AI Inventory provides a complete view of AI tools and systems used across your organization.It is the foundation for visibility, governance, and control.Why inventory mattersMost organizations underestimate the number of AI tools in use.Teams adopt tools ...
Peridot continuously discovers AI tools used across your organization.This includes both sanctioned tools and shadow AI usage.Discovery is automatic and driven by integrations, not manual input.Why discovery is hardAI usage is fragmented.Teams adopt tools ...
AI is not only being used inside tools—it is being used to create new applications.Peridot tracks these AI-generated applications to ensure they are visible, governed, and auditable.What are AI-generated applications?AI-generated applications include:Inte ...
OverviewData classification is used to identify and categorize data flowing through AI systems based on sensitivity and risk.It enables Peridot to enforce policies and control how data is used across models and integrations.Why Data Classification Matters ...
Data Flows track how information moves into and out of AI systems.They provide the visibility required to understand risk, enforce policies, and audit behavior.Why data flows matterAI risk is not just about which tools are used.It is about what data is be ...
Monitoring allows you to observe how data moves through AI systems in real time.It is the operational layer built on top of data flows.What monitoring providesPeridot enables you to:View live data movement across systemsIdentify sensitive data exposureTra ...
Not all AI usage in your organization is approved.Peridot distinguishes between sanctioned and shadow AI to help you understand risk and enforce control.What is sanctioned AI?Sanctioned AI refers to tools and systems that are:Approved by security or ITCon ...
Policies define how AI is controlled in your organization.They determine which models can be used, what data can be accessed, how integrations behave, and what actions are allowed.Without policies, visibility does not translate into control.What policies ...
OverviewPolicy-based routing determines how AI requests are directed across models and providers.Instead of relying on application-level logic, Peridot uses centralized policies to dynamically select the appropriate model for each request.Why Routing Matt ...
OverviewPolicies define how AI systems are allowed to operate in your environment. They control model access, data usage, integrations, and request behavior in real time.In Peridot, policies are evaluated on every AI interaction—before any model call is e ...
OverviewEnforcement actions define how Peridot responds when a policy is triggered.They transform governance rules into real-time control over AI behavior.Types of Enforcement ActionsBlockStops a request before execution.Used for:Sensitive data violations ...
OverviewIncidents represent security or governance events triggered by AI activity.They provide a structured way to detect, investigate, and respond to risks such as data exposure or policy violations.What Triggers an IncidentIncidents can be created when ...
OverviewAI Incident Playbooks define how your organization responds to AI-related incidents.They standardize workflows for detection, investigation, and remediation.What Playbooks DoPlaybooks automate and guide:Incident triageNotificationsApprovalsRemedia ...
OverviewActions enable Peridot to take real-world steps in response to policies, incidents, and events.They transform governance decisions into automated workflows.What Actions Can DoSend alerts (Slack, email)Create tickets (Jira, ServiceNow)Trigger APIsE ...
OverviewBackend APIs allow you to integrate Peridot with internal systems and workflows.They enable automation, data access, and programmatic control of governance across your environment.What You Can DoCreate and manage policiesRetrieve inventory and dat ...