"1\" data-list-type=\"bulleted\"><strong>Prompt Injection<br \/>\n<\/strong>Attackers manipulate AI systems through input or documents.<\/li>\n<li class=\"ProsemirrorEditor-listItem\" data-list-indent=\"1\" data-list-type=\"bulleted\"><strong>Data breaches<br \/>\n<\/strong>AI systems can disclose confidential information from internal knowledge sources.<\/li>\n<li class=\"ProsemirrorEditor-listItem\" data-list-indent=\"1\" data-list-type=\"bulleted\"><strong>Overprivileged AI agents<br \/>\n<\/strong>AI systems perform unwanted actions in connected systems.<\/li>\n<\/ul>\n<h3 data-pm-slice=\"1 1 &#091;&#093;\">How to Use AI Safely<\/h3>\n<p>A secure AI strategy combines architecture, technical safeguards, and governance.<\/p>\n<\/div><\/section><br \/>\n<div class='avia-data-table-wrap av-9cdi68v-cb3350dd004cc500f8dbddd479b7d565 avia_responsive_table avia-table-1'><table  class='avia-table avia-data-table avia_pricing_default  avia-builder-el-10  el_after_av_textblock  avia-builder-el-last '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Table\" ><tbody><tr class='avia-heading-row'><th class=''>Security approach<\/th><th class=''>Benefits<\/th><\/tr><tr class=''><td class=''>Zero-Trust Architecture<\/td><td class=''>Access controls outside the AI model<\/td><\/tr><tr class=''><td class=''>AI Firewalls and Filtering<\/td><td class=''>Protection against prompt injection<\/td><\/tr><tr class=''><td class=''>DLP and Data Masking<\/td><td class=''>Protection of sensitive data<\/td><\/tr><tr class=''><td class=''>Model Hardening<\/td><td class=''>Protecting AI Infrastructure<\/td><\/tr><tr class=''><td class=''>AI Monitoring<\/td><td class=''>Early detection of attacks<\/td><\/tr><\/tbody><\/table><\/div><style type='text\/css'>.avia-table-1 td:nth-of-type(1):before { content: 'Security approach'; } .avia-table-1 td:nth-of-type(2):before { content: 'Benefits'; } <\/style><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  class='hr av-kdinen91-3ea5c2e903cc000cf3b6c9a63be6a73a hr-default  avia-builder-el-11  el_after_av_two_third  avia-builder-el-last  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-3-173bf1e7a3c539438b2e3f364ad8ec8a\">\n#top .hr.hr-invisible.av-kdinen91-3-173bf1e7a3c539438b2e3f364ad8ec8a{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kdinen91-3-173bf1e7a3c539438b2e3f364ad8ec8a hr-invisible  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-builder-el-no-sibling  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_3'  class='avia-section av-2uxnu3-a55ca89024254011af37096ef0b1a885 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-13  el_after_av_hr  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-keinz7g8-63719d1e53b5a1840635d5101611a388\">\n#top .av_textblock_section.av-keinz7g8-63719d1e53b5a1840635d5101611a388 .avia_textblock{\npadding:0 0 50px 0;\n}\n<\/style>\n<section  class='av_textblock_section av-keinz7g8-63719d1e53b5a1840635d5101611a388 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 data-pm-slice=\"1 1 &#091;&#093;\">AI Security with Asecus<\/h3>\n<p>Asecus helps companies securely implement AI systems, from strategy and architectural design to implementation. Contact us today to book an AI Security Workshop.<\/p>\n<\/div><\/section>\n<section class=\"asecus_hubspot_contact_form_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div id=\"hubspot_form\"><\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_3'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-2-3d311fc5861380d08b6a401881afca5c\">\n#top .hr.hr-invisible.av-kdinen91-2-3d311fc5861380d08b6a401881afca5c{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kdinen91-2-3d311fc5861380d08b6a401881afca5c hr-invisible  avia-builder-el-16  el_after_av_section  el_before_av_section  avia-builder-el-no-sibling  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcom12tj-6-c20f051987e77d9a33db77bbb2df3818\">\n.avia-section.av-kcom12tj-6-c20f051987e77d9a33db77bbb2df3818{\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-kcom12tj-6-c20f051987e77d9a33db77bbb2df3818 alternate_color avia-section-no-padding avia-no-border-styling  avia-builder-el-17  el_after_av_hr  