• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

Top Trending Products

Prisma AIRSPrompt SecurityTrojAIZscaler AI Red TeamingMindgardMendHiddenLayerAdversa AI Security PlatformAlice WonderSuite

What are AI Security Testing?

AI security testing (AI‑ST) uncovers vulnerabilities and exposures in AI‑enabled systems and applications by applying specialized assessments tailored to the unique risks of machine learning and generative AI. It includes offensive techniques such as automated generation and execution of adversarial prompts, as well as AI component scanning across model repositories, libraries, frameworks, and notebooks. AI‑ST also evaluates model behavior under manipulation, edge cases, and failure modes to identify issues like data leakage, bias, or unsafe outputs. By proactively detecting weaknesses before deployment, AI‑ST helps organizations strengthen resilience, reduce security incidents, and maintain trust in AI‑driven products. Typical users include security teams, AI/ML engineers, red‑teamers, DevSecOps practitioners, and risk or compliance groups responsible for safeguarding AI applications.

How Categories and Markets Are Defined
All Categories
/
AI Security Testing

AI Security Testing Reviews and Ratings

Best AI Security Testing Reviews 2026 | Gartner Peer Insights

Product Listings

Filter by

Products 1 - 13 of 13
Sort by
Logo of Prisma AIRS

Prisma AIRS

By Palo Alto Networks

4.3
(23 Ratings)

Palo Alto Networks Prisma AIRS secures AI end-to-end as enterprises deploy autonomous agents and applications that act, decide, and execute at scale. It embeds security into development, protecting models, prompts, and APIs from the start. At runtime, it governs agent identity and actions to stop misuse - even with valid access. Across the infrastructure powering AI, it secures containers, multicloud environments, and high-throughput systems with consistent, real-time enforcement. Built on Palo Alto Networks’ proven, enterprise-grade platform and global threat intelligence, Prisma AIRS enables faster adoption, reduces risk, and maintains control over agentic AI operations at scale.

Show More Details
Logo of Adversa AI Security Platform

Adversa AI Security Platform

By Adversa AI

4.3
(12 Ratings)

Adversa AI Security Platform is a software designed to address vulnerabilities and risks in artificial intelligence and machine learning systems. The software analyzes AI models to detect and mitigate issues related to adversarial attacks, bias, privacy concerns, and model robustness. It provides features such as automated testing, continuous monitoring, and risk assessment to help organizations ensure the reliability and safety of their AI deployments. Adversa AI Security Platform supports various machine learning frameworks and is used to identify weaknesses in AI solutions, enabling businesses to enhance the integrity and trustworthiness of their AI applications across industries.

Show More Details
Logo of Zscaler AI Red Teaming

Zscaler AI Red Teaming

By Zscaler

4.4
(11 Ratings)

Zscaler AI Red Teaming software is designed to simulate advanced cyber threats to test and strengthen organizational defenses. The software leverages artificial intelligence to emulate the tactics, techniques, and procedures of adversaries, enabling security teams to identify vulnerabilities in their digital infrastructure. It provides insights into potential gaps in security controls, helps validate detection and response mechanisms, and supports security risk management strategies. By automating complex threat scenarios, the software assists organizations in evaluating the effectiveness of their cybersecurity measures and improving their resilience against evolving threats in a dynamic landscape.

Show More Details
Logo of Cato SASE Cloud

Cato SASE Cloud

By Cato Networks

4.5
(4 Ratings)

Cato SASE Cloud is a software platform that integrates networking and security capabilities using a cloud-native architecture. The software combines secure access service edge functions such as SD-WAN, firewall as a service, secure web gateway, cloud access security broker, and zero trust network access. It enables organizations to connect physical locations, cloud resources, and remote users to a unified, secure global network. By providing centralized management and visibility, the software helps address challenges related to complex network infrastructure, security policy enforcement, and remote connectivity. It is designed to support digital transformation initiatives and simplify both connectivity and security management across distributed environments.

Show More Details
Logo of Prompt Security

Prompt Security

By SentinelOne

5
(4 Ratings)

Prompt Security is a software designed to enhance the security of organizations utilizing generative AI applications. The software provides real-time monitoring and detection of threats targeting AI platforms to support data protection and compliance. It offers features that include identifying unauthorized access, alerting on potential vulnerabilities, and facilitating remediation processes. The software integrates with various AI tools to help safeguard against potential risks such as data leaks or prompt injection attacks. It addresses business challenges related to the safe and responsible deployment of AI technologies by delivering visibility and control over AI-related security events and enabling organizations to maintain secure AI environments.

Show More Details
Logo of HiddenLayer

HiddenLayer

By HiddenLayer

4
(3 Ratings)

HiddenLayer's AI Security Platform secures agentic, generative, and predictive AI applications across the entire lifecycle, including AI discovery, AI supply chain security, AI attack simulation, and AI runtime security. Backed by patented technology and expert-driven adversarial AI research, HiddenLayer protects IP, ensures compliance, and enables safe adoption of AI at enterprise scale. The platform can be deployed via SaaS, On-prem, Air Gapped or hybrid to meet clients preferred integrations while being non-invasive.

