target audience: TECH BUYER Publication date: Apr 2024 - Document type: IDC PeerScape - Doc Document number: # US52001924
IDC PeerScape: Best Practices for Data Security in GenAI Deployments
Table of Contents
-
IDC PeerScape Figure
-
Figure: IDC PeerScape: Data Security — Practices to Protect Data in GenAI Deployments
-
-
Executive Summary
-
Peer Insights
-
Practice 1: Curate the Right Data from the Right Sources for Better Security and Privacy, Reduced Legal Risk, and Improved Quality
-
Challenge
-
Examples
-
CrowdStrike
-
Splunk
-
Trend Micro
-
Zscaler
-
Guidance
-
Practice 2: Protect the Model and Source Data from Compromise
-
Challenge
-
Examples
-
Broadcom
-
CrowdStrike
-
IBM
-
Zscaler
-
Guidance
-
Practice 3: Link Input with Output for Demonstrable Security, Quality, and Confidence
-
Challenge
-
Examples
-
CrowdStrike
-
Splunk
-
Trellix
-
Guidance
-