Gemini Enterprise
EnterpriseProduct overview
Name of Agent: Gemini Enterprise
Advertised use: data management and resources for different teams
Monetisation/Usage price: 21
30, more controls and custom coded agents
both per seat cost
Who is using it?: enterprises
Category: Enterprise
Company & accountability
Developer: Google
For profit company?: Yes
Parent company?: Alphabet Inc
Technical capabilities & system architecture
Model specifications: None found (but presumably Gemini)
Observation space: Has access to the internet and can be connected to custom data sources.
Memory architecture: None found
User interface and interaction design: Node-based canvas
User roles: Designer (user designs agentic workflows)
Component accessibility: Closed source
Autonomy & control
Autonomy level and planning depth: L1-L2: user has full control over how to design the agent and is directly manipulating the canvas. User can also use the built-in assistant, which can make some changes on behalf of the user but user ultimately has full control. Resulting agents are L3-L5: tackles multi-step tasks and might be more proactive about asking for user feedback if prompted to do so but not necessarily default behavior
User approval requirements for different decision types: None
Execution monitoring, traces, and transparency: Visible (albeit summarized) CoT when reasoning is activated
Emergency stop and shut down mechanisms and user control: User can pause/stop the agent at any time
Usage monitoring and statistics and patterns: Assume usage can be monitored via the Google Cloud console
Ecosystem interaction
Identify to humans?: None found
Safety, evaluation & impact
Technical guardrails and safety measures: Gemini Enterprise includes Model Armor as “built-in guardrails” that screen user prompts and responses to proactively detect prompt injection, jailbreaking, and sensitive data (link
, archived)Model Armor templates support enforcement modes: Inspect and block (default) (blocks and shows an error) and Inspect only (non-blocking) (link, archived)
Sandboxing and containment approaches: None found
What types of risks were evaluated?: None found
(Internal) safety evaluations and results: None found
Third-party testing, audits, and red-teaming: None found
Benchmark performance and demonstrated capabilities: None found