Secure AI Red Teaming with Network Channels
Focus
Focus
What's New in the NetSec Platform

Secure AI Red Teaming with Network Channels

Table of Contents

Secure AI Red Teaming with Network Channels

Network Channels is a secure solution that enables AI Red Teaming assessments of internal endpoints without requiring firewall modifications or IP whitelisting.
Network Channels is a secure connection solution that enables AI Red Teaming to safely access and analyze your internal endpoints without requiring IP whitelisting or opening inbound ports. This enterprise-grade solution puts you in complete control of the connection, allowing you to initiate and terminate access while maintaining your security perimeter.
The Network Channels enables you to conduct secure, continuous AI Red Teaming assessments against user APIs and models hosted within private infrastructure. Network channels eliminates the need for users to expose inbound ports or modify firewall configurations, adhering strictly to Zero Trust principles.
A channel is a unique communication pathway that clients use to establish connections. Each channel has a unique connection URL with auth credentials. You will need to create and validate a channel first, before using it to add a target. Multiple channels can be created for different environments and each channel can handle multiple targets accessible to it.
The solution utilizes a lightweight Network Channels client deployed within the user’s environment. This client establishes a persistent, secure outbound WebSocket connection to the Palo Alto Networks environment, facilitating seamless testing of internal systems without the risks associated with IP whitelisting or inbound access.
Additionally, you will be provided with a docker pull secret from Strata Cloud Manager, which you can use to pull the docker image and helm chart for the network channels client.
This combined solution is ideal for:
  • Restricted Environments: Conducting assessments for enterprise users with air-gapped systems or strict compliance requirements.
  • Continuous Monitoring: Maintaining reliable, persistent connectivity for real-time AI security updates.
  • Automated Workflows: Deploying network broker clients across distributed infrastructure using existing container orchestration (Kubernetes/Helm) without manual intervention.
Key Benefits
  • Enhanced Security: No need to expose internal endpoints or modify firewall rules.
  • Complete Control: Initiate and terminate connections on demand.
  • Easy Setup: Simple client installation process.
  • Flexible Management: Create and manage multiple secure channels for different environments.
  • Reusability: Use the same connection for multiple targets.
  • Enterprise Ready: Designed for organizations with strict security requirements.