Product and roadmap
Which modules to lead with, which to follow, what agentic AI buyers really need, and whether multi-language coverage is a wedge or a nice-to-have.
Three lenses. Each maps to a question on the table for Looking Glass leadership now.
Which modules to lead with, which to follow, what agentic AI buyers really need, and whether multi-language coverage is a wedge or a nice-to-have.
Who owns the budget, what the buying committee looks like, what they will pay for AI safety, how they want to be priced, and which channel they prefer.
Whether the frontier-lab halo helps or hurts in enterprise, whether cloud-native is good enough, the in-housing threat, and which packaging path wins — specialist platform, cloud bundle, app-vendor bundle, security-platform bundle, or in-house.
A single screening question classifies each respondent by current state. Questions about a current vendor or in-house solution are shown only where they apply. Every respondent completes the final section — the Looking Glass opportunity — where the expansion thesis is stress-tested.
Consent and disclaimer.
Welcome to Crossover Research's study on enterprise AI Safety, Security and Trust software.
Thank you for your interest in participating. This study explores how enterprises evaluate, adopt, and use AI safety and security software. We are seeking input from professionals involved in the selection or implementation of AI safety solutions at their organizations.
Estimated completion 20 minutes. Honorarium USD 200, payable via digital gift card, PayPal, Venmo, ACH, and other options. All responses are anonymous and analyzed in aggregate.
Filters to senior enterprise buyers with real AI in production and identifies their current state — named vendor, in-house build, BPO partner, or nothing in place yet.
Which best describes the type of organization at which you work?
Which best describes your organization's current state with generative AI?
What is your organization's approximate annual revenue?
Which best describes how your organization currently handles AI safety, security, or red-teaming?
What is your level of involvement in your organization's decisions about AI safety and security tooling — whether for current solutions or future purchases?
Are you, or anyone in your immediate household, currently employed by an AI safety, AI security, content moderation, or trust and safety software or services vendor?
This survey takes 18 to 22 minutes. Please proceed only if you can dedicate focused time.
Builds the segmentation: AI maturity, app count, monthly inference volume, agent stage, cloud, internal-versus-external AI mix, the gateway and framework layer where buying decisions sit, and whether they have an internal AI safety team. Industry and org size are not asked — both are reliably pullable from external sources and joined post-fielding via the company name captured in Section 13.
How many distinct generative AI use cases does your organization have in production today, or expect within 12 months?
Approximately how many distinct generative AI applications, models, or agents does your organization run in production today?
Approximately how many requests, prompts, or user interactions do your production AI applications process in a typical month?
How large is your organization's dedicated AI or ML engineering team?
Which cloud platform hosts most of your AI workloads?
Has your organization built, or is it actively building, an internal AI safety, AI security, or AI red-teaming team?
Where is your organization on agentic AI adoption?
Which describe the AI systems your organization runs or plans to run in the next 12 months? Select all that apply.
Of your AI and agent activity over the next 12 months, approximately what share is internal employee-facing versus external customer-facing?
Which AI gateways, agent frameworks, or orchestration platforms is your organization using or evaluating? Select all that apply.
How long has your organization been using your primary AI safety approach?
What's driving spend, what they weight in selection, who owns the budget, who else is in the room, and when the next decision lands.
Rate how strongly each of the following is driving (or would drive) your AI safety investment priorities.
What is driving — or would drive — your investment in AI safety and security tooling? Select all that apply.
What solution, if any, was in place before adopting your primary AI safety approach?
How important are (or would be) each of the following factors when selecting AI safety tooling?
How would you rate your implementation experience with your primary AI safety approach?
At the moment of procurement, what was the single biggest factor that tipped your decision toward your primary AI safety approach?
When do you expect to make your next AI safety or security purchasing decision?
Who owns the budget for AI safety and security in your organization?
How many people are typically involved in an AI safety or security buying decision at your organization?
