{"id":18212,"date":"2026-03-17T17:05:11","date_gmt":"2026-03-17T16:05:11","guid":{"rendered":"https:\/\/www.asecus.ch\/?p=18212"},"modified":"2026-03-24T11:07:47","modified_gmt":"2026-03-24T10:07:47","slug":"palo-alto-networks-prisma-ai-runtime-security","status":"publish","type":"post","link":"https:\/\/www.asecus.ch\/fr\/produits\/palo-alto-networks-prisma-ai-runtime-security\/","title":{"rendered":"Prisma AIRS"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d\">\n.flex_column.av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7wpe-6865d9b0a1a7a61fd64bd950f1b9fb1d av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kdive95n-3d7c1dfc4d9ba2d684eaa9a7361f0602 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Palo Alto Networks Prisma AI Runtime Security<\/strong> prot\u00e8ge les applications, les mod\u00e8les et les donn\u00e9es d&rsquo;IA pendant leur ex\u00e9cution. Il surveille les syst\u00e8mes d&rsquo;IA en temps r\u00e9el et emp\u00eache les attaques typiques visant l&rsquo;IA, telles que l&rsquo;injection de prompts, l&rsquo;injection de code malveillant, les fuites de donn\u00e9es ou l&rsquo;utilisation abusive des mod\u00e8les. Elle d\u00e9tecte \u00e9galement les contenus \u00e0 risque, la surcharge des ressources ou les r\u00e9ponses manipul\u00e9es, et prot\u00e8ge les agents IA contre les attaques telles que l&rsquo;usurpation d&rsquo;identit\u00e9 ou l&rsquo;utilisation abusive d&rsquo;outils. L&rsquo;objectif est de garantir le d\u00e9veloppement et l&rsquo;utilisation s\u00e9curis\u00e9s d&rsquo;applications bas\u00e9es sur les LLM dans les environnements d&rsquo;entreprise. L&rsquo;agent AI Red Teaming effectue des tests d&rsquo;intrusion automatis\u00e9s pour vos applications et mod\u00e8les d&rsquo;IA. Il soumet vos impl\u00e9mentations d&rsquo;IA \u00e0 un test de r\u00e9sistance, en apprenant et en s&rsquo;adaptant comme le ferait un v\u00e9ritable attaquant.<\/p>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-mn4g3v2i-a778adad1d9a664c4e7556a6da978f21 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"row clearfix\">\n<div class=\"box two-three last\">\n<p><strong>Palo Alto Networks AI Access Security<\/strong> prot\u00e8ge les entreprises lorsque leurs collaborateurs utilisent des outils d&rsquo;IA g\u00e9n\u00e9rative. Cette solution offre une visibilit\u00e9 sur les applications d&rsquo;IA utilis\u00e9es, contr\u00f4le les acc\u00e8s et emp\u00eache les fuites de donn\u00e9es ou la pr\u00e9sence de contenus malveillants dans les invites et les r\u00e9ponses. Elle permet ainsi aux organisations d&rsquo;utiliser l&rsquo;IA g\u00e9n\u00e9rative en toute s\u00e9curit\u00e9 tout en r\u00e9duisant les risques tels que la divulgation involontaire de donn\u00e9es sensibles. L&rsquo;objectif est de garantir une utilisation s\u00e9curis\u00e9e des services d&rsquo;IA externes et des outils d&rsquo;IA g\u00e9n\u00e9rative dans le cadre du travail quotidien.<\/p>\n<\/div>\n<\/div>\n<div class=\"row clearfix\">\n<div class=\"box one first\">\n<div class=\"box one box-shadow margin-b30\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":12572,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[286,131],"tags":[125],"class_list":["post-18212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-security","category-produits","tag-palo-alto-networks-produit"],"_links":{"self":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts\/18212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/comments?post=18212"}],"version-history":[{"count":4,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts\/18212\/revisions"}],"predecessor-version":[{"id":18317,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/posts\/18212\/revisions\/18317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/media\/12572"}],"wp:attachment":[{"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/media?parent=18212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/categories?post=18212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asecus.ch\/fr\/wp-json\/wp\/v2\/tags?post=18212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}