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1magt-5-e4e35062f0ea793fa4c1981205f666a3\">\n.flex_column.av-1magt-5-e4e35062f0ea793fa4c1981205f666a3{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1magt-5-e4e35062f0ea793fa4c1981205f666a3 av_one_full  avia-builder-el-18  el_before_asecus_blog  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-24edck-f1034d9b19dd519e6c049a880920cf63\">\n#top .av-special-heading.av-24edck-f1034d9b19dd519e6c049a880920cf63{\nmargin:40px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-24edck-f1034d9b19dd519e6c049a880920cf63 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-24edck-f1034d9b19dd519e6c049a880920cf63 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-24edck-f1034d9b19dd519e6c049a880920cf63 .av-special-heading-tag{\nfont-size:25px;\n}\n}\n<\/style>\n<div  class='av-special-heading av-24edck-f1034d9b19dd519e6c049a880920cf63 av-special-heading-h3 blockquote modern-quote  avia-builder-el-19  avia-builder-el-no-sibling '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Our Products<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div><div  class='av-alb-blogposts template-blog  av-blog-meta-author-disabled av-blog-meta-comments-disabled av-blog-meta-date-disabled no-shadow mobile-accordion '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><article class='post-entry post-entry-type-standard post-entry-18233 post-loop-1 post-parity-odd single-small with-slider post-18233 post type-post status-publish format-standard has-post-thumbnail hentry category-ai-security category-products tag-cato-networks-product-en'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='blog-meta'><a href='https:\/\/www.asecus.ch\/en\/products\/cato-ai-security-for-applications\/' class='small-preview'  title=\"Cato Networks \u2013 Company logo\" ><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/06\/cato-networks-logo-2.svg\" class=\"wp-image-12597 avia-img-lazy-loading-12597 attachment-no scaling size-no scaling wp-post-image\" alt=\"Cato Networks logo with green lettering \u201cCato Networks\u201d on a white background\" \/><span class=\"iconfont\" aria-hidden='true' data-av_icon='\ue836' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><div class='entry-content-wrapper clearfix standard-content'><header class=\"entry-content-header\"><h2 class='post-title entry-title '  itemprop=\"headline\" ><a href=\"https:\/\/www.asecus.ch\/en\/products\/cato-ai-security-for-applications\/\" rel=\"bookmark\" title=\"Permanent Link: AI Security (AISEC)\">AI Security (AISEC)<span class=\"post-format-icon minor-meta\"><\/span><\/a><\/h2><span class='post-meta-infos'><time class='date-container minor-meta updated' >17. March 2026<\/time><span class='text-sep text-sep-date'>\/<\/span><span class=\"blog-categories minor-meta\">in <a href=\"https:\/\/www.asecus.ch\/en\/products\/ai-security\/\" rel=\"tag\">AI Security<\/a>, <a href=\"https:\/\/www.asecus.ch\/en\/products\/\" rel=\"tag\">Products<\/a> <\/span><span class=\"text-sep text-sep-cat\">\/<\/span><span class=\"blog-author minor-meta\">by <span class=\"entry-author-link\"  itemprop=\"author\" ><span class=\"author\"><span class=\"fn\"><a href=\"https:\/\/www.asecus.ch\/en\/author\/dana\/\" title=\"Posts by Dana Badulescu\" rel=\"author\">Dana Badulescu<\/a><\/span><\/span><\/span><\/span><\/span><\/header><div class=\"entry-content\"  itemprop=\"text\" >\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d\">\n.flex_column.av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kdive95n-3d7c1dfc4d9ba2d684eaa9a7361f0602 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Cato AI Security for Applications<\/strong> protects in-house AI applications and AI agents in enterprises from attacks during runtime. The goal is to detect and stop risks before they impact users, systems, or data. The aim is to enable enterprises to operate their own AI apps securely, without attacks on models, data, or users having any impact.<\/p>\n<ul>\n<li>Protection of AI Applications<br \/>\nSecurity mechanisms monitor the communication and behavior of AI apps to detect attacks early on.<\/li>\n<li>Defense Against Common AI Threats<br \/>\nThese include, for example, input manipulation (prompt attacks), data exfiltration, or the misuse of AI functions.<\/li>\n<li>Runtime Protection<br \/>\nThe solution operates while the AI application is in use and prevents attacks in real time.<\/li>\n<li>Cloud-Native Architecture<br \/>\nThe security features are integrated into Cato\u2019s cloud-based platform and operate with low latency.<\/li>\n<li>Low False Positives<br \/>\nAI-powered analytics are designed to keep the number of false security alerts low.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-mn4fx5a0-eb9a09c27599c97a9210c8afb1d80269 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Cato AI Security for End Users <\/strong>safeguards employees&#8217; use of AI tools (such as chatbots, copilots, or other AI services). It provides transparency and control over all AI interactions within the organization. The goal is to ensure the secure and controlled use of generative AI tools within the organization, without data leaks or compliance issues.<\/p>\n<ul>\n<li><strong>Detection of \u201cShadow AI\u201d<\/strong><br \/>\nIdentifies AI tools that employees use without official approval.<\/li>\n<li><strong>Transparency regarding AI usage<\/strong><br \/>\nOrganizations can see which AI apps are being used and what data is being sent to them.<\/li>\n<li><strong>Policies and access control<\/strong><br \/>\nSecurity policies can specify which AI tools are permitted and what data may be shared.<\/li>\n<li><strong>Zero-Trust Approach<\/strong><br \/>\nEvery interaction with AI services is monitored and evaluated to minimize risks.<\/li>\n<li><strong>Risk Assessment and Governance<\/strong><br \/>\nIT teams can analyze usage, assess risks, and enforce security measures.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><\/p><\/div>\n<div class=\"read-more-link\"><a href=\"https:\/\/www.asecus.ch\/en\/products\/cato-ai-security-for-applications\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div>\n<\/div><footer class=\"entry-footer\"><\/footer><div class='post_delimiter'><\/div><\/div><div class='post_author_timeline'><\/div><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/06\/cato-networks-logo-2.svg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Dana Badulescu<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Dana Badulescu<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2026-03-17T17:22:17+01:00\" >2026-03-17 17:22:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-24 11:38:23<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>AI Security (AISEC)<\/span><\/span><\/span><\/article><article class='post-entry post-entry-type-standard post-entry-18196 post-loop-2 post-parity-even post-entry-last single-small with-slider post-18196 post type-post status-publish format-standard has-post-thumbnail hentry category-ai-security category-products tag-palo-alto-networks-product-en'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='blog-meta'><a href='https:\/\/www.asecus.ch\/en\/products\/palo-alto-networks-prisma-ai-runtime-security\/' class='small-preview'  title=\"Palo Alto Networks \u2013 Company Logo\" ><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/06\/PaloAltoNetworks-logo-2.svg\" class=\"wp-image-12617 avia-img-lazy-loading-12617 attachment-no scaling size-no scaling wp-post-image\" alt=\"Palo Alto Networks logo: black lettering \u201cPalo Alto Networks\u201d next to stylized red symbol\" \/><span class=\"iconfont\" aria-hidden='true' data-av_icon='\ue836' data-av_iconfont='entypo-fontello'><\/span><\/a><\/div><div class='entry-content-wrapper clearfix standard-content'><header class=\"entry-content-header\"><h2 class='post-title entry-title '  itemprop=\"headline\" ><a href=\"https:\/\/www.asecus.ch\/en\/products\/palo-alto-networks-prisma-ai-runtime-security\/\" rel=\"bookmark\" title=\"Permanent Link: Prisma AIRS\">Prisma AIRS<span class=\"post-format-icon minor-meta\"><\/span><\/a><\/h2><span class='post-meta-infos'><time class='date-container minor-meta updated' >17. March 2026<\/time><span class='text-sep text-sep-date'>\/<\/span><span class=\"blog-categories minor-meta\">in <a href=\"https:\/\/www.asecus.ch\/en\/products\/ai-security\/\" rel=\"tag\">AI Security<\/a>, <a