AI Model Cards
Not Publicly Available
What is covered:
Do they have AI?
Do they train on my data?
Risk of Prompt Injection
Adherence to OWASP Top 10
Adherence to NIST AI RMF
26 risk vectors and more...
Gartner
Feature Details
AskGartner
AI chat interface that uses proprietary Gartner insights to answer questions.
...
See more in full report.
Pricing Details
Freemium
Offers free tiers.
Per License
Charges per user, org, or access point.
Consumption-Based
Pay per token, API call, inference, etc.
Outcome-Based
Pay only when certain results or performance goals are achieved
Why are you here?

We're here to help!
AI Risk Intelligence
Why is AI risk important?
13%
of enterprises have suffered an AI-related security breach in the last year. These include AI-generated phishing and malicious prompt injection.
$4.4M
average cost per incident - with indirect prompt injection and data leakage via LLMs now among the top attack vectors across industries.
Assessing and Monitoring AI Risk becomes crucial
threats are real, fast-evolving, and uniquely difficult to detect. Staying proactive ensures you catch vulnerabilities before they become costly breaches both fiscally and reputationally.

#1
Gartner, Inc. was founded in 1979 by Gideon Gartner and David Stein with $675,000 in venture capital, initially focusing on providing independent IT research and analysis to help corporate computer users make informed technology decisions.

#2
The company is renowned for pioneering influential research methodologies such as the Magic Quadrant, which evaluates technology vendors and helps clients assess market positions objectively.

#3
Gartner has grown into a global leader in IT research and advisory services, with over 100 offices worldwide and a client base that includes a majority of the Fortune 100 companies.
Impact
Adherence to OWASP Top 10
Do they train on my data?
Risk of Prompt Injection
Adherence to NIST
Do they have Web Search?
And more...
FAQ
What are the new AI security risks?
What industries do you specialize in?
How do I see how a vendor maps to the OWASP for LLM top 10
Contact us