How important is multi-language coverage in an AI safety and security solution?
What is the single biggest blocker today to deploying AI more broadly at your organization?
Maps the eleven AI safety functions to who handles each today — current vendor, other software, cloud-native, manual or BPO, or nothing. Direct test of whether cloud-native is good enough.
For each AI safety function, how is it primarily handled at your organization today?
| Function | Primary vendor | Other software | Cloud-native | Manual / BPO | Nothing |
|---|---|---|---|---|---|
| Pre-launch adversarial testing and red-teaming | |||||
| Runtime input filtering (prompt guardrails) | |||||
| Runtime output filtering (response guardrails) | |||||
| Post-launch monitoring and drift detection | |||||
| Threat intelligence on emerging adversarial tactics | |||||
| Agent and tool-use observability | |||||
| Content moderation (user-generated and AI-generated) | |||||
| Compliance reporting and audit trail | |||||
| PII redaction and DLP for AI workflows | |||||
| Custom policy authoring and policy-as-code | |||||
| Image and multimodal content safety |
For each function where you indicated 'Other software,' please list the vendor or tool name.
How would you rate the investment priority of AI safety and security within your organization's overall technology budget?
You rated AI safety's investment priority as a piped score. What factors influence this level of priority in your organization?
For each statement about cloud-native AI safety tooling (AWS Bedrock Guardrails, Azure Content Safety, Google Model Armor), indicate your level of agreement.
| Statement | Strongly disagree | Disagree | Neutral | Agree | Strongly agree |
|---|---|---|---|---|---|
| Cloud-native guardrails are sufficient for our current AI safety needs | |||||
| Cloud-native guardrails fall behind on emerging threats like new jailbreak patterns | |||||
| Cloud-native guardrails lock us into a single cloud provider | |||||
| Cloud-native guardrails are good enough for non-regulated use cases | |||||
| We would prefer a specialist vendor as our cloud AI workloads grow | |||||
| Cloud-native guardrails are sufficient for agentic AI and tool-use scenarios |
Status and forward demand across eleven AI safety capabilities — what they use today, what they plan to adopt, and the soft middle where messaging matters.
What is your status on each AI safety capability today?
| Capability | Use today | Plan to adopt | Interested | Not interested | Not sure |
|---|---|---|---|---|---|
| Agentic AI safety and tool-call validation | |||||
| Content moderation (user-generated and AI-generated) | |||||
| Image and video generation safety | |||||
| Multi-agent coordination safety | |||||
| Post-launch monitoring and drift detection | |||||
| Pre-launch adversarial testing and red-teaming | |||||
| Runtime input and output filtering (AI firewall) | |||||
| Sector-specific compliance modules (financial services, healthcare, public sector) | |||||
| Threat intelligence on adversarial tactics | |||||
| Unified AI policy plane / AI gateway | |||||
| Voice AI safety |
For each capability where you indicated 'Interested' or 'Not interested,' rate the likelihood your organization will adopt it in the next 12 months.
For respondents already using a named vendor, cloud-native, or open-source: support, satisfaction, mission criticality, and a per-capability scorecard on the incumbent.
How would you rate the quality and responsiveness of support provided by your primary AI safety approach?
Overall, how satisfied are you with your primary AI safety approach?
Rate your primary AI safety approach on each of the following product capabilities.
How mission-critical is your primary AI safety approach to your organization's operations?
You characterized your primary approach's mission criticality as a piped score. Please explain.
Awareness and consideration across the full vendor set — and whether enterprises expect the AI application vendor (Sierra, Decagon, Cresta, ElevenLabs) to own the safety layer.
