Network Channels is a secure solution that enables AI Red Teaming assessments of
internal endpoints without requiring firewall modifications or IP whitelisting.
Network Channels is a secure connection solution that enables AI Red Teaming to
safely access and analyze your internal endpoints without requiring IP whitelisting
or opening inbound ports. This enterprise-grade solution puts you in complete
control of the connection, allowing you to initiate and terminate access while
maintaining your security perimeter.
The Network Channels enables you to
conduct secure, continuous AI Red Teaming assessments against user APIs and models
hosted within private infrastructure. Network channels eliminates the need for users
to expose inbound ports or modify firewall configurations, adhering strictly to Zero
Trust principles.
A channel is a unique communication pathway that clients use to
establish connections. Each channel has a unique connection URL with auth
credentials. You will need to create and validate a channel first, before using it
to add a target. Multiple channels can be created for different environments and
each channel can handle multiple targets accessible to it.
The solution utilizes a lightweight Network Channels client deployed within
the user’s environment. This client establishes a persistent, secure outbound WebSocket connection to the Palo
Alto Networks environment, facilitating seamless testing of internal systems without
the risks associated with IP whitelisting or inbound access.
Additionally, you will be provided with a docker pull secret from Strata
Cloud Manager, which you can use to pull the docker image and helm chart for the
network channels client.
This combined solution is ideal for:
Restricted Environments: Conducting assessments for enterprise users with
air-gapped systems or strict compliance requirements.
Continuous Monitoring: Maintaining reliable, persistent connectivity for
real-time AI security updates.
Automated Workflows: Deploying network broker clients across
distributed infrastructure using existing container orchestration
(Kubernetes/Helm) without manual intervention.
Key Benefits
Enhanced Security: No need to expose internal endpoints or modify
firewall rules.
Complete Control: Initiate and terminate connections on demand.
Easy Setup: Simple client installation process.
Flexible Management: Create and manage multiple secure channels for
different environments.
Reusability: Use the same connection for multiple targets.
Enterprise Ready: Designed for organizations with strict security
requirements.