Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/17/2020
08:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Concentric Resolves Unaddressed Data Security Threats with AI-based Data Access Governance Solution

Company's Risk Distance deep learning functionality autonomously identifies access and activity risks in unstructured data.

SAN JOSE, Calif., Nov. 12, 2020 — Concentric Inc., a leading vendor of intelligent AI-based solutions for protecting business-critical data, today announced the latest advancements available in its Semantic Intelligence data access governance solution that address the industry’s continued challenges with unstructured data security threats by autonomously identifying risk created by inappropriate access, sharing and management of unstructured data.

Concentric’s Semantic Intelligence solution now offers patent-pending Risk Distance™ analysis for autonomous assessment of file and activity-based risk. Risk Distance uniquely uses advanced deep learning technology (a type of artificial intelligence) to find at-risk data by comparing each file to its peers. These peer file comparisons give security professionals for the first time the highly targeted and actionable guidance they need to finally secure their business-critical unstructured data without hard-to-maintain rules or complex configurations.

Recent data security incidents at a major bank and drug manufacturer highlight how even large, well-funded organizations cannot fully secure their unstructured data. Protecting millions of disparate files stored across a sprawl of data storage options is a daunting task for IT professionals. Available tools are inaccurate and labor-intensive, failing to reliably identify business-critical files, assess risk or provide insight into urgency. Concentric’s Semantic Intelligence Data Access Governance solution addresses these unmet unstructured data security needs using the latest innovations in AI technology – without needing additional staff or end-user involvement.

“We trust Concentric’s solution to effectively secure unstructured data,” said Sebastian Goodwin, VP of Cybersecurity at Nutanix. “With Risk Distance analysis, we can see the policies our users have adopted, understand which files are at risk compared to their peers and enforce zero-trust practices in ways that don’t constrain the business.”

Concentric emerged from stealth mode earlier this year with $7.5M in funding and a team of expert AI and data security technologists. This summer, the company added Concentric MIND, a deep-learning-as-a-service infrastructure that aggregates and curates models from across customer installations for faster, more accurate data categorization and adaptation to industry-specific data types. Now, with the addition of AI-based Risk Distance analysis, the solution can identify specific risk factors and asses the urgency to act by comparing each file to how its peers are configured and used – without upfront work, rule development and maintenance or end-user classification programs.

Semantic Intelligence is the only data access governance solution capable of giving security professionals the concise, actionable information they need by identifying the intersection of risk, business criticality and urgency. Offering more than 175 thematic data categories, Semantic Intelligence offers the industry’s best autonomous data categorization capability, which is the key to effective risk management. Offered as an easy-to-deploy SaaS platform, Semantic Intelligence needs no agents, upfront configuration or rules development, and delivers value in days, not weeks or months as seen with traditional solutions.

“Prior to today’s launch, the industry had no way to find file-based and activity-based risk without writing complex rules or implementing cumbersome end-user classification programs,” said Karthik Krishnan, Concentric CEO. “Now, important progress in deep learning research – commercialized by Concentric – has created a third way. We’ve built the first comprehensive solution to the problem of access management for large bodies of unstructured data.”

With Risk Distance’s pioneering ability to identity business criticality, unusual security configurations (e.g. file sharing or classification) and anomalous activities (e.g. file movement or management), security professionals benefit from accurate, actionable unstructured data security at scale. They can focus on only urgent data security issues without having to assess thousands of unimportant files; can discover all types of data risk, from permission errors to misclassification to activity to location; and can eliminate complex, rule-based tools with an autonomous system that taps into the collective wisdom of file owners.

Availability and Pricing

Today’s announced updates to the Semantic Intelligence Data Access Governance solution are available now. Contact Concentric (www.concentric.ai) for pricing and a product demo.

About Concentric
With Concentric, organizations can finally address their unmet unstructured data security needs by discovering and protecting business critical content which, according to Gartner, represents 80 percent of all corporate data. Concentric protects intellectual property, financial documents, PII/PCI content, business confidential data and more, across on-premises and cloud-based data stores. The Concentric Semantic Intelligence™ Data Access Governance solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk and remediate security issues - without relying on upfront rules or complex configuration. Concentric is venture backed by leading Silicon Valley VCs and is headquartered in San Jose, Calif. For more information, see https://www.concentric.ai.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28973
PUBLISHED: 2021-04-13
The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
CVE-2021-29997
PUBLISHED: 2021-04-13
XML External Entity Resolution (XXE) in Helix ALM. The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
CVE-2021-29998
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.
CVE-2021-29999
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks through 6.8. There is a possible stack overflow in dhcp server.
CVE-2021-21729
PUBLISHED: 2021-04-13
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1