# unauthorized
3 articlestagged with “unauthorized”
Shadow Model Detection
Detecting and preventing unauthorized shadow model deployments that bypass security controls and compliance requirements.
llmopsshadow-modeldetectionunauthorized
Shadow AI Detection
Finding unauthorized AI deployments in organizations: detection methods, common shadow AI patterns, and assessment of unmanaged AI risks.
shadow-aiunauthorizeddetectiongovernancerisk
Shadow AI Discovery
Techniques for discovering unauthorized AI deployments within organizations, including network scanning, API traffic analysis, cloud resource enumeration, and SaaS inventory assessment.
shadow-aidiscoveryunauthorizedscanninginventory