href=\"https:\/\/www.asecus.ch\/en\/products\/\" rel=\"tag\">Products<\/a> <\/span><span class=\"text-sep text-sep-cat\">\/<\/span><span class=\"blog-author minor-meta\">by <span class=\"entry-author-link\"  itemprop=\"author\" ><span class=\"author\"><span class=\"fn\"><a href=\"https:\/\/www.asecus.ch\/en\/author\/dana\/\" title=\"Posts by Dana Badulescu\" rel=\"author\">Dana Badulescu<\/a><\/span><\/span><\/span><\/span><\/span><\/header><div class=\"entry-content\"  itemprop=\"text\" >\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d\">\n.flex_column.av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kdive95n-3d7c1dfc4d9ba2d684eaa9a7361f0602 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Palo Alto Networks Prisma AI Runtime Security<\/strong> protects AI applications, models, and data while they are in operation. It monitors AI systems in real time and prevents common AI attacks such as prompt injection, malicious code, data leaks, or model misuse. It also detects risky content, resource overload, or manipulated responses, and protects AI agents from attacks such as identity impersonation or tool abuse. The goal is the secure development and use of LLM-based applications in enterprise environments. The AI Red Teaming Agent performs automated penetration tests on your AI applications and models. It subjects your AI implementations to a stress test, learning and adapting just like a real attacker.<\/p>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-mn4g2jxp-9d1924a5040d6a164c5b564d451549e0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Palo Alto Networks AI Access Security<\/strong> protects organizations when employees use generative AI tools. The solution provides visibility into which AI apps are being used, controls access, and prevents data leaks or malicious content in prompts and responses. This enables organizations to use GenAI securely while reducing risks such as the unintentional disclosure of sensitive data. The goal is the secure use of external AI services and GenAI tools in everyday work.<\/p>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><\/p><\/div>\n<div class=\"read-more-link\"><a href=\"https:\/\/www.asecus.ch\/en\/products\/palo-alto-networks-prisma-ai-runtime-security\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div>\n<\/div><footer class=\"entry-footer\"><\/footer><div class='post_delimiter'><\/div><\/div><div class='post_author_timeline'><\/div><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/06\/PaloAltoNetworks-logo-2.svg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Dana Badulescu<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Dana Badulescu<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2026-03-17T16:46:26+01:00\" >2026-03-17 16:46:26<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-24 11:04:12<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Prisma AIRS<\/span><\/span><\/span><\/article><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_4'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18072'><div class='entry-content-wrapper clearfix'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-1-8a3c3cb360f3d1b40959304cb3aa043a\">\n#top .hr.hr-invisible.av-kdinen91-1-8a3c3cb360f3d1b40959304cb3aa043a{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kdinen91-1-8a3c3cb360f3d1b40959304cb3aa043a hr-invisible av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[94],"tags":[],"class_list":["post-18072","post","type-post","status-publish","format-standard","hentry","category-products"],"_links":{"self":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/18072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/comments?post=18072"}],"version-history":[{"count":12,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/18072\/revisions"}],"predecessor-version":[{"id":18267,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/18072\/revisions\/18267"}],"wp:attachment":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/media?parent=18072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/categories?post=18072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/tags?post=18072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}