Overview
Airlock is a quality control solution for AI applications.
Airlock works to help prevent the disclosure of sensitive information, such as PII and PHI, and to control the sentiment and offensiveness of your AI-generated text.
Airlock analyzes your AI-generated text according to your business policies that control how sensitive information is managed. By using Airlock as an AI policy layer between your AI models and your users, you can lower the risk of your AI applications exposing sensitive information or offensive text to your users.
Airlock features a simple API for applying your policies to your AI generated text, and can identify many types of PII, PHI, and other types of sensitive information.
Airlock runs entirely within your cloud and does not require access to any external services outside of your VPC.
Highlights
- Create and apply policies to protect your AI-generated text from disclosing sensitive information such as PII and PHI.
- Airlock runs entirely within your cloud and does not rely on any external services or resources outside of your VPC.
- Airlock has a simple API that makes it ideal as a policy layer for your AI applications.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
---|---|
m7i.large Recommended | $0.49 |
c5.large | $0.49 |
c5.xlarge | $0.49 |
c5.2xlarge | $0.49 |
m7i-flex.large | $0.49 |
m7i.xlarge | $0.49 |
t3.xlarge | $0.49 |
t3.large | $0.49 |
m7i-flex.xlarge | $0.49 |
Vendor refund policy
We do not currently offer refunds but you can cancel at any time.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Initial reiease
Additional details
Usage instructions
After launch, Airlock will begin initializing. The initialization may take up to 3 minutes to complete. You can monitor its status with the command:
curl -k https://<Public_IP>:8080/api/status
The response will indicate if Airlock is ready to serve requests. Once ready, you can send text to the API with the command:
curl -k -X POST https://<Public_IP>:8080/api/explain --data "His name was John Smith with SSN 123-45-6789." -H Content-Type "text/plain"
The response will be a JSON object that contains detailed information about the sensitive information that was found in the text.
For more examples and more information about Airlock, visit its User Guide at https://docs.philterd.ai/airlock .
Resources
Vendor resources
Support
Vendor support
Visit our support home at https://philterd.ai/support/ or contact us at support@philterd.ai .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Customer reviews
Provides endless features and can be adapted to every single application that exists in the world
What is most valuable?
WAF is the most beneficial feature for security posture. Our customers are more than satisfied with the user experience provided by the product. The level of detail of the configuration is the most significant aspect. We can adapt it to every single application that exists in the world. The product helps with the compliance processes.
What needs improvement?
The tool must be simplified. However, if it is simplified, it will lose its competitive edge. The solution requires advanced administrators. However, it has endless features. It would be good if it could be simplified without losing its significant features.
For how long have I used the solution?
I have been using the solution for the last 15 years.
What do I think about the stability of the solution?
I rate the tool’s stability a ten out of ten. We never noticed any instability for 15 years. We use it for very important institutions.
What do I think about the scalability of the solution?
I rate the tool’s scalability a ten out of ten. We can put as many nodes as we want in a cluster. Our clients are mostly enterprises. Our smallest deployment protects more than 100 portals.
How are customer service and support?
We have direct contact with the team. We can also contact the developers.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy if we have a trained administrator. It would be complicated for a simple system administrator. If the administrators go through basic administration training for three days, they will configure it properly. Planning takes longer. We do not know what we have to protect, so we must collect data first. The operational task never took more than three days.
What's my experience with pricing, setup cost, and licensing?
The tool is cheap. We are protecting very sensitive portals. We didn't have a single incident for the last 15 years.
Which other solutions did I evaluate?
Other tools are very limited. They can't protect locally developed applications. Other products only have bundles for solutions like Microsoft 365, SAP, and other well-known applications. If we have custom-developed applications, other products would not be able to protect them.
What other advice do I have?
We have hands-on experience with the product, and we conduct training. I will always recommend the solution because it delivers what it promises. Overall, I rate the product a ten out of ten.