Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    PII leakage detection and monitor

     Info
    Sold by: Secludy 
    Advanced PII (Personally Identifiable Information) detection and reporting solution for machine learning model outputs. Leverages the Aho-Corasick algorithm to efficiently identify potential data leaks across multiple PII categories, generating comprehensive reports and detailed statistics summaries. Essential for organizations needing to validate AI/LLM model safety and ensure data privacy compliance.
    Listing Thumbnail

    PII leakage detection and monitor

     Info
    Sold by: Secludy 

    Overview

    Open image

    The PII Leakage Detection solution provides enterprise-grade monitoring and analysis of machine learning model outputs to identify potential exposure of sensitive personal information. Using the highly efficient Aho-Corasick pattern matching algorithm, this tool systematically scans model responses for over 50 categories of Personally Identifiable Information (PII), including names, addresses, social security numbers, credit card information, and other sensitive data points. The solution delivers comprehensive reporting through multiple formats. JSON output files provide detailed technical analysis of detected leakages, including exact matches, context, and statistical breakdowns by PII category. The automated PDF report generation feature creates executive-friendly summaries with visualizations and risk assessments, making it easy to share findings with stakeholders and compliance teams. All results are organized in a clear directory structure for easy access and archival. Perfect for ML engineers, data scientists, and privacy officers, this tool integrates seamlessly into existing ML pipelines and testing workflows. Whether you're conducting pre-deployment safety validations, performing routine privacy audits, or responding to compliance requirements, this solution provides the robust PII detection capabilities needed to maintain data privacy standards and protect sensitive information in machine learning, Large Language Model (LLM) applications. We also included a Github repo for quick start instruction and test data https://github.com/Secludy/PII-inject-detect-tool 

    Highlights

    • Enterprise-Ready Integration: Seamlessly fits into existing ML workflows with minimal setup, enabling immediate privacy monitoring capabilities for model validation and compliance requirements.
    • Automated Reporting Suite: Generates both detailed JSON technical reports and executive-friendly PDF summaries with visualizations, making privacy compliance documentation straightforward and actionable.
    • Advanced Canary-Based Detection: Utilizes strategically embedded canary sequences with synthetic PII data to accurately track and identify potential information leaks in ML model outputs, providing a robust privacy monitoring system.

    Details

    Sold by

    Delivery method

    Delivery option
    pull docker image

    Latest version

    Operating system
    Linux

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    PII leakage detection and monitor

     Info
    Pricing is based on a fixed subscription cost. You pay the same amount each billing period for unlimited usage of the product. Pricing is prorated, so you're only charged for the number of days you've been subscribed. Subscriptions have no end date and may be canceled any time.

    Fixed subscription cost

     Info
    $299.00/month

    Vendor refund policy

    Full refund within 2 weeks

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    pull docker image

    Supported services: Learn more 
    • Amazon ECS
    • Amazon EKS
    • Amazon ECS Anywhere
    • Amazon EKS Anywhere
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Version release notes

    added test sample file in the github repo https://github.com/Secludy/PII-inject-detect-tool 

    Additional details

    Usage instructions

    please see details to the documentation link https://github.com/Secludy/PII-inject-detect-tool 

    Resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.