CrowdStrike and NVIDIA Collaborate to Enhance Security for Generative AI Innovation – Intelligent CISO

Published:

CrowdStrike Enhances NVIDIA NIM Agent Blueprints with AI-native Cybersecurity Platform

CrowdStrike, a leader in AI-native cybersecurity, has partnered with NVIDIA to enhance the security of NVIDIA NIM Agent Blueprints within the CrowdStrike Falcon cybersecurity platform. This collaboration aims to provide additional safeguards for developers utilizing open-source foundational models to accelerate Generative AI innovation.

Generative AI applications are becoming increasingly important in enterprise settings, powering various workflows such as customer service chatbots, retrieval-augmented generation, and drug discovery. To streamline the development process of these applications, enterprises require standardized blueprints that ensure the security and integrity of the underlying data and models.

NVIDIA NIM Agent Blueprints are reference applications that leverage NVIDIA NIM microservices and the NVIDIA NeMo platform, all part of the NVIDIA AI Enterprise software stack. By incorporating support for NIM Agent Blueprints, CrowdStrike enables enterprises to create custom Generative AI applications securely and efficiently, leveraging the latest open-source foundational models available with NVIDIA NIM.

Daniel Bernard, Chief Business Officer at CrowdStrike, highlighted the importance of securing AI systems driving the Generative AI revolution, emphasizing the continued innovation alongside NVIDIA. Justin Boitano, Vice President of Enterprise AI Software Products at NVIDIA, stressed the fundamental role of security in developing enterprise-grade Generative AI applications.

This collaboration between CrowdStrike and NVIDIA underscores their commitment to providing essential tools for generative AI development while prioritizing security and performance. With the integration of NIM Agent Blueprints into the CrowdStrike Falcon platform, companies can now build applications for core Generative AI use cases that align with stringent security requirements.

Related articles

Recent articles