{"id":8790,"date":"2025-09-10T05:55:22","date_gmt":"2025-09-10T05:55:22","guid":{"rendered":"https:\/\/test.detech.com.tr\/?page_id=8790"},"modified":"2025-11-16T15:19:15","modified_gmt":"2025-11-16T15:19:15","slug":"calypso-ai","status":"publish","type":"page","link":"https:\/\/test.detech.com.tr\/en\/calypso-ai\/","title":{"rendered":"CALYPSO AI"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"8790\" class=\"elementor elementor-8790\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a98a1 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6a98a1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65d7dab9\" data-id=\"65d7dab9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-490b9ffb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible\" data-id=\"490b9ffb\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-719e4f84\" data-id=\"719e4f84\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb39dfe elementor-widget elementor-widget-heading\" data-id=\"cb39dfe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Calypso AI - AI Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d26c187 elementor-widget elementor-widget-text-editor\" data-id=\"1d26c187\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>CalypsoAI is an adaptive security platform that provides real-time threat defense, testing (red-team), compliance and traceability for generative AI systems. It offers protection at the inference layer for applications and \"agents\" (artificial agents).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad53821 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"ad53821\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1ac9a60\" data-id=\"1ac9a60\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15458ac elementor-widget elementor-widget-image\" data-id=\"15458ac\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/edit-info.svg\" class=\"attachment-large size-large wp-image-10076\" alt=\"\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40cd1f3 elementor-widget elementor-widget-heading\" data-id=\"40cd1f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is it?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-574b85a elementor-widget elementor-widget-text-editor\" data-id=\"574b85a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">CalypsoAI is a security platform developed to make AI systems secure, transparent and manageable. It tests, protects and audits AI applications and agents used by organizations in real time. With its model or vendor-agnostic structure, it easily integrates with different AI solutions and provides security at the inference layer, allowing organizations to use their AI investments with confidence.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-18d53c1\" data-id=\"18d53c1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64eaa54 elementor-widget elementor-widget-image\" data-id=\"64eaa54\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error.png\" class=\"attachment-large size-large wp-image-10081\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/error-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490ecea elementor-widget elementor-widget-heading\" data-id=\"490ecea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Why is it important?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6acdd1 elementor-widget elementor-widget-text-editor\" data-id=\"c6acdd1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">The rapid deployment of artificial intelligence in organizations brings with it new security and compliance risks. Threats such as data leaks, prompt injection attacks or false content generation put companies' reputation and regulatory compliance at risk. CalypsoAI proactively manages these risks, enabling organizations to use AI technologies with confidence. It also responds to the security needs of tomorrow, not just today, thanks to its adaptive approach to the ever-changing threat landscape.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-01dd911\" data-id=\"01dd911\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35ad340 elementor-widget elementor-widget-image\" data-id=\"35ad340\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation.png\" class=\"attachment-large size-large wp-image-10082\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/09\/innovation-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f0c27 elementor-widget elementor-widget-heading\" data-id=\"21f0c27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What does it offer?