Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Securiti Recognized as a Leader
in the 2025 GigaOm Radar for Data Access Governance

Securiti extends DSPM leadership with top recognition for delivering intelligent Data+AI Access Governance across hybrid multiclouds and SaaS

SAN JOSE, Calif., April 29, 2025Securiti, the pioneer of the Data+AI Command Center, today announced that it has been recognized as a Leader in the 2025 GigaOm Radar for Data Access Governance (DAG). The latest report evaluates 15 vendors and positions the Securiti Data Command Center as one of the highest-rated solutions for its strong alignment with customer requirements across both technical capabilities and business value.

“Securiti’s solution is primed for several use cases, including protected data sharing and access among data teams, fortifying applications of AI and LLM-powered copilots, gleaning intelligence about data access, regulatory compliance, and real-time data access monitoring,” said Andrew Brust, GigaOm Analyst.

Securiti Recognized as a Leader in the 2025 GigaOm Radar for Data Access Governance

This recognition builds on Securiti’s recent top ranking in the GigaOm Radar for DSPM, further underscoring its continued innovation and leadership across critical areas of data security and governance.

Unified Data Access Governance Built for the AI Era

Securiti Data Command Center delivers a unified approach to data access governance, purpose-built for modern enterprises navigating the complexities of AI, data security, privacy, governance and compliance. The platform supports structured, unstructured, and streaming data across hybrid multicloud and SaaS environments, allowing organizations to consistently enforce access control policies across diverse data types and AI systems.

At the core of Securiti’s Data Access Governance solution, the Data Command Graph serves as a dynamic knowledge graph. Securiti uses native connectors to integrate with popular structured and unstructured data systems, automatically harvesting metadata and inferring contextual insights—such as data sensitivity, access entitlements, file attributes, AI model and agent usage, user access activity, and regulatory requirements. Built-in machine learning techniques and over 400 out-of-the-box classifiers enhance discovery, which organizations can extend and customize to meet their specific business needs.

The platform surfaces Data and AI Access Intelligence from the Data Command Graph via configurable dashboards. Securiti also provides integrated data lineage and lifecycle tracing, giving teams fine-grained visibility into how data is accessed, transformed, and shared. A built-in data catalog further enhances operational efficiency.

Securiti enforces access governance natively within key data systems using an attribute-based access control model. Security and governance teams can create and automate role-based policies using a no-code policy builder with dropdown-driven configurations. With support for dynamic data masking and context-aware row filtering, the platform enables organizations to apply least-privilege access at scale.

For AI systems, Securiti extends access governance to prompts and responses in GenAI pipelines. Securiti preserves access entitlement context from source data systems as they are used to build AI pipelines, and ensures responses delivered by the AI system are based solely on data to which the user has entitlement. The platform uses patent-pending LLM Firewalls to apply layered inspection and enforcement across the prompt, retrieval, and response stages of generative AI usage. Security teams can define policies that prevent unauthorized access or exfiltration of sensitive data by redacting outputs or restricting access..

By combining these capabilities, Securiti enables organizations to secure access not only to data itself, but also to the indirect ways data is used in AI applications, ensuring that sensitive enterprise information remains protected across today’s dynamic, distributed environments.

Securiti Earns Top Ratings In Key Technical Features and Business Criteria

Thanks to its unified platform-based approach to data and AI access governance, the GigaOm report recognizes Securiti for excellence across several technical and business dimensions:

Key & Emerging Features

  • Unified View: Insights into where data resides, who is requesting access, whether access has been granted, and how the data is being used.
  • Generative AI Governance: Ability to secure data access, privacy, and regulatory compliance for GenAI use cases.
  • Real-Time Risk & Vulnerability Assessment: Continuous assessment of data security and risk posture across hybrid multiclouds.

Business Criteria

  • Ecosystem Integration: Integration with a wide variety of structured and unstructured data systems.
  • Speed of Data Access: Ability to accelerate governed, secure access to enterprise data assets.
  • Intelligent Customization: Understand user preferences, behavior patterns, and improve efficiency through automation.
  • Change Resiliency: Sustain governance as unstructured data, GenAI models, and data protection risks proliferate.

Enabling a Modern Data+AI Security Fabric

“Securiti was founded on the belief that modern enterprises need a unified platform to secure and govern data across hybrid multicloud environments and enable safe AI adoption,” said Rehan Jalil, CEO of Securiti. “This recognition in Data Access Governance by GigaOm, following our DSPM leadership, further validates our mission to deliver a scalable, intelligent, and integrated platform for data+AI security, privacy, governance, and compliance.”

The 2025 GigaOm Radar for Data Access Governance provides an independent assessment of leading vendors across technical and business criteria. Securiti’s leadership position in both DAG and DSPM categories reflects its ability to deliver comprehensive data security and governance outcomes at enterprise scale.

To learn more, explore a range of resources below:

 

About Securiti 

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data+AI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including “Highest Rated DSPM Leader” by GigaOm, “Customers’ Choice for DSPM” by Gartner Peer Insights, "Cool Vendor in Data Security" by Gartner, “AI Governance Leader” by GigaOm, "Privacy Management Wave Leader" by Forrester, “Worldwide Leader in Data Privacy Compliance” by IDC, "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, and "Most Innovative AI Companies" by CB Insights. For more information, please visit securiti.ai or follow us on LinkedIn or X.

Media Contact

Alex Daigle
Securiti@OffleashPR.com

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View

Latest

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

View More

Accelerating Safe Enterprise AI: Securiti’s Gencore AI with Databricks and Anthropic Claude

Securiti AI collaborates with the largest firms in the world who are racing to adopt and deploy safe generative AI systems, leveraging their own...

New Draft Amendments to China Cybersecurity Law View More

New Draft Amendments to China Cybersecurity Law

Gain insights into the new draft amendments to the China Cybersecurity Law (CSL). Learn more about legal responsibilities, noncompliance penalties, the significance of the...

View More

What are Data Security Controls & Its Types

Learn what are data security controls, the types of data security controls, best practices for implementing them, and how Securiti can help.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

View More

2025 Privacy Law Updates: Key Developments You Need to Know

Download the whitepaper to discover privacy law updates in 2025 and the key developments you need to know. Learn how Securiti helps ensure swift...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New