Skip to main content

Safely and securely integrating multimodal models and/or multiple models into existing digital infrastructures is rapidly emerging as a significant issue in conversations about why, when, and how to deploy generative AI (GenAI) models, including large language models (LLMs), across the enterprise. While many organizations have already deployed at least one GenAI model—nearly 15% in one recent survey—considerably more have put off deployment for three to 12 months, with the balance continuing to debate whether to bring LLMs into their systems at all. 

The benefits of having even a single unimodal language model in place, for instance, ChatGPT-3.5 or others, can bring enormous increases to efficiency and productivity when used for text-based tasks, such as content generation, summarization, analysis, and translation. However, bringing in multiple models or models that use or create non-text content, is the creative version of a “force multiplier” and requires a different strategy. 

Multimodal? Multi-Model? 

The scenarios for an organization that deploys multiple models vary widely. While some organizations might want to leverage the capabilities of more than one large public LLM, for instance using both BERT and Gemini rather than one or the other, there are many more options available to them. In the year and a bit since ChatGPT appeared on the business horizon, new model types have emerged, including:  

  • Targeted models focused on specific markets, such as finance, law, pharma, and retail
  • Models embedded in software-as-a-service (SaaS) applications
  • Internal models built in-house and trained on proprietary data
  • Retrieval-augmented generation (RAG) models, which are extensions added to the large public models to provide access to more recent information
  • Small language models (SMLs) that require considerably less compute power and, in some cases, can run on a personal computer 

It has become a common understanding among AI-industry insiders that large enterprises will be deploying a lot, if not hundreds by some estimates, of models across their organizations within the next few years, as models become easier and less costly to create, train, and maintain. Many of those newly deployed models will likely be multimodal (such as later versions of ChatGPT and others), which means they can ingest queries in various formats, such as voice, text, audio, images, video, code, etc., and produce content in the same or a different format. For instance, a user provides vocal instructions to the model to produce content in a specific format, which is then returned in the requested format, such as a graph, image, or audio clip. 

Risks

The benefits of integrating multiple models and multimodal models into an organizational structure are tremendous and continue to expand into new use cases at the developer, analyst, general user, and customer levels. The risks, however, cannot be overstated and must be addressed before integration. 

Adding any AI tools to an organization’s digital infrastructure immediately expands the attack surface, and adding multimodal models can complicate that further. A multimodal model’s architecture includes numerous entry points, which become vulnerable to exploitation by attackers. Likewise, focusing on securing some modalities in a model or in a system while overlooking others can create blind spots in the security posture of a multimodal system. And attackers can always be counted on to exploit the weakest link, whether that means entering a system through an unsecured portal or slipping malicious code into the model’s response.  

As government regulations have begun to come into effect across the globe, compliance, especially around ensuring data privacy, has become a significant pain point for AI security teams. The data that must be protected no longer consists of just text records, but myriad types of digital images, such as photographs; scans, such as retina scans, fingerprints, x-rays, MRIs, etc.; audio files; voice prints, for instance used as verbal confirmation; and videos, as well as highly specialized scientific content. All of this data, if exfiltrated, could be exposed in a data breach, but could also be manipulated and sold for malicious uses, including the creation of deep fakes. 

Integrating various modalities into existing digital infrastructures also presents challenges such as interoperability issues, in which different technologies and protocols must work together seamlessly and one misconfiguration or vulnerability in one component can compromise the entire system’s security. This can be resource-intensive to fix, can potentially introduce model performance problems, such as latency, and could require additional hardware, which, if not managed correctly, may itself introduce security vulnerabilities. 

Solutions

The lack of standardized practices around the subject of AI use in general makes it even more challenging to ensure consistent security in user environments, but resources are emerging in the AI security space to make deployments more secure and, therefore, more attractive to risk-averse organizations.

Our model-agnostic GenAI security and enablement platform is the first of its kind to provide 360° protection to systems. A “weightless” trust and control layer positioned outside, but immediately adjacent to the infrastructure, our CalypsoAI platform shields the organization from threats buried in model responses and other external threats, and ensures prompts that contain damaging instructions or private information do not leave the system, and does so all without introducing latency into the process. 

Administrators can use policy-based access controls to authorize or block access to models by individual user and by teams, which: 

  • Allows cost-monitoring by limiting who can access the models
  • Supports deployment of rate limits to ensure that Model Denial of Service (DoS) attacks do not succeed in slowing or shutting down the system
  • Enables customizable scanner criteria to be set according to the needs of each team, enabling greater adherence to company acceptable use policies

Our solution also provides security teams full observability into and across all AI tools on the system, allowing them to understand how the models are being used and ensuring they are not being misused or abused. Similarly, administrators have visibility into user and group usage patterns and practices. Each model interaction is tracked and retained for review and analysis, providing insights into user behavior. The prompt history can be purged, either manually or automatically; administrators also have the option of not retaining any of the prompts for review. Interactive dashboards provide a wide variety of detailed usage data about the models, individual users, and groups at admin-determined time spans.   

The integration of multiple and multimodal GenAI models into an existing digital infrastructure presents opportunities, risks, and challenges in roughly equal measure. Contemporaneously implementing cyber and AI security practices presents the best option for the organization to engage in operations as usual while knowing its people, property, and processes are safe from AI-driven risk. 

 

Click here to request a demonstration.