USA

Concentric AI Introduces Industry’s First Audio/Video File Data Discovery and Protection in a Data Security Posture Management Solution

Karthik

Sensitive Data Communicated in Meetings Using Zoom, Microsoft Teams, WebEx, and Other Popular Collaboration Tools Can Now be Discovered and Protected for the First Time

 Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management (DSPM), today announced that its Semantic Intelligence DSPM solution now offers the industry’s first sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its market-leading DSPM solution.

“Organizations came to us asking for this functionality – the first of its kind in a DSPM solution – and we are pleased to rapidly respond and deliver on these growing industry requirements due to increased remote and hybrid workforces.”

Karthik Krishnan, Founder and CEO, Concentric AI.

As a result of today’s update to Concentric AI’s Semantic Intelligence, organizations can now protect sensitive data communicated in meetings using Zoom, Microsoft Teams, WebEx, and other popular collaboration tools for the first time. Until today’s announcement, sensitive data discovery in audio and video files did not exist in the industry.

“When it comes to unstructured data protection, Concentric AI is at the forefront of protecting sensitive data from risk – no matter where it is or in what format – even audio and video recordings now as a result of today’s launch,” said Karthik Krishnan, Founder and CEO, Concentric AI. “Organizations came to us asking for this functionality – the first of its kind in a DSPM solution – and we are pleased to rapidly respond and deliver on these growing industry requirements due to increased remote and hybrid workforces. Our partners are also now better equipped to meet their customers’ demands for this robust functionality.”

With virtual meetings such a popular form of communication, proprietary data is commonly transferred through audio and video files. Given the sensitive nature of these discussions, content containing confidential information could jeopardize the company’s competitive edge and reputation if mishandled. Without detection and protection of sensitive data shared in virtual meetings, there is a widening gap in data security in what’s become an increasingly large attack surface.

While the sheer versatility and complexity of audio and video data presents a unique detection and categorization challenge, Concentric AI’s solution is the only one capable of this complex functionality. The solution uniquely transcribes content shared and discussed in virtual meetings. Next its AI-driven platform understands the content and context of each transcribed audio and video file to accurately detect sensitive data without false positives. This is impossible to do using standard rules and regular expressions, given the unstructured and unpredictable nature of conversations.

Concentric AI’s Semantic Intelligence DSPM solution scans organizations’ data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data. Concentric AI uses artificial intelligence (AI) to improve discovery and classification accuracy and efficiency to avoid endless regex rules and inaccurate end user labeling. In addition, Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access. It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data.

Concentric AI’s Semantic Intelligence automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk. Its Risk Distance™ analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files. It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification. Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed.

Related posts

Future-Proofing Compliance: Envisioning AI Chat Backups for Tomorrow’s Regulations

enterpriseitworld

CybeReady Unveils Remote Workforce CISO Training Toolkit for Global Work-From-Home Day

enterpriseitworld

Atlas and datascalehr partner

enterpriseitworld
x