CONCENTRIC CONCENTRIC CONCENTRIC
  • Home
  • Product
    • Overview
    • Integrations
    • Data Risk Survey
  • Use Cases
    • Data Discovery & Exposure Monitoring
    • Data Access Governance
    • Data Loss Prevention
    • Cloud Migration
    • Privacy Data Protection
  • Resources
    • Blog
    • Videos
    • Case studies
    • Webinars
  • We're Hiring
  • About
    • Who We Are
    • Events
    • News
    • Contact Us
Data Risk Report
  • Home
  • Product
    • Overview
    • Data Risk Survey
  • Use Cases
    • Data Categorization & Risk Remediation
    • Data Governance
    • Cloud Migration
    • GDPR & CCPA
  • Blog
  • We're Hiring
  • About
    • Who We Are
    • Events
    • News
    • Contact Us
  • All Posts
  • Data Security
  • Data Classification
  • Risk Management
  • AI/Deep Learning
  • Data Discovery
  • GDPR & CCPA
  • Insider
    Securing Structured vs. Unstructured Data: What's the Difference?
    Scott Lucas
    • Dec 03
    • 5 min
    Share Post
    Share Post
    Share Link

    Securing Structured vs. Unstructured Data: What's the Difference?

    I recently sat down with tdwi's James E. Powell to talk data security. Great chance to talk some inside baseball with a pro in the field.

    Write a comment
    Data Security: The Urgent and the Important
    Karthik Krishnan
    • Nov 12
    • 2 min
    Share Post
    Share Post
    Share Link

    Data Security: The Urgent and the Important

    Dwight Eisenhower’s decision framework famously categorizes tasks based on the distinction between importance and urgency. Tasks, you see, are not created equally. Some, like exercise,[...]

    Write a comment
    Avoid the Red Queen Effect in Data Access Governance
    Karthik Krishnan
    • Sep 22
    • 4 min
    Share Post
    Share Post
    Share Link

    Avoid the Red Queen Effect in Data Access Governance

    In Lewis Carroll’s Alice in Wonderland, Alice and the Red Queen find themselves running in a landscape that’s running with them. A surprised Alice says that, in her country, running gets you[...]

    Write a comment
    All posts Next

    Get the latest from Concentric!

    Concentric

    contact_us@concentric.ai

    Tel: +1 (408) 816 7068

    4340 Stevens Creek Blvd, Suite 112

    San Jose

    California 95129​ 

    FROM OUR BLOG
    Karthik

    Introducing Risk Distance™, new access and activity-based analysis now part of Semantic Intelligence data access governance solution

    QUICK LINKS
    • Home
    • Product
      • Overview
      • Integrations
      • Data Risk Survey
    • Use Cases
      • Data Discovery & Exposure Monitoring
      • Data Access Governance
      • Data Loss Prevention
      • Cloud Migration
      • Privacy Data Protection
    • Resources
      • Blog
      • Videos
      • Case studies
      • Webinars
    • We're Hiring
    • About
      • Who We Are
      • Events
      • News
      • Contact Us
    Concentric
    FROM OUR BLOG
    Karthik

    We are proud to announce Concentric MIND, our new deep learning as-a-service solution!

    QUICK LINKS

    contact_us@concentric.ai

    Tel: +1 (408) 816 7068

    4340 Stevens Creek Blvd, Suite 112

    San Jose

    California 95129​ 

    • Linkedin
    • Twitter

    ©2021 Concentric. All Rights Reserved.