Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/17/2020
08:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Concentric Resolves Unaddressed Data Security Threats with AI-based Data Access Governance Solution

Company's Risk Distance deep learning functionality autonomously identifies access and activity risks in unstructured data.

SAN JOSE, Calif., Nov. 12, 2020 — Concentric Inc., a leading vendor of intelligent AI-based solutions for protecting business-critical data, today announced the latest advancements available in its Semantic Intelligence data access governance solution that address the industry’s continued challenges with unstructured data security threats by autonomously identifying risk created by inappropriate access, sharing and management of unstructured data.

Concentric’s Semantic Intelligence solution now offers patent-pending Risk Distance™ analysis for autonomous assessment of file and activity-based risk. Risk Distance uniquely uses advanced deep learning technology (a type of artificial intelligence) to find at-risk data by comparing each file to its peers. These peer file comparisons give security professionals for the first time the highly targeted and actionable guidance they need to finally secure their business-critical unstructured data without hard-to-maintain rules or complex configurations.

Recent data security incidents at a major bank and drug manufacturer highlight how even large, well-funded organizations cannot fully secure their unstructured data. Protecting millions of disparate files stored across a sprawl of data storage options is a daunting task for IT professionals. Available tools are inaccurate and labor-intensive, failing to reliably identify business-critical files, assess risk or provide insight into urgency. Concentric’s Semantic Intelligence Data Access Governance solution addresses these unmet unstructured data security needs using the latest innovations in AI technology – without needing additional staff or end-user involvement.

“We trust Concentric’s solution to effectively secure unstructured data,” said Sebastian Goodwin, VP of Cybersecurity at Nutanix. “With Risk Distance analysis, we can see the policies our users have adopted, understand which files are at risk compared to their peers and enforce zero-trust practices in ways that don’t constrain the business.”

Concentric emerged from stealth mode earlier this year with $7.5M in funding and a team of expert AI and data security technologists. This summer, the company added Concentric MIND, a deep-learning-as-a-service infrastructure that aggregates and curates models from across customer installations for faster, more accurate data categorization and adaptation to industry-specific data types. Now, with the addition of AI-based Risk Distance analysis, the solution can identify specific risk factors and asses the urgency to act by comparing each file to how its peers are configured and used – without upfront work, rule development and maintenance or end-user classification programs.

Semantic Intelligence is the only data access governance solution capable of giving security professionals the concise, actionable information they need by identifying the intersection of risk, business criticality and urgency. Offering more than 175 thematic data categories, Semantic Intelligence offers the industry’s best autonomous data categorization capability, which is the key to effective risk management. Offered as an easy-to-deploy SaaS platform, Semantic Intelligence needs no agents, upfront configuration or rules development, and delivers value in days, not weeks or months as seen with traditional solutions.

“Prior to today’s launch, the industry had no way to find file-based and activity-based risk without writing complex rules or implementing cumbersome end-user classification programs,” said Karthik Krishnan, Concentric CEO. “Now, important progress in deep learning research – commercialized by Concentric – has created a third way. We’ve built the first comprehensive solution to the problem of access management for large bodies of unstructured data.”

With Risk Distance’s pioneering ability to identity business criticality, unusual security configurations (e.g. file sharing or classification) and anomalous activities (e.g. file movement or management), security professionals benefit from accurate, actionable unstructured data security at scale. They can focus on only urgent data security issues without having to assess thousands of unimportant files; can discover all types of data risk, from permission errors to misclassification to activity to location; and can eliminate complex, rule-based tools with an autonomous system that taps into the collective wisdom of file owners.

Availability and Pricing

Today’s announced updates to the Semantic Intelligence Data Access Governance solution are available now. Contact Concentric (www.concentric.ai) for pricing and a product demo.

About Concentric
With Concentric, organizations can finally address their unmet unstructured data security needs by discovering and protecting business critical content which, according to Gartner, represents 80 percent of all corporate data. Concentric protects intellectual property, financial documents, PII/PCI content, business confidential data and more, across on-premises and cloud-based data stores. The Concentric Semantic Intelligence™ Data Access Governance solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk and remediate security issues - without relying on upfront rules or complex configuration. Concentric is venture backed by leading Silicon Valley VCs and is headquartered in San Jose, Calif. For more information, see https://www.concentric.ai.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23727
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).
CVE-2020-28175
PUBLISHED: 2020-12-03
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
CVE-2020-13524
PUBLISHED: 2020-12-03
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim n...
CVE-2020-13525
PUBLISHED: 2020-12-03
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-23726
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Wise Care 365 5.5.4, attackers can cause computer crash (BSOD).