Data Loss Prevention​

is the art of understanding your data

Concentric helps build a better DLP solution

With deep insights that don't add to your overhead​

Identify all business critical data

  • Understand the meaning of your content

  • Automatic classification into thematic categories

  • Tag data for more accurate DLP enforcement

Quantify

Data Risk

  • Spot high risk data

  • Continuously monitor changes and additions

  • Leverage the wisdom of your users to spot inappropriate collaboration

Reduce overhead

  • Automated classification without rules, regex or complex policies

  • Easily adjust entitlements or access from within the tool

  • Integrate with third party DLP solutions

Real-World Protection
Risky behavior

Risky sharing with third parties 

User downloads a "contract" from SharePoint, modifies it, uploads it to Box, link-shares with third parties who should not have access to it 

What Concentric can do
  • Identify document sensitivity. Does it contain PII/other regulated information?

  • Spot related risk. What documents have been shared inappropriately?

  • Identify the blast radius. Have other copies/modifications been shared elsewhere?

Inappropriate sharing with personal accounts

User shares "design doc" with third parties or personal email account

  • Find sharing risks. What are the sensitive documents have been shared with third parties or personal email accounts?

  • Focus your response. Get a list of only the relevant business-critical data that's been shared.

Business critical data in the  wrong location

User creates a highly sensitive document, stores it in a “public” folder

  • Determine business criticality. What does the document contain?

  • Assess risk level. Should the document be shared?

Misclassification of sensitive content

User creates a confidential "master services agreement" and classifies it as “public”

  • Identify scope of loss. Have attackers accessed the data? Did internal users have access to data they should not have?

Solution-Panel-Background.jpg

Why Concentric Semantic Intelligence™

Surface high risk data and remediate with ease

Monitor sensitive data for inaccurate classification, inappropriate collaboration and other risks. Remediate with ease.  

Unstructured data of any type and in any location - on-premises or in the cloud

Office files, G-Suite, PDFs, Source Code, text documents and more. Windows file shares and cloud storage services like OneDrive, SharePoint, Google Drive, Box, Dropbox Amazon S3, Microsoft Azure and more.

Automatically Deep Learn and Surface Business Critical Documents

For unstructured documents, meaning reveals sensitivity.  Concentric Semantic Intelligence deep learns the content and context of your data to find your most valuable assets - intellectual property, financial reports, business confidential information, PII/PCI data and more.

No rules, no need for end-user classification

Does not require any rules, regex, complex upfront policies or end user inputs.

Featured Resources

BLOG

Cloud, Content, Collaboration redefining Data Security

Latest numbers show a dramatic shift in challenges to reducing data risk.

SOLUTION BRIEF

Data Exposure Monitoring & Protection

Solution Brief highlights the uniqueness in Concentric Semantic Intelligence technology and how it helps reduce Data Loss, regardless of whether data is on-premises or in the cloud.

BLOG

Data Risk Management 

Effective data risk management is not hard. Just needs creative approaches

What our customers say

"Concentric is an essential part of our data security portfolio. We use it to identify all our business-critical data – product documentation, finance reports, contracts etc. Legacy solutions don’t work autonomously, and we’re forced to review flagged documents and fix security violations manually. Concentric gives us a critical layer of data security intelligence on top of the data protection solutions we already use."

 Sreeni Kancharla, CISO, Cadence Design Systems