Poolside has built a credible enterprise code-AI offering with on-prem deployment and custom-trained models. For general code assistance in enterprise settings, it is a legitimate option. For security-specific workflows — vulnerability analysis, remediation PR generation, compliance evidence — the requirement is different and the architecture that serves it is different. Griffin AI and Poolside target overlapping but not identical use cases.
What Poolside provides
Three strengths:
- On-prem deployment for regulated environments.
- Custom-trained models that can be fine-tuned on the customer's code.
- Code-specific reasoning as the primary design goal.
Customers with strict on-prem requirements and budget for custom training can build substantial workflows on it.
Where security workflows diverge
Three requirements Poolside does not specifically target:
- Reachability analysis. Security needs whole-call-graph grounding, not just code completion.
- Policy and compliance integration. Organisational policy and regulatory frameworks are not code; they're rules that need to be joined with findings.
- Eval harness with security-specific benchmarks. Not a code-completion eval; a vulnerability-detection-and-remediation eval.
Poolside can be extended to support these, but the out-of-the-box product is code-assistant-first.
How they fit together
Some customers run both:
- Poolside: general on-prem code assistance.
- Griffin AI: security-specific analysis and remediation.
The two don't compete; they fill different roles.
When Poolside is the right primary choice
Two cases:
- Code productivity is the primary need; security is secondary.
- On-prem requirement is binding and Griffin AI's on-prem option doesn't fit.
For security-primary deployments, Griffin AI's grounding architecture is the better match.
How Safeguard Helps
Safeguard's Griffin AI focuses on security-specific workflows with pre-built grounding (reachability, SBOM, policy) that a general code-AI tool would require extensive additional engineering to replicate. For security-primary deployments, it's the right-shaped tool.