Skip to content

Commit ba3d52d

Browse files
committed
docs: update README to reflect Palo Alto Networks Prisma AIRS AI Runtime API Intercept terminology and updating links accordingly
1 parent 990cb04 commit ba3d52d

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33
![file](https://github.com/user-attachments/assets/b54e6622-97e7-4ef8-8cd7-09dd2c5d89f3)
44

5-
Enhance your Ollama deployment with enterprise-grade AI security using Palo Alto Networks AI Runtime Security.
5+
Enhance your Ollama deployment with enterprise-grade AI security using Palo Alto Networks Prisma AIRS AI Runtime API Intercept.
66

77
## What is this?
88

9-
panw-api-ollama is a security proxy that sits between your [OpenWebUI](https://openwebui.com/) interface and [Ollama](https://ollama.com/) instance. It works by intercepting all prompts and responses, analyzing them with Palo Alto Networks' AI RUNTIME security technology, and protecting your system from:
9+
panw-api-ollama is a security proxy that sits between your [OpenWebUI](https://openwebui.com/) interface and [Ollama](https://ollama.com/) instance. It works by intercepting all prompts and responses, analyzing them with Palo Alto Networks' Prisma AIRS AI Runtime security technology, and protecting your system from:
1010

1111
- Prompt injection attacks
1212
- Data exfiltration attempts
@@ -56,7 +56,7 @@ cd panw-api-ollama
5656
cargo build --release
5757
```
5858

59-
### Step 2: Get a Palo Alto Networks API Key
59+
### Step 2: Get a Palo Alto Networks Prisma AIRS AI Runtime API Intercept Key
6060

6161
Follow [this tutorial](https://docs.paloaltonetworks.com/ai-runtime-security/activation-and-onboarding/ai-runtime-security-api-intercept-overview/onboard-api-runtime-security-api-intercept-in-scm), specifically step 13, to obtain your API key.
6262

@@ -68,7 +68,7 @@ Rename `config.yaml.example` to `config.yaml` and update it with your API key:
6868
cp config.yaml.example config.yaml
6969
```
7070

71-
Then edit the file to add your Palo Alto Networks API key:
71+
Then edit the file to add your Palo Alto Networks Prisma AIRS AI Runtime API Intercept key:
7272

7373
```yaml
7474
pan_api:
@@ -150,15 +150,15 @@ Two example model configurations are included to demonstrate before/after compar
150150
1. `PANW.llama2-uncensored_latest-1747909321539.json` - A model using the security proxy
151151
2. `NOPAWN.llama2-uncensored_latest-1747909327080.json` - The same model bypassing the security proxy
152152

153-
These configurations allow you to perform side-by-side comparisons and demonstrations of how the Palo Alto Networks AI Runtime Security affects the model responses.
153+
These configurations allow you to perform side-by-side comparisons and demonstrations of how the Palo Alto Networks Prisma AIRS AI Runtime Security affects the model responses.
154154

155155
## Resources
156156

157-
- [Product Information](https://www.paloaltonetworks.com/network-security/ai-runtime-security)
157+
- [Product Information](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security)
158158
- [Documentation](https://docs.paloaltonetworks.com/ai-runtime-security)
159-
- [API Reference](https://pan.dev/ai-runtime-security/scan/api/)
159+
- [API Reference](https://pan.dev/prisma-airs/scan/api/)
160160

161161
## Support
162162

163163
For issues related to this integration, please file an issue on GitHub.
164-
For questions about Palo Alto Networks AI Runtime Security, please refer to official support channels.
164+
For questions about Palo Alto Networks Prisma AIRS AI Runtime API Intercept, please refer to official support channels.

0 commit comments

Comments
 (0)