Concentric AI

Concentric AI’s DSPM solution identifies risk within sensitive data
Concentric AI will demonstrate the latest in autonomous data security at the RSA Conference 2023, including showcasing the deep learning-based Data Security Posture Management …

Concentric AI channel partner program enhances partner revenue opportunities
Concentric AI has launched its new channel partner program which is aimed at enabling partners’ growth and success delivering the leading solution in the rapidly expanding …

Concentric AI’s DSPM solution detects sensitive or business critical content
Concentric AI announced a DSPM solution with support for optimized large language models delivering improved data security and protection. As a result, Concentric AI’s …

Concentric AI collaborates with CTERA to improve data security posture management
CTERA seamlessly integrates Concentric AI‘s Semantic Intelligence solution into customer environments by deploying an edge filer that acts as a cache server for …

Purpose-based access control: Putting data access requests into context
Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business …

Concentric AI joins forces with Snowflake to improve data security posture management for customers
Concentric AI has partnered with Snowflake to integrate its Semantic Intelligence solution. This integration benefits joint customers by making Concentric AI’s data security …

Concentric AI names Daniel Emanuele as SVP of Sales
Concentric AI announced it has named former Fidelis Cybersecurity sales executive Daniel Emanuele as its first Senior Vice President of Sales. Emanuele will lead the company’s …
Featured news
Resources
Don't miss
- What the GitGuardian secrets sprawl report reveals about leaked credentials
- KillChainGraph: Researchers test machine learning framework for mapping attacker behavior
- AIDEFEND: Free AI defense framework
- Boards are being told to rethink their role in cybersecurity
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms