Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Sensitive Data Intelligence Driven Privacy and Protection

Published October 28, 2020
Author

Omer Imran Malik

Senior Data Privacy Consultant at Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

At Securiti we are excited to announce the availability of our newest offering Sensitive Data Intelligence that expands our product portfolio of privacy management software to address the challenges of data governance, risk and security teams, in a single comprehensive platform.

Data has become the driving force behind the new economy, with enterprises focused on leveraging data to find new ways to deliver value to their customers and generate new revenue streams. At the same time, the amount of data is increasing at a staggering rate. An average enterprise has over 400+ different data systems, that are spread across on-premises file shares, databases, enterprise data warehouses, cloud storage solutions, SaaS applications, cloud data warehouses, cloud data lakes for machine learning based analytics, and more. This data sprawl creates multiple challenges for large organizations.

Major business initiatives and projects undertaken by organizations, while deriving significant value from the underlying data, need to consider the privacy, risk, and security implications of the huge volumes of data they collect and process. Through conversations with our partners and customers, we found some typical scenarios where they were struggling with these issues.

  • Data lake projects: Companies are increasingly leveraging data science to run new types of machine-learning-based analytics on raw data combined from a variety of sources into data lakes. But visibility into the types of data present in the lake is very limited. This is significant when building self-serve models for data consumption with strong data governance and access policies.
  • Cloud Data migration projects: Digital transformation initiatives by CIOs are typically cloud-driven and involve either migrating data from their on-premises to the cloud or standing up new apps and workloads in multi-cloud environments. They need to understand what personal or sensitive information is in their environment to enable go/no-go migration decisions. The flexible consumption model of the cloud makes it challenging to maintain an up-to-date inventory of the data assets, the data within the assets, and the controls on the assets.. Post-migration, organizations will need to rely on automated mechanisms to monitor and manage this data..
  • Secure and Privacy-aware SDLC initiatives: In the new economy, every company, regardless of its industry vertical, is also a software company, as they build and deliver solutions and services to their customers digitally. Privacy by Design and Secure SDLC initiatives have helped raise developer awareness for privacy and security requirements early in the development process. But agile development methodologies present challenges as new data collection/storage or data leaks to application logs get introduced periodically, requiring continuous monitoring of devtest, staging, and production environments.
  • Data mapping initiatives: Privacy compliance programs require businesses to maintain a record of their data processing activities. Privacy teams that have historically relied on manual questionnaires completed by data owners, are looking to evolve their processes with automated data discovery and controls given the dynamic nature of the data. This keeps their records more accurate and up-to-date.
  • Data subject request fulfillment projects: B2C companies in verticals such as retail, travel, health, and financial services that serve 10’s of millions of customers are now burdened with requirements from privacy laws that grant users access rights to their requests. With the increasing number of data breaches, the volume of such access requests from users is trending up. And privacy teams, along with their IT colleagues, need to invest in automated tools that can detect and link personal data to specific identities.

Sensitive Data Intelligence

Organizations today rely on a combination of manual methods, repurposed legacy data discovery tools, and point products to address the above challenges. These have proven to be inadequate or ineffective. With Sensitive Data Intelligence, we provide our customers a single platform with the following comprehensive capabilities:

sensitive data intelligence post
  • Automated discovery of data assets across the enterprise, including on-premises, hybrid and multi-cloud environments.
  • Out of the box detection of 100+ personal data attributes across over a dozen categories, including Government IDs, Device IDs, Online IDs, Finance, Legal, Medical, etc. This includes special categories of data defined by GDPR and other privacy laws.
data discovery
  • Data risk scoring to provide a risk-centric approach to manage the data being collected and processed. The proprietary model leverages risk factors such as data type, data location, data subject’s residency, and volume of data and can readily be extended. The solution allows customers to easily find hotspots and direct remediation efforts appropriately. Risk score trends also surface indicators of risk, such as copies of data, and cross-border transfers of data.
data risk
  • Structured data analysis with insights on data types and volumes across databases, schemas, and tables.
  • Unstructured data classification using machine learning based techniques into easily recognizable categories (Sales, Medical, HR, etc), types (Medical consent form, IRS tax form, etc), and formats. Additionally, organizations can define their own schemes using rules-based Content Profiles. A library of built-in profiles such as PCI, PII, PHI, GLBA, and FERPA help customers get out of the gate running.
unstructured data
  • Labeling of files using sensitivity labels from your Microsoft Information Protection subscription. Additionally tagging with privacy related metadata such as categories of personal data, categories of subjects, and purpose.
  • A policy engine to automate and orchestrate controls on the various data stores using a built-in library of policy templates mapped to regulatory citations and standard controls.

This is the beginning of our journey and we will soon be expanding the solution with additional automation that brings increased levels of efficiency to privacy, data governance, risk and security teams. Check out our brochure for more details.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

Key Differences from DLP & CNAPP View More

Why DSPM is Critical: Key Differences from DLP & CNAPP

Learn about the critical differences between DSPM vs DLP vs CNAPP and why a unified, data-centric approach is an optimal solution for robust data...

DSPM Trends View More

DSPM in 2025: Key Trends Transforming Data Security

DSPM trends in 2025 provides a quick glance at the challenges, risks, and best practices that can help security leaders evolve their data security...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New