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c4e2ca elementor-widget elementor-widget-text-editor\" data-id=\"6c4e2ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">CalypsoAI offers three core competencies: Red-Team to pre-test vulnerabilities in AI applications, Defend to block real-time threats, and Observe to make all interactions traceable and reportable. Thus, organizations can use AI systems in a way that is not only secure but also compliant with regulations, transparent and measurable.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2261486 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2261486\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ad3433b\" data-id=\"ad3433b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69ff189 elementor-widget elementor-widget-image\" data-id=\"69ff189\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield.png\" class=\"attachment-large size-large wp-image-10236\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73fb853 elementor-widget elementor-widget-heading\" data-id=\"73fb853\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Protection in the Inference Layer<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-607d5ca elementor-widget elementor-widget-text-editor\" data-id=\"607d5ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Many security solutions either look at the development process or deal with model training, but CalypsoAI stands out especially in the area of inference, that is, the threats that arise when using the model and the auditing of outputs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-f9f52bd\" data-id=\"f9f52bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9264cf5 elementor-widget elementor-widget-image\" data-id=\"9264cf5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural.png\" class=\"attachment-large size-large wp-image-10237\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fc210b elementor-widget elementor-widget-heading\" data-id=\"4fc210b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Model and Vendor Independence<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cd423d elementor-widget elementor-widget-text-editor\" data-id=\"4cd423d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>It doesn't matter which AI model or provider is used; the system can adapt to any model. This flexibility is a great advantage for organizations that want to try different models in the corporate environment or want to stick to different providers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-9385992\" data-id=\"9385992\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eefc10 elementor-widget elementor-widget-image\" data-id=\"3eefc10\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card.png\" class=\"attachment-large size-large wp-image-10238\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-130c4b8 elementor-widget elementor-widget-heading\" data-id=\"130c4b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Proactive Red-Team Approach<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43c20f1 elementor-widget elementor-widget-text-editor\" data-id=\"43c20f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Not just waiting for incoming threats, but constantly testing, creating scenarios, seeing in advance where the line of defense is weak and fixing it. This is a proactive strategy instead of reactive security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6defca1\" data-id=\"6defca1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3382571 elementor-widget elementor-widget-image\" data-id=\"3382571\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair.png\" class=\"attachment-large size-large wp-image-10239\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-100x100.png 100w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6958e7 elementor-widget elementor-widget-heading\" data-id=\"c6958e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">24\/7 SOC\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cc21e5 elementor-widget elementor-widget-text-editor\" data-id=\"7cc21e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>It not only keeps logs or reports retrospectively; it can automatically switch to interventions such as monitoring, alarm, blocking or appropriate policy implementation. In addition, the element of traceability and auditability in terms of security and compliance is strong.