Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Fraud.net Reviews & Ratings
    56 Ratings
    Company Website
  • Qloo Reviews & Ratings
    23 Ratings
    Company Website
  • Vertex AI Reviews & Ratings
    673 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • R3 Contract Management for GovCon Reviews & Ratings
    1 Rating
    Company Website
  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • Thinfinity Workspace Reviews & Ratings
    14 Ratings
    Company Website

What is Concentric?

Take control of your data management through the implementation of zero-trust access governance. Start by identifying and assessing risks to effectively safeguard critical business content. It is imperative to protect sensitive and regulated information while ensuring compliance with various regulatory standards related to financial data, privacy, and individual rights such as the right to be forgotten. Concentric provides seamless, agentless connectivity to a wide array of data repositories, enabling you to manage data access no matter where it is located. Our platform accommodates both structured and unstructured data, whether it is stored in the cloud or on your own premises. Furthermore, it integrates effortlessly with popular data classification frameworks like Microsoft Information Protection, allowing you to achieve comprehensive coverage and improved accuracy in classification throughout your security ecosystem. If you need additional features that are not specified, please do not hesitate to contact us; our dedicated professional services team stands ready to assist with efficiently connecting your data. By utilizing our innovative solutions, you can significantly bolster your overall data governance and enhance your security posture, ensuring that your organization remains resilient in the face of evolving challenges. Ultimately, effective data management is essential for sustaining operational integrity and fostering trust with stakeholders.

What is CipherTrust Data Security Platform?

Thales has transformed the data security arena with its CipherTrust Data Security Platform, which streamlines data protection, accelerates compliance efforts, and supports secure transitions to the cloud. This cutting-edge platform is built on a modern micro-services architecture tailored for cloud settings and features vital components like Data Discovery and Classification, effectively amalgamating top capabilities from the Vormetric Data Security Platform, KeySecure, and its related connector products. By integrating data discovery, classification, protection, and advanced access controls with centralized key management, the CipherTrust Data Security Platform functions as a unified entity. As a result, organizations benefit from reduced resource allocation for data security operations, improved compliance outcomes, and a significant decrease in overall business risk. This platform serves as an all-encompassing suite of data-centric security solutions, enabling enterprises to efficiently oversee and manage their data security requirements through a single, cohesive interface. Furthermore, it not only ensures strong protection and compliance but also adapts to the rapidly changing demands of the digital world, positioning organizations to respond effectively to emerging threats and challenges.

Media

Media

Integrations Supported

Microsoft 365
SQL Server
ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
Adobe Document Cloud
Amazon S3
BlueCat Gateway
Box
CipherTrust Tokenization
Citizen RIMS
Dropbox
Finboot
Google Drive
IBM Cloud
MySQL
Oracle Database
Zoho Analytics
Zoho CRM

Integrations Supported

Microsoft 365
SQL Server
ALIP
Accenture Cloud Retail Execution
Accenture Cloud Trade Promotion Management
Adobe Document Cloud
Amazon S3
BlueCat Gateway
Box
CipherTrust Tokenization
Citizen RIMS
Dropbox
Finboot
Google Drive
IBM Cloud
MySQL
Oracle Database
Zoho Analytics
Zoho CRM

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Concentric AI

Date Founded

2018

Company Location

United States

Company Website

concentric.ai/

Company Facts

Organization Name

Thales Cloud Security

Company Location

United States

Company Website

cpl.thalesgroup.com/encryption/data-security-platform

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Deep Learning

Convolutional Neural Networks
Document Classification
Image Segmentation
ML Algorithm Library
Model Training
Neural Network Modeling
Self-Learning
Visualization

Categories and Features

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives