EY accelerates secure AI development using Microsoft Purview SDK | Microsoft Customer Stories
Scaling AI development often comes with compliance and data governance challenges. This customer story shows how EY Global Services used Microsoft Purview SDK to meet internal security requirements while enabling rapid AI development across teams. Read the story to see how they balance innovation with control and contact Gibson Technology Solutions to discuss how this approach could support your development pipeline.
What is the purpose of Microsoft Purview SDK for EY?
EY uses Microsoft Purview SDK to embed data security, compliance, and governance directly into their AI applications. This integration allows them to apply policy-based controls, monitor AI interactions, and log activities, which helps in maintaining compliance and ensuring secure deployment at scale.
How has EY improved its development process with Purview SDK?
By adopting Microsoft Purview SDK early in the development cycle, EY has reduced the time needed to build secure features by 25% to 30%. This allows their teams to design with data security and compliance in mind, leading to faster rollouts of GenAI tools in regulated environments.
What benefits does EY's Dragonfly platform offer?
EY's Dragonfly platform, which integrates with Microsoft Purview SDK, provides a low-code environment for creating and managing AI workflows with built-in data security and compliance. It centralizes data interactions, offers visibility into data risks, and supports auditability for security investigations, ensuring that security concerns do not hinder development.

EY accelerates secure AI development using Microsoft Purview SDK | Microsoft Customer Stories
published by Gibson Technology Solutions
Gibson Technology Solutions (a New Jersey Corporation) was founded in 2009 after a group of the top IT professionals recognized the need for innovative computer solutions at competitive rates.
We offer:
Managed IT Services
- 24/7 monitoring of your entire business network
- Unlimited access for your staff to reach out to our IT support desk
- Network security
- Regular on-site visits by a certified IT professional
- Workstation and server maintenance
CyberSecurity Assessments & Audits
- Penetration Testing
- Vulnerability Assessment Scans
- Web Application Scans
- Wireless Penetration Testing
Check out our ebook to find solutions on how to Scale Your IT Operations!
Learn More About Us