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4118ca11 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4118ca11\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-797b61f\" data-id=\"797b61f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-037f7f2 elementor-widget elementor-widget-heading\" data-id=\"037f7f2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\nDo you have a business idea?\nWe are here to meet your cyber security needs with our team.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4debcf2a elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4debcf2a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7fdcacd elementor-invisible\" data-id=\"7fdcacd\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-477bfdb2 wpr-fancy-text-rotate-1 wpr-advanced-text-style-animated wpr-animated-text-infinite-yes elementor-widget elementor-widget-wpr-advanced-text\" data-id=\"477bfdb2\" data-element_type=\"widget\" data-settings=\"{&quot;anim_loop&quot;:&quot;yes&quot;}\" data-widget_type=\"wpr-advanced-text.default\">\n\t\t\t\t\t\n\t\t<h3 class=\"wpr-advanced-text\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"wpr-advanced-text-preffix\">Calypso AI - AI Security<\/span>\n\t\t\t\n\t\t<span class=\"wpr-anim-text wpr-anim-text-type-rotate-1\" data-anim-duration=\"1000,2000\" data-anim-loop=\"yes\">\n\t\t\t<span class=\"wpr-anim-text-inner\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\n\t\t\t\t\n\t\t<\/h3>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3399caf5 elementor-widget elementor-widget-text-editor\" data-id=\"3399caf5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>CalypsoAI is an adaptive security platform that provides real-time threat defense, testing (red-team), compliance and traceability for generative AI systems. It offers protection at the inference layer for applications and \"agents\" (artificial agents).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bdb96aa wpr-button-icon-style-inline wpr-button-icon-position-right elementor-widget elementor-widget-wpr-button\" data-id=\"6bdb96aa\" data-element_type=\"widget\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect wpr-button-none\" data-text=\"\" href=\"\/en\/contact\/\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-icon\"><svg class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-38d6c16f\" data-id=\"38d6c16f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1caa8f99 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1caa8f99\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-search\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Compliance and Traceability<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chart-line\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 384H64V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-32c0-8.84-7.16-16-16-16zM464 96H345.94c-21.38 0-32.09 25.85-16.97 40.97l32.4 32.4L288 242.75l-73.37-73.37c-12.5-12.5-32.76-12.5-45.25 0l-68.69 68.69c-6.25 6.25-6.25 16.38 0 22.63l22.62 22.62c6.25 6.25 16.38 6.25 22.63 0L192 237.25l73.37 73.37c12.5 12.5 32.76 12.5 45.25 0l96-96 32.4 32.4c15.12 15.12 40.97 4.41 40.97-16.97V112c.01-8.84-7.15-16-15.99-16z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Adaptive Security Platform<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"glyph-icon flaticon-secure\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Real-time Protection<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba812a7 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"5ba812a7\" data-element_type=\"widget\" data-settings=\"{&quot;bdt_shape_builder_list&quot;:[{&quot;_id&quot;:&quot;b90c7df&quot;,&quot;shape_color_popover&quot;:&quot;yes&quot;,&quot;shape_fill_type&quot;:&quot;gradient&quot;,&quot;shape_gradient_color_1&quot;:&quot;#2FA174&quot;,&quot;shape_gradient_color_2&quot;:&quot;#0E4D4D&quot;,&quot;shape_gradient_location_2&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;shape_gap&quot;:{&quot;column&quot;:&quot;400&quot;,&quot;row&quot;:&quot;400&quot;,&quot;isLinked&quot;:true,&quot;unit&quot;:&quot;px&quot;},&quot;shape_gap_mobile&quot;:{&quot;column&quot;:&quot;350&quot;,&quot;row&quot;:&quot;350&quot;,&quot;isLinked&quot;:true,&quot;unit&quot;:&quot;px&quot;},&quot;shape_position_popover&quot;:&quot;yes&quot;,&quot;shape_position_horizontal_offset_start&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:72,&quot;sizes&quot;:[]},&quot;shape_position