Vectara

Categories

Blog - page 7

All posts

Security Guidance for All Authentication Methods

Security Guidance for All Authentication Methods

At Vectara, we recognize the importance of robust security in all of our authentication methods. While OAuth remains the gold standard in security with features like automated expiry and the JWT token flow, we understand it’s not always feasible for every user or scenario.

Nick Ma
Nick Ma
Introducing Vectara’s Custom Prompt Engine

Introducing Vectara’s Custom Prompt Engine

Vectara’s all-new Custom Prompt Engine allows customers to take their Retrieval Augmented Generation (RAG) system to the next level: by introducing completely custom prompts that can reference the most relevant text and metadata to solve your GenAI headaches.

Shane Connelly
Shane Connelly
Before you go...

Connect with
our Community!