Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Concentric AI Announces Crowdstrike Marketplace Availability of Semantic Intelligence DSPM Solution

Concentric AI’s Semantic Intelligence is the First Data Security Posture Management Solution Available on CrowdStrike Marketplace

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management (DSPM)announced the availability of its Semantic Intelligence DSPM solution to CrowdStrike channel partners and customers via the CrowdStrike Marketplace. Joining the esteemed network of compatible solutions from reliable partners within the CrowdStrike ecosystem, Concentric AI emerges as the first Data Security Posture Management (DSPM) solution in the CrowdStrike Marketplace.

Recommended:  AiThority Interview with Kelly Eliyahu, Senior Director of Product Marketing at Salesforce

Concentric AI’s Semantic Intelligence is the industry’s first Data Security Posture Management solution available on CrowdStrike Marketplace to improve data protection for CrowdStrike customers

With massive cloud migration, a global shift toward remote work, and an increasing reliance on digital data management, businesses are struggling to identify and protect all their sensitive data. Being on the CrowdStrike marketplace allows CrowdStrike customers to have easy access to the leading solution to protect their sensitive structured and unstructured data, while broadening the availability of Concentric AI’s leading DSPM solution.

Concentric AI’s DSPM solution provides organizations with a clear view of everything they need to know about their sensitive data – where it is, who has access to it, and how it has been used. Concentric AI identifies and classifies all of an organization’s sensitive data no matter where it resides – from intellectual property to financial information to PII/PCI/PHI data – without rules or complex policies. In addition, it remediates risk in real-time, leveraging an AI-driven solution for seamless and effective data management and security.

Related Posts
1 of 41,054

“The evolving threat landscape requires a collaborative approach that brings together best-in-class solutions to secure data across various platforms,” said Karthik Krishnan, CEO of Concentric AI. “Being listed in the CrowdStrike Marketplace provides organizations with direct access to Concentric AI’s advanced data security solutions, helping them boost their data security posture.”

Read More About AiThority Interview : AiThority Interview with Ofir Bibi, VP Research at Lightricks

Concentric AI’s Semantic Intelligence DSPM solution scans organizations’ data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data. Concentric AI uses artificial intelligence (AI) to improve discovery and classification accuracy and efficiency to avoid endless regex rules and inaccurate end user labeling. In addition, Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access. It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data.

Concentric AI’s Semantic Intelligence automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk. Its Risk Distance analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files. It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification. Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed.

Recommended: Artificial Intelligence and the Trust Deficit: A Call for Greater Transparency

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.