_horizontal_offset_start_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-12,&quot;sizes&quot;:[]},&quot;shape_position_vertical_offset_start&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-300,&quot;sizes&quot;:[]},&quot;shape_position_vertical_offset_start_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-224,&quot;sizes&quot;:[]},&quot;shape_builder_animation_popover&quot;:&quot;yes&quot;,&quot;animation_viewport&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.5,&quot;sizes&quot;:[]},&quot;animation_name&quot;:&quot;pulse&quot;,&quot;animation_duration&quot;:{&quot;unit&quot;:&quot;s&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;animation_delay&quot;:{&quot;unit&quot;:&quot;s&quot;,&quot;size&quot;:0.3,&quot;sizes&quot;:[]},&quot;animation_easing&quot;:&quot;circ.out&quot;,&quot;animation_repeat&quot;:&quot;-1&quot;,&quot;animation_yoyo&quot;:&quot;yes&quot;,&quot;css_filters_css_filter&quot;:&quot;custom&quot;,&quot;css_filters_blur&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:6.5,&quot;sizes&quot;:[]},&quot;shape_offset_popover&quot;:&quot;yes&quot;,&quot;__globals__&quot;:{&quot;shape_gradient_color_1&quot;:&quot;&quot;,&quot;shape_gradient_color_2&quot;:&quot;&quot;},&quot;shape_type&quot;:&quot;circle&quot;,&quot;custom_shape_upload&quot;:null,&quot;custom_shape_color_popover&quot;:null,&quot;shape_color&quot;:null,&quot;shape_gradient_location_1&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;shape_gradient_type&quot;:&quot;linear&quot;,&quot;shape_gradient_angle&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:90,&quot;sizes&quot;:[]},&quot;animation_trigger_type&quot;:&quot;on-load&quot;,&quot;shape_offset_hover_popover&quot;:&quot;&quot;}]}\" data-widget_type=\"html.default\">\n\t\t\t\t\t<br><div data-wrapper-id=\"elementor-element-5ba812a7\" class=\"bdt-shape-builder elementor-repeater-item-b90c7df\" data-animation-enabled=\"true\" data-animation-trigger=\"on-load\" data-animation-name=\"pulse\" data-animation-duration=\"3\" data-animation-delay=\"0.3\" data-animation-easing=\"circ.out\" data-animation-repeat=\"-1\" data-animation-yoyo=\"true\" data-animation-viewport=\"0.5\">\n            <svg viewbox='0 0 100 100' preserveaspectratio='none'>\n                \n                <defs>\n                    <lineargradient id='grad-b90c7df' gradienttransform='rotate(90)'>\n                        <stop offset='0%' stop-color='#2FA174' \/>\n                        <stop offset='0%' stop-color='#0E4D4D' \/>\n                    <\/lineargradient>\n                <\/defs>\n            \n                <path d='M50 10a40 40 0 1 1 0 80a40 40 0 1 1 0-80Z' fill='url(#grad-b90c7df)'><\/path>\n            <\/svg>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-429b78bc elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"429b78bc\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;curve&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;section_parallax_on&quot;:&quot;yes&quot;,&quot;section_parallax_x_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;section_parallax_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-200,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61f2447d\" data-id=\"61f2447d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12ea061b elementor-widget elementor-widget-heading\" data-id=\"12ea061b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IS IT?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c90849e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5c90849e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-51d09053 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"51d09053\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-32c61ef9\" data-id=\"32c61ef9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49f53265 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"49f53265\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/loupe.png\" title=\"loupe\" alt=\"loupe\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Secure, Transparent and Manageable Infrastructure for Artificial Intelligence Systems<\/h3><p class=\"elementor-image-box-description\">CalypsoAI is a security platform developed to make AI systems secure, transparent and manageable. It tests, protects and audits AI applications and AI agents used by organizations in real time.