Concentric Logo

Concentric

0
Commercial
Visit Website

Concentric Semantic Intelligence is a Data Security Governance Platform that provides autonomous data discovery, classification, risk monitoring, and remediation capabilities. The platform uses AI to automatically locate, classify, and protect sensitive information across on-premises and cloud environments. It focuses on identifying data risks and implementing appropriate security measures without requiring manual configuration. Key functionalities include: 1. Data Security Posture Management (DSPM) - Identifies and remediates data risks across entire environments 2. Data Detection and Response - Autonomous detection and mitigation of data security threats 3. Data Access Governance - Enforces appropriate access controls to meet compliance requirements 4. Data Classification - Accurately identifies and categorizes sensitive business data 5. Identity-Aware Data Security - Manages access permissions and detects risky sharing patterns 6. Behavioral Analytics - Monitors for abnormal user behavior related to data access The platform specifically helps organizations protect personally identifiable information (PII) such as social security numbers, bank account details, passport numbers, and customer addresses. It integrates with various systems including Microsoft Office 365, Slack, Snowflake, Dropbox, Microsoft SQL Server, and Google Workspace.

FEATURES

ALTERNATIVES

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

Detect stegano-hidden data in PNG & BMP using zsteg tool.

A sensitive data detection tool for scanning source code repositories

A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.

A steganographic file system in userspace for plausible deniability of files.

Steganography brute-force utility with performance issues, deprecated in favor of stegseek.

Cyera is a data security platform that discovers, classifies, and secures sensitive data across various environments, offering features such as DSPM, identity data access, and data privacy compliance.

Commercial

A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security