Security
Security Overview
NeuronEdge provides three layers of AI security beyond PII detection: Guardrails Engine, Threat Intelligence, and Red Team Scanning. Together they form a comprehensive defense against prompt injection, jailbreaks, content policy violations, and adversarial attacks.
The Three Security Layers
PII Detection
Dual Regex+NER engine detecting 105+ entity types with sub-millisecond latency. Request and response-side redaction for comprehensive protection.
View PII Protection Guide →Guardrails Engine
Professional+5 detection categories (jailbreak, injection, content_policy, indirect_injection, response_safety). Configurable log/warn/block actions with preset templates.
View Guardrails Guide →Threat Intelligence
Professional+Real-time event monitoring, attack timeline, category breakdown, and security posture score (0-100). Understand your security landscape at a glance.
View Threat Intelligence Guide →Red Team Scanning
EnterpriseAutomated adversarial testing with 50/200/500 probes. Discover weaknesses, analyze attack patterns, and get remediation recommendations.
View Red Team Guide →Security Workflow
Every request flows through multiple security layers before reaching the LLM provider, with comprehensive monitoring and logging throughout.
Tier Comparison
| Feature | Starter | Professional | Enterprise |
|---|---|---|---|
| PII Detection | All | All | All |
| Guardrails | — | log + warn | log + warn + block |
| Custom Rules | — | 20 | Unlimited |
| Threat Dashboard | — | Yes | Yes |
| Posture Score | — | Yes | Yes |
| Red Team Scanning | — | — | Yes |
| Scheduled Scans | — | — | Weekly |
| SIEM Integration | — | Webhooks | Webhooks + SSE |
Use Cases
Production AI Applications
Protect customer-facing AI systems with guardrails that detect and block jailbreak attempts, prompt injections, and policy violations in real-time.
Healthcare & Finance
Comprehensive PII detection combined with compliance reporting and continuous threat monitoring for HIPAA, SOC 2, and financial regulations.
Multi-Tenant SaaS
Configure per-tenant security policies with centralized threat intelligence. Understand security patterns across all customers from a single dashboard.
Pre-Deployment Testing
Run red team scans before releasing new AI features. Discover vulnerabilities early and fix them before they reach production.
Explore Security Features
Dive deeper into each security layer with our comprehensive guides: