Data Loss Prevention

the art of understanding your data

Autonomous data discovery and risk assessment

eliminate rule and policy maintenance for enterprise DLP


Identify All Business Critical Data

  • Understand the meaning of your content

  • Automatic classification into thematic categories

  • Tag data for more accurate DLP enforcement


Quantify Data Risk

  • Spot high risk data with Risk Distance™ analysis

  • Continuously monitor changes and additions

  • Leverage the wisdom of your users to spot inappropriate collaboration


Reduce Overhead

  • Automated classification without rules, regex or complex policies

  • Easily adjust entitlements or access from within the tool

  • Integrate with third party DLP solutions

Real-World Protection
Risky behavior

Risky sharing with third parties 

User downloads a "contract" from SharePoint, modifies it, uploads it to Box, link-shares with third parties who should not have access to it 

What Concentric can do
  • Identify document sensitivity. Does it contain PII/other regulated information?

  • Spot related risk. What documents have been shared inappropriately?

  • Identify the blast radius. Have other copies/modifications been shared elsewhere?

Inappropriate sharing with personal accounts

User shares "design doc" with third parties or personal email account

  • Find sharing risks. What are the sensitive documents have been shared with third parties or personal email accounts?

  • Focus your response. Get a list of only the relevant business-critical data that's been shared.

Business critical data in the  wrong location

User creates a highly sensitive document, stores it in a “public” folder

  • Determine business criticality. What does the document contain?

  • Assess risk level. Should the document be shared?

Misclassification of sensitive content

User creates a confidential "master services agreement" and classifies it as “public”

  • Identify scope of loss. Have attackers accessed the data? Did internal users have access to data they should not have?


Why Concentric Semantic Intelligence™

deep learn.png

Surface high risk data and remediate with ease

Risk Distance™ analysis finds inaccurate classification, inappropriate collaboration and other risks. Remediate with ease.  

No Rules.png

Data of any type and in any location - on-premises or in the cloud

Office files, G-Suite, PDFs, Source Code, text documents, databases and more.  On-premises and cloud . Support for Windows file shares, MSSQL, OneDrive, SharePoint, Google Drive, Box, Dropbox Amazon S3, Microsoft Azure and more.

Automatically Deep Learn and Surface Business Critical Data

For unstructured documents, meaning reveals sensitivity.  Concentric Semantic Intelligence deep learns the content and context of your data to find your most valuable assets - intellectual property, financial reports, business confidential information, PII/PCI data and more.

High Risk.png

No rules, no need for end-user classification

Does not require any rules, regex, complex upfront policies or end user inputs.

any type.png

Featured Resources


Cloud, Content, Collaboration redefining Data Security

Latest numbers show a dramatic shift in challenges to reducing data risk.


Data Exposure Monitoring & Protection

Solution Brief highlights the uniqueness in Concentric Semantic Intelligence technology and how it helps reduce Data Loss, regardless of whether data is on-premises or in the cloud.


Data Risk Management 

Effective data risk management is not hard. Just needs creative approaches

What our customers say


"Concentric is an essential part of our data security portfolio. We use it to identify all our business-critical data – product documentation, finance reports, contracts etc. Legacy solutions don’t work autonomously, and we’re forced to review flagged documents and fix security violations manually. Concentric gives us a critical layer of data security intelligence on top of the data protection solutions we already use."

 Sreeni Kancharla, CISO, Cadence Design Systems