I have spent much of the past two months on the road speaking with organizations of all industries about their AI application initiatives and I am struck both by their techno optimism and by the depth of their security concerns. The pace of innovatio...
Oct 28, 2024
Generative AI is revolutionizing industries, creating unprecedented opportunities—and equally unprecedented risks. Whether you’re a security leader, engineering leader, or developer, you’ve likely encountered new challenges in protecting sensitive da...
Jan 14, 2025
Designing authorization is fundamentally a challenge. Not only do you have to understand your problem and domain fully but you also need to understand the limits of your tools. If you get either wrong - or maybe just not as correct as you should - yo...
Jan 7, 2025
Intro: Analogies Network security back in the 1990’s through the mid-2010’s was a very exciting time where user connectivity rapidly evolved, creating tons of vulnerabilities and exploit techniques that all happened over the network and internet. Thi...
As we’ve worked with customers evaluating Large Language Models (LLMs) for their organizations, the recurring theme was authorization. In too many of these systems, data in the form of pdfs, Google docs, and more are added to give better, more refine...
New Products: Securing AI Applications with AI & Prompt Guard With our recent launch of AI Guard & Prompt Guard Pangea now offers the broadest set of AI Security Guardrails in the industry. AI Guard and Prompt Guard are two cutting-edge solutions des...
Dec 9, 2024
I’ve spent many weeks on the road this past quarter speaking to teams all over the country about their AI product initiatives and I am struck by a particular challenge I’ve heard repeatedly expressed: when developing retrieval-augmented generation (R...
Dec 5, 2024
As companies increasingly turn to AI-driven systems to support customer interactions through systems like chatbots and streamline operations, Retrieval-Augmented Generation (RAG) has become a popular framework for enhancing large language models (LLM...
Oct 31, 2024
When we look at the current state of generative AI, we think of products like ChatGPT, Google Gemini, Claude, and similar. Those are all publicly available tools trained on public data and useful for general topics for a general audience. But if we e...
Oct 30, 2024
It’s been a few months since Microsoft Build 2024 where one of the highlights was the launch of the Pangea extension for GitHub Copilot. Pangea was able to interface with Copilot Chat, bringing security into the development environment. Developers ...
Oct 29, 2024
Pangea is proud to announce the general availability of Secure Share. Secure Share is a set of APIs that make it easy to add secure file sharing to your application. Apps often need to send and receive sensitive files - such as a mortgage applicatio...
Oct 16, 2024
Where AI-Powered Software is Going, We Need Secure, Paved Roads Organizations are rushing to build AI applications using Retrieval-Augmented Generation (RAG) and agentic architectures that integrate enterprise and customer data with large language mo...
Oct 15, 2024
Introduction Access control is a vital component of both operational security and compliance, especially in the Healthcare space. Access control systems help protect sensitive patient data, ensure the safety of patients and staff, and maintain the in...
Oct 4, 2024
In recent years, large language models (LLMs) like GPT-3 and GPT-4 have revolutionized how enterprises, especially in healthcare and finance, process and interact with data. These models enhance customer support, automate decision-making, and generat...
Oct 3, 2024
If you need to know when a token stored in Vault is expiring or rotating, you can now set a watch to get notification emails in advance of the change, and when it occurs. You can add project members to a watch so that they will receive notification ...
Oct 1, 2024
We are happy to announce that today, Pangea is launching the Sanitize API to ensure that PDF documents are cleansed of dangerous and sensitive content such as: Malware, including file format irregularities that could be exploitable Links to dangero...
Sep 30, 2024
Do you remember when and where you first used an AI-powered product that caused you to question reality? I do. In the spring of 2022, I tested a synthetic text-to-voice app that was so uncannily realistic that I briefly questioned if it was truly AI ...
Sep 19, 2024
What is ABAC? Attribute-based Access Control is an authorization schema that allows for fine-grained access policies to be created based on attributes like location, time of day, and a user’s department. For a more detailed look as to the benefits of...
Sep 10, 2024
All of access control comes down to one fundamental question: How do we grant the right access to the right things to the right people and systems for the right amount of time? Every other question addresses an aspect or nuance within that question. ...
SOC 2 Type 2
HIPAA Compliant
ISO/IEC 27001
ISO/IEC 27701
Use Cases
Case Studies
Services
Developers
Explore
Connect
Service Status
Company
636 Ramona St, Palo Alto, CA 94301
Pangea is a Sample Vendor for Composable Security APIs in the 2024 App Sec Hype Cycle™ report