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-50552a40\" data-id=\"50552a40\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3421c350 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"3421c350\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/code.png\" class=\"attachment-full size-full wp-image-10880\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/code.png 64w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/code-12x12.png 12w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Model Independent Integration and Security at the Inference Layer<\/h3><p class=\"elementor-image-box-description\">Model or vendor agnostic, it easily integrates with different AI solutions and provides security at the inference layer, enabling organizations to use AI investments with confidence.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4be0ecb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4be0ecb9\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e916c64\" data-id=\"2e916c64\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-797cfe2e elementor-widget elementor-widget-heading\" data-id=\"797cfe2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is it important?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a7ac25 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"20a7ac25\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-739c2ba3 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"739c2ba3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6b8c9dde\" data-id=\"6b8c9dde\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-603679a1 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"603679a1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/target.png\" class=\"attachment-full size-full wp-image-11045\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/target.png 64w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/target-12x12.png 12w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Why it matters<\/h3><p class=\"elementor-image-box-description\">The rapid deployment of artificial intelligence in organizations brings with it new security and compliance risks. Threats such as data leaks, prompt injection attacks or false content generation put companies' reputation and regulatory compliance at risk. CalypsoAI proactively manages these risks, enabling organizations to use AI technologies with confidence. It also responds to the security needs of tomorrow, not just today, thanks to its adaptive approach to the ever-changing threat landscape.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1fe1b7db\" data-id=\"1fe1b7db\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62059bba elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"62059bba\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/insight.png\" class=\"attachment-full size-full wp-image-11044\" alt=\"what it offers\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/insight.png 64w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/11\/insight-12x12.png 12w\" sizes=\"(max-width: 64px) 100vw, 64px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">What does it offer?<\/h3><p class=\"elementor-image-box-description\">CalypsoAI offers three core competencies: Red-Team to pre-test vulnerabilities in AI applications, Defend to block real-time threats, and Observe to make all interactions traceable and reportable. Thus, organizations can use AI systems in a way that is not only secure but also compliant with regulations, transparent and measurable.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45d0176b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"45d0176b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;curve&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;section_parallax_on&quot;:&quot;yes&quot;,&quot;section_parallax_x_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;section_parallax_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-200,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1eca9d72\" data-id=\"1eca9d72\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2899415 elementor-widget elementor-widget-heading\" data-id=\"2899415\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Features<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-420a0666 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"420a0666\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-196deaab elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"196deaab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-170224d4\" data-id=\"170224d4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f82ebba elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"6f82ebba\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield.png\" class=\"attachment-full size-full wp-image-10236\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/security-shield-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Protection in the Inference Layer<\/h3><p class=\"elementor-image-box-description\">Many security solutions either look at the development process or deal with model training, but CalypsoAI stands out especially in the area of inference, that is, the threats that arise when using the model and the auditing of outputs.