Show More Details
Logo of Mindgard

Mindgard

By Mindgard

3.7
(3 Ratings)

Mindgard is a software developed to secure artificial intelligence and machine learning systems against cyber threats. The software provides capabilities for detecting, analyzing, and defending against attacks that target machine learning models. Mindgard offers features such as monitoring AI workloads, assessing vulnerabilities in models, and enabling automated response mechanisms to address both known and emerging threats specific to AI infrastructures. The software assists organizations in identifying risks posed to machine learning deployments and supports compliance efforts by documenting security exposures across different environments. Mindgard addresses the business challenge of protecting AI-driven operations from adversarial attacks and system compromise.

Show More Details
Logo of Alice WonderSuite

Alice WonderSuite

By Alice

4.5
(2 Ratings)

Alice WonderSuite is a software developed by Alice that provides a conversational AI platform designed to automate client communications, deliver natural language understanding, and streamline workforce operations. The software offers features such as virtual assistant capabilities, document processing, and integration with enterprise tools to address the need for efficient and scalable business communications. Alice WonderSuite is intended to help reduce manual tasks by interpreting and responding to queries, managing appointments, and handling workflows, thereby supporting organizations in optimizing operational efficiency and maintaining consistent client engagement. The software is utilized in business environments where automation of routine interactions and information retrieval is required.

Show More Details
Logo of Mend

Mend

By Mend.io

5
(2 Ratings)

The Mend AI Native AppSec Platform is designed to address risks in software created by both human developers and AI systems. The platform unifies static application security testing (SAST), software composition analysis (SCA), container scanning, AI component security and automated AI red teaming, giving teams visibility into risks across the application attack surface. The platform secures AI-generated code, embedded AI components (models, agents, MCPs, RAG pipelines), and conversational AI, while also covering traditional application risks.

Mend.io integrates with development workflows to provide real-time alerts, policy enforcement, and ongoing monitoring across the software development lifecycle. Centralized dashboards and reporting deliver visibility into vulnerabilities, risk trends, and remediation progress. AI-assisted remediation and prioritization workflows enable teams to address issues efficiently and reduce overall risk.

Show More Details
Logo of TrojAI

TrojAI

By TrojAI

5
(2 Ratings)

TrojAI is a software designed to detect and mitigate threats in artificial intelligence models and machine learning workflows. The software focuses on identifying security vulnerabilities such as data poisoning, model tampering, and adversarial attacks in AI systems. It provides automated analysis and monitoring tools aimed at assessing model integrity, enabling organizations to strengthen the reliability and security of their AI deployments. TrojAI is utilized to prevent manipulation of training data and model parameters, assisting businesses in securing machine learning applications against various attack vectors while supporting operational compliance and risk management in AI environments.

Show More Details
Logo of Pillar Security

Pillar Security

By Pillar Security

Pillar Security is a software designed to provide digital asset protection and security management for blockchain-based applications. The software features cryptographic key management, secure wallet infrastructure, and transaction authorization controls to help businesses safeguard their assets and enforce compliance with digital security policies. It enables organizations to manage access permissions, monitor activity logs, and secure sensitive data involved in decentralized finance, identity verification, and other blockchain solutions. Pillar Security addresses the challenge of securing digital assets in environments where traditional cybersecurity tools may not be sufficient, offering a dedicated platform for robust blockchain security and operational risk mitigation.

Be the first to .
Logo of PointGuard AI Platform

PointGuard AI Platform

By PointGuard AI

PointGuard AI Platform secures AI applications and agent-driven systems across their lifecycle, starting with AI Discovery & Inventory to identify models, agents, and integrations. It delivers AI Security Posture Management and AI Security Testing, including AI Red Teaming, to uncover and assess risks such as prompt injection and data exposure. At runtime, AI Anomaly Detection and Guardrails enforce safe behavior, while AI DLP and Access Control protect sensitive data and restrict usage. The Agentic Gateway provides a centralized control point for MCP, API, and A2A traffic. The platform also integrates vulnerability management to prioritize and remediate risks across AI and traditional applications.

Be the first to .
Logo of Straiker

Straiker

By Straiker

Straiker is an AI-native security company purpose-built for agentic AI. Its three-product portfolio covers the full security lifecycle: Discover AI provides agent inventory and posture management, automatically identifying every AI agent, MCP server, and tool integration across coding, productivity, and custom-built agent platforms — with detection against a database of 12,000+ MCP vulnerabilities. Ascend AI delivers continuous adversarial red teaming across every layer of the agent stack. Defend AI provides runtime protection that detects and blocks prompt injection, data exfiltration, tool abuse, and agent hijacking at production speed with 98%+ detection accuracy.

Be the first to .