target audience: TECH BUYER  Publication date: Apr 2024 - Document type: IDC PeerScape - Doc  Document number: # US52001924

IDC PeerScape: Best Practices for Data Security in GenAI Deployments

By: 

  • Jennifer Glenn Loading
  • Michelle Abraham Loading
  • Grace Trinidad Loading
  • Frank Dickson Loading

Content



Related Links

Table of Contents


  • IDC PeerScape Figure

    • Figure: IDC PeerScape: Data Security — Practices to Protect Data in GenAI Deployments

  • Executive Summary

  • Peer Insights

    • Practice 1: Curate the Right Data from the Right Sources for Better Security and Privacy, Reduced Legal Risk, and Improved Quality

    • Challenge

    • Examples

    • CrowdStrike

    • Splunk

    • Trend Micro

    • Zscaler

    • Guidance

    • Practice 2: Protect the Model and Source Data from Compromise

    • Challenge

    • Examples

    • Broadcom

    • CrowdStrike

    • IBM

    • Zscaler

    • Guidance

    • Practice 3: Link Input with Output for Demonstrable Security, Quality, and Confidence

    • Challenge

    • Examples

    • CrowdStrike

    • Splunk

    • Trellix

    • Guidance