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-636ad0b\" data-id=\"636ad0b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f537e57 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"4f537e57\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural.png\" class=\"attachment-full size-full wp-image-10237\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/neural-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Model and Vendor Independence<\/h3><p class=\"elementor-image-box-description\">It doesn't matter which AI model or provider is used; the system can adapt to any model. This flexibility is a great advantage for organizations that want to try different models in the corporate environment or want to stick to different providers.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-269554a7\" data-id=\"269554a7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f17f76b elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"2f17f76b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card.png\" class=\"attachment-full size-full wp-image-10238\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/red-card-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Proactive Red-Team Approach<\/h3><p class=\"elementor-image-box-description\">Not just waiting for incoming threats, but constantly testing, creating scenarios, seeing in advance where the line of defense is weak and fixing it. This is a proactive strategy instead of reactive security.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-49d989b0\" data-id=\"49d989b0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2acfb6d elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"2acfb6d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair.png\" class=\"attachment-full size-full wp-image-10239\" alt=\"\" srcset=\"https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair.png 512w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-300x300.png 300w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-150x150.png 150w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-12x12.png 12w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-500x500.png 500w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-400x400.png 400w, https:\/\/test.detech.com.tr\/wp-content\/uploads\/2025\/10\/repair-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">24\/7 SOC<\/h3><p class=\"elementor-image-box-description\">It not only keeps logs or reports retrospectively; it can automatically switch to interventions such as monitoring, alarm, blocking or appropriate policy implementation. In addition, the element of traceability and auditability in terms of security and compliance is strong.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78ed4789 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"78ed4789\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-466ce842 bdt-backdrop-filter-yes bdt-filter-backdrop\" data-id=\"466ce842\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f38aab elementor-widget elementor-widget-heading\" data-id=\"8f38aab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strengthen Your Safety Posture<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c7a8619 elementor-widget elementor-widget-text-editor\" data-id=\"4c7a8619\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tCalypso AI - AI Security\ndiscover our solutions. With our team of experts\nGet in touch.