Data Loss Prevention
the art of understanding your data
Autonomous data discovery and risk assessment
eliminate rule and policy maintenance for enterprise DLP
Identify All Business Critical Data
Understand the meaning of your content
Automatic classification into thematic categories
Tag data for more accurate DLP enforcement
Quantify Data Risk
Spot high risk data with Risk Distance™ analysis
Continuously monitor changes and additions
Leverage the wisdom of your users to spot inappropriate collaboration
Automated classification without rules, regex or complex policies
Easily adjust entitlements or access from within the tool
Integrate with third party DLP solutions
Risky sharing with third parties
User downloads a "contract" from SharePoint, modifies it, uploads it to Box, link-shares with third parties who should not have access to it
What Concentric can do
Identify document sensitivity. Does it contain PII/other regulated information?
Spot related risk. What documents have been shared inappropriately?
Identify the blast radius. Have other copies/modifications been shared elsewhere?
Inappropriate sharing with personal accounts
User shares "design doc" with third parties or personal email account
Find sharing risks. What are the sensitive documents have been shared with third parties or personal email accounts?
Focus your response. Get a list of only the relevant business-critical data that's been shared.
Business critical data in the wrong location
User creates a highly sensitive document, stores it in a “public” folder
Determine business criticality. What does the document contain?
Assess risk level. Should the document be shared?
Misclassification of sensitive content
User creates a confidential "master services agreement" and classifies it as “public”
Identify scope of loss. Have attackers accessed the data? Did internal users have access to data they should not have?
Why Concentric Semantic Intelligence™
Surface high risk data and remediate with ease
Risk Distance™ analysis finds inaccurate classification, inappropriate collaboration and other risks. Remediate with ease.
Unstructured data of any type and in any location - on-premises or in the cloud
Office files, G-Suite, PDFs, Source Code, text documents and more. Windows file shares and cloud storage services like OneDrive, SharePoint, Google Drive, Box, Dropbox Amazon S3, Microsoft Azure and more.
Automatically Deep Learn and Surface Business Critical Documents
For unstructured documents, meaning reveals sensitivity. Concentric Semantic Intelligence deep learns the content and context of your data to find your most valuable assets - intellectual property, financial reports, business confidential information, PII/PCI data and more.
No rules, no need for end-user classification
Does not require any rules, regex, complex upfront policies or end user inputs.
Cloud, Content, Collaboration redefining Data Security
Latest numbers show a dramatic shift in challenges to reducing data risk.
Data Exposure Monitoring & Protection
Solution Brief highlights the uniqueness in Concentric Semantic Intelligence technology and how it helps reduce Data Loss, regardless of whether data is on-premises or in the cloud.
Data Risk Management
Effective data risk management is not hard. Just needs creative approaches
What our customers say
"Concentric is an essential part of our data security portfolio. We use it to identify all our business-critical data – product documentation, finance reports, contracts etc. Legacy solutions don’t work autonomously, and we’re forced to review flagged documents and fix security violations manually. Concentric gives us a critical layer of data security intelligence on top of the data protection solutions we already use."
Sreeni Kancharla, CISO, Cadence Design Systems