LLM Shield

Release Notes

Desktop Agent - Admin Control Panel

RELEASE May 2023
Visibility you need in the age of LLMs
  • Admin view of org activity
    Get a pulse of LLM Shield's protection activity across your company's devices.
  • Drill down to user or even device level
    For your security audit needs, you can safely view your logs across your company's devices.
Easy setup with powerful configurations
  • Adding users to your org
    Easily add a user so their devices are protected.
  • Auto-adding devices
    Our desktop agent will auto-detect if this is a new device and register it to the user.
  • Desktop agent security settings
    Decide whether desktop agents show "Quit" in tray menu, TTL for your org rules, and other security settings.
  • Self-hosted Server Support
    In preparation for our next major update, we've built backend support to support an easy-to-use interface.

New: State of LLM Security

RELEASE April 2023

State of LLM Security

  • Focused LLM Security News Feed
    Curated news on LLM security developments.
  • Automated Tracker for Key Industries
    LLM usage tracking in finance, tech, and education.
  • International LLM Legislation & Regulation Monitoring
    Updates on LLM security laws and regulations worldwide.
  • Interactive Globe of LLM Restrictions
    Visual representation of LLM policies by country.

New: Multi-device Per User, Webhooks, Logs

IMPROVEMENTS April 2023
LLM Shield API
  • Multi-device Support Per User
    Users can now add LLM Shield to all their devices.
  • Audit Log Capabilities
    Added sensitive data alert logs access for company admins.
  • Webhook Integration
    Newly added webhook integration in LLM Shield API.
  • Streamlined API Key Management
    Enhanced functionality for easier usability and account control.

Leak Prevention (for Companies)

RELEASE April 2023
LLM Shield for Mac, Windows, & Linux
  • On-device sensitive data engine to maintain data privacy.
    Supports LLM Shield's Sensitive Data Checks
    Supports LLM Shield's on-premise, self-hosted Source Code Monitor as a sensitive data check.
  • LLM Detection
    Detects LLMs, including ChatGPT, Bard, Bing, Claude, and many more.
    Privacy-aware interception of paste events.
  • Easy deployment for company computers and devices.
    Auto-updating supported for latest LLM signature detections and checks.
    Lightweight system menu tray app for desktops.
Source Code Monitor for LLM Shield
  • Self-Hosted Server Availability
    Full self-hosted capabilities to enhance privacy and security via Docker.
  • On-Premise GitHub Integration
    Connects with GitHub via personal access tokens.
  • Company admins can select sensitive repositories for indexing on premises.
    Client apps connect directly to the on-premise Source Code Monitor within the corporate environment.
  • Improved Collaboration with Client Apps
    Enhanced detection and mitigation by both the Monitor and Client apps when connected.
LLM Shield for Chrome
  • On-device sensitive data engine to maintain data privacy.
    Supports LLM Shield's Sensitive Data Checks
    Supports LLM Shield's on-premise, self-hosted Source Code Monitor as a sensitive data check.
  • LLM Detection
    Detects LLMs, including ChatGPT, Bard, Bing, Claude, and many more.
    Privacy-aware interception of paste events.
  • Easy deployment for company computers and devices.
    Auto-updating supported for latest LLM signature detections and checks.
    One-click network-wide deployment for company administrators using Chrome Enterprise.
LLM Shield API
  • Teams
    Ability to support teams with multiple members.
    API key issuance per team member.
    Per-API key permissions and preferences.
  • Enhanced Configuration Control
    App-specific configurable protection settings.

