Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection

Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM solution.
As a result of update to Concentric AI's Semantic Intelligence, organizations can now protect sensitive data communicated in meetings using Zoom, Microsoft Teams, WebEx, and other popular collaboration tools for the first time.
Until today's announcement, sensitive data discovery in audio and video files did not exist in the industry.
With virtual meetings such a popular form of communication, proprietary data is commonly transferred through audio and video files.
Given the sensitive nature of these discussions, content containing confidential information could jeopardize the company's competitive edge and reputation if mishandled.
Without detection and protection of sensitive data shared in virtual meetings, there is a widening gap in data security in what's become an increasingly large attack surface.
While the sheer versatility and complexity of audio and video data presents a unique detection and categorization challenge, Concentric AI's solution is the only one capable of this complex functionality.
The solution uniquely transcribes content shared and discussed in virtual meetings.
Next its AI-driven platform understands the content and context of each transcribed audio and video file to accurately detect sensitive data without false positives.
This is impossible to do using standard rules and regular expressions, given the unstructured and unpredictable nature of conversations.
Concentric AI's Semantic Intelligence DSPM solution scans organizations' data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data.
Concentric AI uses artificial intelligence to improve discovery and classification accuracy and efficiency to avoid endless regex rules and inaccurate end user labeling.
Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access.
It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data.
Concentric AI's Semantic Intelligence automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk.
Its Risk Distance analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files.
It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification.
Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Thu, 14 Dec 2023 13:43:05 +0000


Cyber News related to Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection

Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection - Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM ...
1 year ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
DSPM deep dive: debunking data security myths The Register - Partner Content There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge; its recent buzz has brought scrutiny to various security concepts that have cluttered the ...
1 year ago Go.theregister.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
8 months ago Aws.amazon.com
The Irrefutable Case for Customer-Native DSPM - The counterpoint to these awful statistics is the emergence of data security posture management, which involves the continuous assessment, monitoring, and enhancement of an organization's data security. While some DSPM providers advocate traditional ...
1 year ago Securityboulevard.com
2024 brings changes in data security strategies - 2024 will be a revolutionary year for the data security landscape as Data Security Posture Management technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across business ...
1 year ago Helpnetsecurity.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 month ago Cybersecuritynews.com Inception
How Can DSPM Prevent High-Profile Breaches? - In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach. On the 5th of December 2023, the company shared that the data breach was more damaging than was initially reported. On ...
1 year ago Gbhackers.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
2 months ago Cybersecuritynews.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
Automating Threat Intelligence: Tools And Techniques For 2025 - Automated threat intelligence leverages artificial intelligence (AI), machine learning (ML), and orchestration platforms to collect, analyze, and act on vast amounts of threat data in real time. These platforms offer features like real-time threat ...
1 month ago Cybersecuritynews.com
Threat Intelligence Feeds Flood Analysts With Data, But Context Still Lacking - By combining external threat data with internal risk assessments, contextual threat intelligence helps organizations measure the risk level of alerts or vulnerabilities in relation to their business and technical assets, ensuring that the most ...
1 month ago Cybersecuritynews.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 year ago Securityboulevard.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
2 months ago Cybersecuritynews.com
CVE-2007-0018 - Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the ...
6 years ago
Why Threat Intelligence is Crucial for Modern Cyber Defense - Threat intelligence transforms raw data into actionable insights by analyzing adversaries’ tactics, techniques, and procedures (TTPs), empowering security teams to shift from reactive firefighting to strategic defense. Proactive Threat Hunting: ...
1 month ago Cybersecuritynews.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
3 months ago Cybersecuritynews.com
Rubrik EPE secures enterprise data from cyberattacks - Artificial intelligence, digital transformation, and the Internet of Things have caused a data explosion, leading organizations to grapple with a surging amount of fragmented data where it lives. Rubrik released Rubrik Enterprise Proactive Edition, a ...
1 year ago Helpnetsecurity.com
WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols - At the moment, there is a constantly increasing number of smart video cameras collecting and streaming video throughout the world. Here's what you need to know about WebRTC vs. RTSP and their suitability for various streaming needs. The Basics of ...
1 year ago Feeds.dzone.com
10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
3 months ago Cybersecuritynews.com
Entro Security and Wiz Announce Integration for Improved Non-Human Identity & Cloud Security - Entro Security, a pioneer in Non-Human Identity (NHI) and Secrets Security, and Wiz, a leading cloud security platform, have announced a strategic partnership that brings together Entro’s NHI security platform with Wiz’s Data Security ...
1 month ago Cybersecuritynews.com
5 Valuable Skills Kids Can Gain by Playing Video Games - Video games come in all shapes and sizes and can be very educational for children of all ages. Video games can provide children with valuable skills that can help them in their everyday lives. From problem-solving abilities to self-control, learning ...
2 years ago Welivesecurity.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity - In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous ...
1 year ago Helpnetsecurity.com
Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation - By harnessing advanced AI technology and Google Cloud’s Gemini, Aptori accurately identifies security vulnerabilities in code, applications, APIs, and infrastructure, enabling proactive threat detection, automated remediation, and ongoing ...
3 months ago Cybersecuritynews.com