For each of the following vendors, indicate your status.
| Vendor | Not aware | Aware only | Evaluated | Trialed | Customer |
|---|---|---|---|---|---|
| Alice (formerly ActiveFence) | |||||
| AWS Bedrock Guardrails | |||||
| Azure AI Content Safety or Prompt Shield | |||||
| CalypsoAI | |||||
| F5 AI Guardrails | |||||
| Google Cloud Model Armor | |||||
| Guardrails AI | |||||
| HiddenLayer | |||||
| Lakera (Check Point) | |||||
| Microsoft Defender for Cloud AI / Purview AI Hub | |||||
| NeMo Guardrails (NVIDIA) | |||||
| Prompt Security | |||||
| Promptfoo | |||||
| Protect AI (Palo Alto Networks) | |||||
| Robust Intelligence (Cisco) | |||||
| Wiz (AI Security Posture Management) |
If you use a customer-facing AI application vendor (Sierra, Decagon, SoundHound, Cresta, Regal, ElevenLabs, etc.), do you expect that vendor to provide AI safety and security as part of its product?
How does your primary AI safety approach compare to alternative AI safety solutions you have used or evaluated?
You rated your primary approach's comparative performance as a piped score. Please explain your rating.
Current BPO and services spend that could shift to platform, plus forward AI safety budget envelope.
What does your organization currently spend annually on content moderation, trust and safety operations, or related BPO and services?
What is your expected annual budget for AI safety, security, and red-teaming over the next 12 months?
ROI rating, what would unlock more spend, pricing structure preference, premium they would pay for agent coverage, channel preference, unified-platform vs piecemeal-stack elasticity, and whether internal employee-facing AI and external customer-facing AI are bought as one budget or two.
How would you rate the ROI from your primary AI safety approach?
I would be willing to pay more for your primary AI safety approach if it introduced _______. Please explain.
Which pricing structure do you prefer for AI safety and security tooling?
How much more would you be willing to pay for an AI safety solution that explicitly covers agentic AI versus one that covers only chat and generation use cases?
Through which channel would you most likely purchase an AI safety and security platform?
If you were to purchase pre-launch testing, runtime guardrails, and post-launch monitoring as separate modules from different vendors rather than as a unified platform from a single vendor, how much more or less than the unified price would you expect to pay in total?
Do you expect to buy AI safety and security capability as one combined solution covering both internal and external AI, or as separate solutions?
Who owns the budget for each side at your organization — internal employee-facing AI versus external customer-facing AI?
Recommendation likelihood, replacement difficulty, renewal intent, and a verbatim on what use case they would extend their current solution into.
How likely are you to recommend your primary AI safety approach to a peer at another organization?
You rated your likelihood of recommending your primary approach as a piped score. Please explain.
How difficult would it be to replace your primary AI safety approach?
How likely are you to renew your contract with your primary AI safety approach when it expires?
What are the primary factors that would cause you NOT to renew?
If you could deploy your primary AI safety approach into one additional AI use case at your company that they don't cover today, what would it be?
After reading the Looking Glass description: module appeal, evaluation intent, forced single-module choice, latency tolerance by use case, deployment preference, packaging appeal, agent-capability priority, Van Westendorp price points, objections, frontier-lab halo perception, and a question they would ask the CEO.
Before this survey, how familiar were you with Alice (formerly ActiveFence)?
When you think about AI safety, security, or red-teaming vendors, which companies come to mind first? Please list up to five.
Based on the description, how appealing would each Alice product be for your organization?
How likely are you to evaluate Alice for your AI safety needs in the next 12 months?
You rated your likelihood of evaluating Alice as a piped score. Please explain why.
If you could only buy one of the following in the next 12 months, which would it be?
For each AI safety capability, indicate the maximum acceptable latency added per request.
| Capability | Under 50ms | 50 to 150ms | 150 to 500ms | Over 500ms | None |
|---|---|---|---|---|---|
| Input prompt filtering | |||||
| Output filtering | |||||
| PII redaction | |||||
| Agentic tool-call validation |
What is your preferred deployment model for AI safety and security tooling?
How appealing would each of the following packaging options be for AI safety and security capability?
| Packaging option | Not at all | Slightly | Moderately | Very | Extremely |
|---|---|---|---|---|---|
| Unified platform from a single specialist vendor (pre-launch + runtime + post-launch) | |||||
| Best-of-breed specialists, one vendor per capability layer | |||||
| AI safety bundled with the cloud provider running our AI workloads | |||||
| AI safety bundled with the AI application vendor we already use (Sierra, Decagon, Cresta, ElevenLabs) | |||||
| AI safety bundled with our existing enterprise security platform (Palo Alto, Cisco, Check Point, F5) | |||||
| Built and maintained in-house |
Which agent-specific safety capabilities matter most? Rank your top three.
Based on the Alice description, at what annual price (USD) would you consider Alice's unified WonderSuite...
What, if anything, would prevent you from evaluating or buying Alice?
Alice is best known for being the safety partner behind 7 of the 10 largest AI foundation labs and for moderating content for major consumer platforms. How does that credential affect your perception of Alice as a fit for your enterprise?
If you could ask Alice's CEO one question before evaluating the platform, what would it be?
Contact info for honorarium delivery and consent for a follow-up call.
Please input your contact information so we can process your honorarium. Allow up to 7 business days.
Would you be interested in a 60-minute follow-up call to discuss your responses in more detail, for an additional honorarium?
Thank you for your time. Your honorarium will be processed within 5 business days following completion.
Nineteen metrics in this study — twelve numeric ratings, seven open-text rationales — are scored on the same scales we use across our broader research universe. Looking Glass results sit directly alongside benchmark vendors.
| Question code | Where it appears | What it captures |
|---|---|---|
| CC_RANK_Implement Ex | Section 4 (How they buy) | Implementation experience — current-solution users |
| CC_OE_Ven Selection | Section 4 (How they buy) | Why-we-chose verbatim — current-solution users |
| CC_RANK_Invest Prior | Section 5 (What they have today) | AI safety budget priority — all respondents |
| CC_OE_Invest Prior | Section 5 (What they have today) | Piped rationale on investment priority |
| CC_RANK_Support Qual | Section 7 (Current solution performance) | Support quality — specialist-vendor users only |
| CC_RANK_Customer Sat | Section 7 (Current solution performance) | Overall CSAT — specialist-vendor and platform-bundled users |
| CC_RANK_Mission Crit | Section 7 (Current solution performance) | Mission criticality — specialist-vendor and platform-bundled users |
| CC_OE_Mission Crit | Section 7 (Current solution performance) | Piped rationale on mission criticality |
| CC_RANK_Comp Compar | Section 8 (Consideration set) | Comparative rating — current-solution users, including in-house |
| CC_OE_Comp Compar | Section 8 (Consideration set) | Piped rationale on comparative rating |
| CC_RANK_ROI | Section 10 (How they want to pay) | ROI rating — all current-solution users (vendor, in-house, BPO) |
| CC_OE_Feature Enhanc | Section 10 (How they want to pay) | WTP-for-enhancement verbatim |
| CC_RANK_Recommending | Section 11 (Stickiness) | Likelihood-to-recommend — current-solution users, including in-house |
| CC_OE_Recommending | Section 11 (Stickiness) | Piped rationale on recommendation |
| CC_RANK_Replace Diff | Section 11 (Stickiness) | Replacement difficulty — all current-solution users (vendor, in-house, BPO) |
| CC_RANK_Renewal Int | Section 11 (Stickiness) | Renewal intent — specialist-vendor users only |
| CC_RANK_Alice Intent | Section 12 (Looking Glass opportunity) | Post-exposure Looking Glass evaluation intent — all respondents |
| CC_OE_Alice Intent | Section 12 (Looking Glass opportunity) | Piped rationale on Looking Glass intent |
| CC_RANK_Frontier Halo | Section 12 (Looking Glass opportunity) | Frontier-lab credential perception — all respondents |