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443e3a16 wpr-button-icon-position-left wpr-button-icon-style-inline elementor-widget elementor-widget-wpr-button\" data-id=\"443e3a16\" data-element_type=\"widget\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect wpr-button-back-pulse\" data-text=\"\" href=\"\/en\/contact\/\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-icon\"><i class=\"ion ion-email\"><\/i><\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Calypso AI &#8211; AI Security CalypsoAI, gen yapay zek\u00e2 (Generative AI) sistemleri i\u00e7in ger\u00e7ek zamanl\u0131 tehdit savunmas\u0131, test (red-team), uyumluluk ve izlenebilirlik sa\u011flayan adaptif bir g\u00fcvenlik platformudur. Uygulamalar ve \u201cagent\u201d (yapay ajanlar) i\u00e7in inference katman\u0131nda koruma sunar. Nedir? CalypsoAI, yapay zek\u00e2 sistemlerini g\u00fcvenli, \u015feffaf ve y\u00f6netilebilir hale getirmek i\u00e7in geli\u015ftirilmi\u015f bir g\u00fcvenlik platformudur. Kurumlar\u0131n kulland\u0131\u011f\u0131 gen AI uygulamalar\u0131n\u0131 ve yapay zek\u00e2 ajanlar\u0131n\u0131 ger\u00e7ek zamanl\u0131 olarak test eder, korur ve denetlenebilir k\u0131lar. Model veya sa\u011flay\u0131c\u0131dan ba\u011f\u0131ms\u0131z yap\u0131s\u0131yla, farkl\u0131 yapay zek\u00e2 \u00e7\u00f6z\u00fcmlerine kolayca entegre olur ve inference (\u00e7al\u0131\u015fma) katman\u0131nda g\u00fcvenlik sa\u011flayarak, organizasyonlar\u0131n AI yat\u0131r\u0131mlar\u0131n\u0131 g\u00fcvenle kullanmas\u0131na olanak tan\u0131r. Neden \u00d6nemli? Yapay zek\u00e2n\u0131n kurumlarda h\u0131zla yayg\u0131nla\u015fmas\u0131, beraberinde yeni g\u00fcvenlik ve uyumluluk risklerini getirmektedir. Veri s\u0131z\u0131nt\u0131lar\u0131, prompt injection sald\u0131r\u0131lar\u0131 veya yanl\u0131\u015f i\u00e7erik \u00fcretimi gibi tehditler, \u015firketlerin itibar\u0131n\u0131 ve reg\u00fclasyonlara uyumunu riske atar. CalypsoAI, bu riskleri proaktif bir \u015fekilde y\u00f6neterek, kurumlar\u0131n AI teknolojilerini g\u00fcven i\u00e7inde kullanmas\u0131n\u0131 sa\u011flar. Ayr\u0131ca s\u00fcrekli de\u011fi\u015fen tehdit ortam\u0131na adaptif yakla\u015f\u0131m\u0131 sayesinde, sadece bug\u00fcn\u00fcn de\u011fil, yar\u0131n\u0131n g\u00fcvenlik gereksinimlerine de yan\u0131t verir. Ne Sunar? CalypsoAI, \u00fc\u00e7 temel yetkinlik sunar: Red-Team ile yapay zek\u00e2 uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nceden test eder, Defend mod\u00fcl\u00fcyle ger\u00e7ek zamanl\u0131 tehditleri engeller ve Observe sayesinde t\u00fcm etkile\u015fimleri izlenebilir ve raporlanabilir hale getirir. B\u00f6ylece kurumlar, AI sistemlerini sadece g\u00fcvenli de\u011fil; ayn\u0131 zamanda reg\u00fclasyonlara uyumlu, \u015feffaf ve \u00f6l\u00e7\u00fcmlenebilir \u015fekilde kullanabilir. Inference Katman\u0131nda Koruma Bir\u00e7ok g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc ya geli\u015ftirme s\u00fcrecine bak\u0131yor ya da model e\u011fitimi ile ilgileniyor, ancak CalypsoAI \u00f6zellikle inference yani model kullan\u0131l\u0131rken ortaya \u00e7\u0131kan tehditler ve \u00e7\u0131kt\u0131lar\u0131n denetlenmesi konusunda \u00f6ne ge\u00e7iyor. Model ve Vendor Ba\u011f\u0131ms\u0131zl\u0131k Kullan\u0131lan yapay zek\u00e2 modeli ya da sa\u011flay\u0131c\u0131s\u0131n\u0131n kim oldu\u011fu \u00f6nemli de\u011fil; sistem herhangi bir modele adapte olabiliyor. Bu esneklik, kurumsal ortamda farkl\u0131 modeller deneyen ya da farkl\u0131 sa\u011flay\u0131c\u0131lara ba\u011fl\u0131 kalmak isteyen organizasyonlar i\u00e7in b\u00fcy\u00fck avantaj. Proaktif Red-Team Yakla\u015f\u0131m\u0131 Sadece gelen tehditleri beklemek de\u011fil; s\u00fcrekli test etmek, senaryolar olu\u015fturmak, savunma hatt\u0131n\u0131n nerelerde zay\u0131f kald\u0131\u011f\u0131n\u0131 \u00f6nceden g\u00f6rmek ve d\u00fczeltmek. Bu, reaktif g\u00fcvenlik yerine proaktif bir strateji. 7\/24 SOC Sadece log tutmak ya da ge\u00e7mi\u015fe d\u00f6n\u00fck raporlamakla kalm\u0131yor; izlencesi, alarm\u0131, engelleme ya da uygun politika uygulamas\u0131 gibi m\u00fcdahalelere otomatik olarak ge\u00e7ebiliyor. Ayr\u0131ca g\u00fcvenlik ve uyumluluk a\u00e7\u0131s\u0131ndan izlenebilirlik, denetlenebilirlik unsuru g\u00fc\u00e7l\u00fc. Bir i\u015f fikriniz var m\u0131? Ekibimizle siber g\u00fcvenlik ihtiya\u00e7lar\u0131n\u0131z\u0131 kar\u015f\u0131lamak i\u00e7in burday\u0131z. Calypso AI &#8211; AI Security CalypsoAI, gen yapay zek\u00e2 (Generative AI) sistemleri i\u00e7in ger\u00e7ek zamanl\u0131 tehdit savunmas\u0131, test (red-team), uyumluluk ve izlenebilirlik sa\u011flayan adaptif bir g\u00fcvenlik platformudur. Uygulamalar ve \u201cagent\u201d (yapay ajanlar) i\u00e7in inference katman\u0131nda koruma sunar. \u0130leti\u015fime Ge\u00e7 Uyumluluk ve \u0130zlenebilirlik Adaptif G\u00fcvenlik Platformu