Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Securiti Recognized as a Leader
in the 2025 GigaOm Radar for Data Access Governance

Securiti extends DSPM leadership with top recognition for delivering intelligent Data+AI Access Governance across hybrid multiclouds and SaaS

SAN JOSE, Calif., April 29, 2025Securiti, the pioneer of the Data+AI Command Center, today announced that it has been recognized as a Leader in the 2025 GigaOm Radar for Data Access Governance (DAG). The latest report evaluates 15 vendors and positions the Securiti Data Command Center as one of the highest-rated solutions for its strong alignment with customer requirements across both technical capabilities and business value.

“Securiti’s solution is primed for several use cases, including protected data sharing and access among data teams, fortifying applications of AI and LLM-powered copilots, gleaning intelligence about data access, regulatory compliance, and real-time data access monitoring,” said Andrew Brust, GigaOm Analyst.

Securiti Recognized as a Leader in the 2025 GigaOm Radar for Data Access Governance

This recognition builds on Securiti’s recent top ranking in the GigaOm Radar for DSPM, further underscoring its continued innovation and leadership across critical areas of data security and governance.

Unified Data Access Governance Built for the AI Era

Securiti Data Command Center delivers a unified approach to data access governance, purpose-built for modern enterprises navigating the complexities of AI, data security, privacy, governance and compliance. The platform supports structured, unstructured, and streaming data across hybrid multicloud and SaaS environments, allowing organizations to consistently enforce access control policies across diverse data types and AI systems.

At the core of Securiti’s Data Access Governance solution, the Data Command Graph serves as a dynamic knowledge graph. Securiti uses native connectors to integrate with popular structured and unstructured data systems, automatically harvesting metadata and inferring contextual insights—such as data sensitivity, access entitlements, file attributes, AI model and agent usage, user access activity, and regulatory requirements. Built-in machine learning techniques and over 400 out-of-the-box classifiers enhance discovery, which organizations can extend and customize to meet their specific business needs.

The platform surfaces Data and AI Access Intelligence from the Data Command Graph via configurable dashboards. Securiti also provides integrated data lineage and lifecycle tracing, giving teams fine-grained visibility into how data is accessed, transformed, and shared. A built-in data catalog further enhances operational efficiency.

Securiti enforces access governance natively within key data systems using an attribute-based access control model. Security and governance teams can create and automate role-based policies using a no-code policy builder with dropdown-driven configurations. With support for dynamic data masking and context-aware row filtering, the platform enables organizations to apply least-privilege access at scale.

For AI systems, Securiti extends access governance to prompts and responses in GenAI pipelines. Securiti preserves access entitlement context from source data systems as they are used to build AI pipelines, and ensures responses delivered by the AI system are based solely on data to which the user has entitlement. The platform uses patent-pending LLM Firewalls to apply layered inspection and enforcement across the prompt, retrieval, and response stages of generative AI usage. Security teams can define policies that prevent unauthorized access or exfiltration of sensitive data by redacting outputs or restricting access..

By combining these capabilities, Securiti enables organizations to secure access not only to data itself, but also to the indirect ways data is used in AI applications, ensuring that sensitive enterprise information remains protected across today’s dynamic, distributed environments.

Securiti Earns Top Ratings In Key Technical Features and Business Criteria

Thanks to its unified platform-based approach to data and AI access governance, the GigaOm report recognizes Securiti for excellence across several technical and business dimensions:

Key & Emerging Features

  • Unified View: Insights into where data resides, who is requesting access, whether access has been granted, and how the data is being used.
  • Generative AI Governance: Ability to secure data access, privacy, and regulatory compliance for GenAI use cases.
  • Real-Time Risk & Vulnerability Assessment: Continuous assessment of data security and risk posture across hybrid multiclouds.

Business Criteria

  • Ecosystem Integration: Integration with a wide variety of structured and unstructured data systems.
  • Speed of Data Access: Ability to accelerate governed, secure access to enterprise data assets.
  • Intelligent Customization: Understand user preferences, behavior patterns, and improve efficiency through automation.
  • Change Resiliency: Sustain governance as unstructured data, GenAI models, and data protection risks proliferate.

Enabling a Modern Data+AI Security Fabric

“Securiti was founded on the belief that modern enterprises need a unified platform to secure and govern data across hybrid multicloud environments and enable safe AI adoption,” said Rehan Jalil, CEO of Securiti. “This recognition in Data Access Governance by GigaOm, following our DSPM leadership, further validates our mission to deliver a scalable, intelligent, and integrated platform for data+AI security, privacy, governance, and compliance.”

The 2025 GigaOm Radar for Data Access Governance provides an independent assessment of leading vendors across technical and business criteria. Securiti’s leadership position in both DAG and DSPM categories reflects its ability to deliver comprehensive data security and governance outcomes at enterprise scale.

To learn more, explore a range of resources below:

 

About Securiti 

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data+AI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including “Highest Rated DSPM Leader” by GigaOm, “Customers’ Choice for DSPM” by Gartner Peer Insights, "Cool Vendor in Data Security" by Gartner, “AI Governance Leader” by GigaOm, "Privacy Management Wave Leader" by Forrester, “Worldwide Leader in Data Privacy Compliance” by IDC, "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, and "Most Innovative AI Companies" by CB Insights. For more information, please visit securiti.ai or follow us on LinkedIn or X.

Media Contact

Alex Daigle
Securiti@OffleashPR.com

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

View More

Securiti Accelerates Secure Agentic AI Deployments with NVIDIA Enterprise AI Factory

Still adapting to  the initial Gen AI boom, the IT industry is now undergoing another profound evolution- the rise of Agentic AI. AI has...

Identify Toxic Combinations of Risks View More

Identify Toxic Combinations of Risks: Detect & Prioritize Alerts Intelligently

Enterprise security teams navigate a complex security stack, relying on a diverse suite of specialized yet siloed security tools. Picture a typical enterprise SOC...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New