Examples of Sensitive Data Checks

CONTINUOUS April 2023
(privacy-preserving on-device only)
Department Category Sensitive Data Checks
Finance Unpublished Financial Documents Drafts of balance sheets, financial statements, bank statements, tax returns/files, reports of income, and profit & loss statements
Sales Projections Detection of annual, quarterly, or monthly sales forecasts, growth targets, and market share estimates
Supply Chain Information Detection of data related to supplier/vendor, inventory, shipment, delivery, purchase orders, distributor, manufacturer, lead time, pricing, cost forecasts, allocation, shortages, terms, conditions, contacts, and schedules
Legal Attorney-Client Privileged Confidential communications and documents shared between attorneys and their clients for the purpose of legal advice or representation
Confidential Documents Legal documents containing sensitive information protected by attorney-client privilege, work product protection, or confidentiality agreements
Legal Documents Contracts, agreements, memoranda of understanding, terms of service, privacy policies, disclaimers, and licensing agreements, as well as drafts or notes related to such documents
Litigation Documents Materials related to ongoing or potential lawsuits, including pleadings, motions, discovery requests, responses, interrogatories, document productions, depositions, exhibits, or expert reports
Settlement Agreements Confidential documents outlining negotiated terms and conditions to resolve legal disputes, including payment or non-payment terms, as well as stipulations and releases
Court Orders or Judgments Official decisions, decrees, or directives issued by a judge or court in relation to a legal matter, dispute or proceeding
Regulatory Filings and Compliance Documents Materials submitted to regulatory bodies or required for compliance with applicable laws or regulations, including data privacy, consumer protection, and employment
Sales/Marketing Marketing Strategies Internal tactics, promotional campaigns, advertising plans, content calendars, new product launch schedules, pricing strategies, and digital marketing initiatives
Customer Lists Unique customer identification, customer names, email addresses, phone numbers, physical addresses, and relevant notes about interactions or preferences
Pricing Strategies Data related to product or service pricing, rebates and discounts, cost structures, and revenue targets
Market Research Reports Findings and analysis derived from primary and secondary data sources on market size, industry trends, competitive landscape, customer behavior, and segmentation
Lead Generation Data Information about potential customers, including contact information (email addresses, phone numbers) and lead scores, collected through marketing campaigns, forms or applications
Executive/Board of Directors Meeting Minutes Documented discussion points, decisions, actions, agreed-upon plans, and votes during board meetings
Board Reports Summarized reviews of company activities, financial performance, market positions, and strategic initiatives
Strategic Planning Documents Related to long-term goals, company direction, market analysis, and competitive intelligence
Executive Presentations Documents and slides presented to board members that cover updates, strategies, initiatives, financial information, and proposed actions
Executive Compensation Information Data on salaries, bonuses, stock options, and retirement packages for executive-level management
Military Intelligence Reports Unauthorized access to intelligence reports, operational orders, and classified military strategies.
Operational Orders (OPORDs) Unauthorized access to military operational orders, including detailed plans and strategies for military operations.
Classified Military Strategies Unauthorized access to classified military strategies, including national defense plans and sensitive military operations.
API Keys Google Analytics API Keys Unauthorized access to Google Analytics account data and statistics.
AWS Access Key ID and Secret Access Key Unauthorized access to Amazon Web Services resources and services.
Google Analytics GA4 API Keys Unauthorized access to Google Analytics GA4 account data and statistics.
OpenAI API Keys Unauthorized access to OpenAI services and resources.
Google Products API Keys Unauthorized access to various Google products and services.
Stripe API Keys Unauthorized access to Stripe account data, including payments and customer information.
Twilio Account SID and Auth Token Unauthorized access to Twilio account data, including messaging and call services.
Mailgun API Keys Unauthorized access to Mailgun account data and email sending services.
SendGrid API Keys Unauthorized access to SendGrid account data and email sending services.
Slack API Keys Unauthorized access to Slack account data and team communication services.
Shopify API Keys Unauthorized access to Shopify account data and e-commerce services.
HubSpot API Keys Unauthorized access to HubSpot account data and marketing, sales, and service platform services.
IBM Watson API Keys Unauthorized access to IBM Watson services and resources.
Plaid API Keys Unauthorized access to Plaid account data and financial services.
Firebase API Keys Unauthorized access to Firebase account data and application development services.
Mailchimp API Keys Unauthorized access to Mailchimp account data and email marketing services.
Trello API Keys Unauthorized access to Trello account data and project management services.
ClickSend API Keys Unauthorized access to ClickSend account data and messaging services.
Contentful API Keys Unauthorized access to Contentful account data and content management services.
Zapier API Keys Unauthorized access to Zapier account data and automation services.
RingCentral API Keys Unauthorized access to RingCentral account data and communication services.
Airtable API Keys Unauthorized access to Airtable account data and database services.
Front API Keys Unauthorized access to Front account data and email collaboration services.
Square API Keys Unauthorized access to Square account data and payment processing services.
Microsoft Azure Tenant Unauthorized access to Microsoft Azure account data and cloud computing services.
Algolia API Keys Unauthorized access to Algolia account data and search services.
Mapbox API Keys Unauthorized access to Mapbox account data and mapping services.