Ger\u00e7ek Zamanl\u0131 Koruma NED\u0130R? Yapay Zek\u00e2 Sistemleri \u0130\u00e7in G\u00fcvenli, \u015eeffaf ve Y\u00f6netilebilir Altyap\u0131 CalypsoAI, yapay zek\u00e2 sistemlerini g\u00fcvenli, \u015feffaf ve y\u00f6netilebilir hale getirmek i\u00e7in geli\u015ftirilmi\u015f bir g\u00fcvenlik platformudur. Kurumlar\u0131n kulland\u0131\u011f\u0131 gen AI uygulamalar\u0131n\u0131 ve yapay zek\u00e2 ajanlar\u0131n\u0131 ger\u00e7ek zamanl\u0131 olarak test eder, korur ve denetlenebilir k\u0131lar. Model Ba\u011f\u0131ms\u0131z Entegrasyon ve Inference Katman\u0131nda G\u00fcvenlik Model veya sa\u011flay\u0131c\u0131dan ba\u011f\u0131ms\u0131z yap\u0131s\u0131yla, farkl\u0131 yapay zek\u00e2 \u00e7\u00f6z\u00fcmlerine kolayca entegre olur ve inference (\u00e7al\u0131\u015fma) katman\u0131nda g\u00fcvenlik sa\u011flayarak, organizasyonlar\u0131n AI yat\u0131r\u0131mlar\u0131n\u0131 g\u00fcvenle kullanmas\u0131na olanak tan\u0131r. Neden \u00d6nemli? Neden \u00d6nemli Yapay zek\u00e2n\u0131n kurumlarda h\u0131zla yayg\u0131nla\u015fmas\u0131, beraberinde yeni g\u00fcvenlik ve uyumluluk risklerini getirmektedir. Veri s\u0131z\u0131nt\u0131lar\u0131, prompt injection sald\u0131r\u0131lar\u0131 veya yanl\u0131\u015f i\u00e7erik \u00fcretimi gibi tehditler, \u015firketlerin itibar\u0131n\u0131 ve reg\u00fclasyonlara uyumunu riske atar. CalypsoAI, bu riskleri proaktif bir \u015fekilde y\u00f6neterek, kurumlar\u0131n AI teknolojilerini g\u00fcven i\u00e7inde kullanmas\u0131n\u0131 sa\u011flar. Ayr\u0131ca s\u00fcrekli de\u011fi\u015fen tehdit ortam\u0131na adaptif yakla\u015f\u0131m\u0131 sayesinde, sadece bug\u00fcn\u00fcn de\u011fil, yar\u0131n\u0131n g\u00fcvenlik gereksinimlerine de yan\u0131t verir. Ne Sunar? CalypsoAI, \u00fc\u00e7 temel yetkinlik sunar: Red-Team ile yapay zek\u00e2 uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nceden test eder, Defend mod\u00fcl\u00fcyle ger\u00e7ek zamanl\u0131 tehditleri engeller ve Observe sayesinde t\u00fcm etkile\u015fimleri izlenebilir ve raporlanabilir hale getirir. B\u00f6ylece kurumlar, AI sistemlerini sadece g\u00fcvenli de\u011fil; ayn\u0131 zamanda reg\u00fclasyonlara uyumlu, \u015feffaf ve \u00f6l\u00e7\u00fcmlenebilir \u015fekilde kullanabilir. Temel \u00d6zellikler Inference Katman\u0131nda Koruma Bir\u00e7ok g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc ya geli\u015ftirme s\u00fcrecine bak\u0131yor ya da model e\u011fitimi ile ilgileniyor, ancak CalypsoAI \u00f6zellikle inference yani model kullan\u0131l\u0131rken ortaya \u00e7\u0131kan tehditler ve \u00e7\u0131kt\u0131lar\u0131n denetlenmesi konusunda \u00f6ne ge\u00e7iyor. Model ve Vendor Ba\u011f\u0131ms\u0131zl\u0131k Kullan\u0131lan yapay zek\u00e2 modeli ya da sa\u011flay\u0131c\u0131s\u0131n\u0131n kim oldu\u011fu \u00f6nemli de\u011fil; sistem herhangi bir modele adapte olabiliyor. Bu esneklik, kurumsal ortamda farkl\u0131 modeller deneyen ya da farkl\u0131 sa\u011flay\u0131c\u0131lara ba\u011fl\u0131 kalmak isteyen organizasyonlar i\u00e7in b\u00fcy\u00fck avantaj. Proaktif Red-Team Yakla\u015f\u0131m\u0131 Sadece gelen tehditleri beklemek de\u011fil; s\u00fcrekli test etmek, senaryolar olu\u015fturmak, savunma hatt\u0131n\u0131n nerelerde zay\u0131f kald\u0131\u011f\u0131n\u0131 \u00f6nceden g\u00f6rmek ve d\u00fczeltmek. Bu, reaktif g\u00fcvenlik yerine proaktif bir strateji. 7\/24 SOC Sadece log tutmak ya da ge\u00e7mi\u015fe d\u00f6n\u00fck raporlamakla kalm\u0131yor; izlencesi, alarm\u0131, engelleme ya da uygun politika uygulamas\u0131 gibi m\u00fcdahalelere otomatik olarak ge\u00e7ebiliyor. Ayr\u0131ca g\u00fcvenlik ve uyumluluk a\u00e7\u0131s\u0131ndan izlenebilirlik, denetlenebilirlik unsuru g\u00fc\u00e7l\u00fc. G\u00fcvenlik Duru\u015funuzu G\u00fc\u00e7lendirin Calypso AI &#8211; AI Security \u00e7\u00f6z\u00fcmlerimizi ke\u015ffedin. Uzman ekibimizle ileti\u015fime ge\u00e7in. \u0130leti\u015fime Ge\u00e7<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8790","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/8790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/comments?post=8790"}],"version-history":[{"count":22,"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/8790\/revisions"}],"predecessor-version":[{"id":11143,"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/8790\/revisions\/11143"}],"wp:attachment":[{"href":"https:\/\/test.detech.com.tr\/en\/wp-json\/wp\/v2\/media?parent=8790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}