Concentric AI is part of the newly formed Data Security Posture Management Category in the Gartner Hype Cycle for Data Security

August 18, 2022
Karthik Krishnan
2 min read

Concentric AI Included in Newly Created Data Security Posture Management Category in Recent Gartner® Hype Cycle™ Report

Here are a few key takeaways

1. The Enterprise Data Challenge

Organizations are facing massive data security and privacy risks as data proliferates across multi-cloud and hybrid IT architectures. Identifying meaningful data risk requires understanding data sensitivity, lineage and infrastructure / access configurations that provide a consolidated view into data risks across the entire environment. This is an urgent problem that requires to be immediately addressed

2. What enterprises need

Organizations need  visibility of into the sensitive data across datasets, location as well as consolidated view into the risk associated with inconsistent access privileges, permissions, activity , location and centralized remediation to protect their data from loss

3. The name of the game is reducing data risk with a pressing need to accomplish the  following

  • Build a map of sensitive datasets, permissions, entitlements and user access against sensitive data – something that has been a complex process through traditional data security and IAM products
  • Tracking data sensitivity evolution and data lineage across structured and unstructured data
  • Need for a risk assessment against critical data to understand data risk exposure
  • Need to protect data against inappropriate exposure (e.g. excessive access privileges or inappropriate entitlements, unauthorized access, wrong location)

4. Discovery and risk monitoring needs to be tied to remediation

It is critical to be able to be able to remediate issues identified, either natively or through integration with 3rd party products. Effective solutions need a wide range of remediation options – from centralized actions to co-opting end users to integrating into SOC workflows

5. Take the product for a test drive

Assess how quickly any product can be implemented to establish an assessment of an inventory of critical data as well as risk exposure and ability to continually update those assessments and protect your data. Speed, accuracy and scale need to be evaluated with an organization’s data to get a real-world view into a solution’s capabilities

Gartner, Hype Cycle for Data Security, 2022, Published 4 August 2022
Gartner disclaimer
GARTNER and Hype Cycle are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner® does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner® research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner® disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

concentric-logo

Libero nibh at ultrices torquent litora dictum porta info [email protected]

Getting started is easy

Start connecting your payment with Switch App.