Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

Ghangor Cloud: Classify Everything, Miss Nothing

Truth in IT
05/09/2025
33
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We're here at RSAC 2025. Lots of people, lots of energy, lots of things going on in the cybersecurity space. We're here at, uh. Well, you guys are now calling yourselves GC security. Yes, it's still the actual name is Ghangor Cloud .com Ghangor Cloud. You know, the company, but we you know, nobody says General Electric or General Dynamics anymore or International Business machine, right? It's either IBM, GC or GE, right? So we picked GC Ghangor Cloud. Gc rolls rolls off pretty nicely. So, uh, we've talked with Tariq before about what they do at Ghangor Cloud. And let's just for the rest of us, can you just give us a high level sort of pitch as to what you guys do and do really well? Okay, sure. So Ghangor Cloud, our product is called ISIS is an acronym, uh, Information Security Enforcer. It is a platform, as you can see here behind it's a very, very big, large platform which does pretty much everything pertaining to fourth generation cyber attacks and cyber warfare, including data leak exfiltration prevention. Casb, which is about web based data security, exfiltration prevention, auto policy synthesis, which is a major issue in cyber security products. Access control, completely automated access control with very fine granularity. Completely automated data classification and identification, which is a very tough problem. We are the only one in the industry right now which has the company which has this kind of technology already patented, and many of them are already recognized in the industry as very unique technologies. Yeah, I was particularly impressed with data classification when I saw it for the first time, you know, because it is something that's difficult to do and get right everywhere. Absolutely, absolutely it is. So our auto classification engine, this is based upon deep AI based technology called ontological reasoning for classification. And like I said, we are the only company right now who is doing this? And it eliminates the need, as for example, in machine learning and those where you need unlimited number of, um, size of data, basically to train your neural network, there is no that kind of data requirement at all. So that cuts down the time to go to market to deploy. And um, the accuracy is almost near 100%. All right. So someone's not going to miss too much of their real estate by using this petabytes of data, you're going to nail what it is exactly. Exactly. And ontological approach is a very important subfield of artificial intelligence. And it's also a very tough field. So we have some very important patents in that area uh, itself for auto data classification and identification. Ontology folks, look it up. It's probably in Wikipedia as your best bet to get started on understanding what that is, but glad you guys are doing it. Uh, on there, looking at the show, I just want to ask you some questions. Ai is obviously a big topic here. How have How then sort of people walking by with that you using I so much they view it as a benefit, something they can use positively or as a threat. Sure. So so far since this morning, a lot of visitors who came to our booth, they saw the demo of our product. In the beginning it was a no. That cannot be done. Then we showed them the product demo and they are absolutely surprised and awe stricken. Many of them want OEM partnerships now and to license our technology integrated with their offerings. These are bigger companies. And then, you know, other areas of our technology and all those things. So I right now there's a lot of hype going on as well. We know that. But in our case, we don't believe in hype. We believe in real, real solution. Because end of the day, if the product does not work, it does not benefit anyone and you lose credibility. So our technology, our platform, everything is based upon deep AI based algorithms, which is both ontological and epistemological. These are two parallel paradigms of AI. We cover them both, and the beauty of this approach is that in addition to the accuracy that you can achieve, there is no training required, pre-training required. So the cost and time and frustration and lack of accuracy, all of that is eliminated automatically. Now, I could ask you the leading question that says, do you think not understanding what data you have is a big problem, but you obviously, since that's what you addressed the problem. So instead I'll ask a question like if people come up to the booth and say, where should I start? What? What would be your best practice recommendation? I need to get control of my data to understand what it is, right? What would they do first? Sure. So the very first thing is to know where your data is. So our, um, in our product there is we have a very powerful data discovery engine and which you can basically point and click in your, in our user interface. And you can point and click on prem repositories of data or in the cloud doesn't matter or hybrid thereof. And the engine starts. Basically, it's a data identification and classification process simultaneously. In one pass, you don't have to do multiple cycles one for identification, another for classification. It does in one pass the entire thing, and it identifies and classifies the kind of data that you will find by running the our discovery engine. You cannot find using any of the technology because this is based upon another set of AI deep AI based paradigms like knowledge representation and reasoning and basically planning. Planning. Not like project planning. Planning is a very complex field of artificial intelligence. All of these we have very important patterns, automated, very first place to start to answer the question again is know where your data is and try to understand if it is violating any compliance mandates or not. How can you take remedial steps and then basically identification automation, like I said, comes out as a byproduct of that process. And then basically you can, um, set policies for access control depending upon the location and variations of data in different repositories. Very high granular approach for access control. So this is what the platform does. Great great great. If someone wants to learn more about this should they go to Ghangor Cloud. Com what's the what's the web app? Yes. Ghangor Cloud. Com decide what it will take you to our new brand which is GCP security AI. So you type in cybersecurity AI or Ghangor Cloud. Com it will take you to our website. All right. So they can learn lots more if you're here at Rsac. Come check it out. Otherwise look at security. I got it. Thank you. Cyber security. Cyber security. Take care guys. Bye.

Mike Matchett catches up with Tarique Mustafa of Ghangor Cloud (now GC Security) to explore their patented AI-driven data protection platform, ISIS. With ontological and epistemological AI models, Ghangor offers automated data discovery, classification, policy enforcement, and DLP—without pre-training. From access control to CASB, their all-in-one platform tackles fourth-gen cyber threats head-on. No hype—just tech that impresses Fortune 500 OEMs and skeptical booth visitors alike.

Categories:
  • » Technology Communities
  • » Technology Communities » Data Storage
  • » Technology Communities » Data Storage » Object Storage
  • » Technology Communities » Data Storage » Physical Storage
  • » Technology Communities » Data Storage » Software Defined Storage
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
  • » Technology Communities » Cloud
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • ghangor
  • cloud
  • cybersecurity
  • data
  • protection
  • ai
  • security
  • data
  • classification
  • dlp
  • casb
  • policy
  • enforcement
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Ghangor Cloud: Classify Everything, Miss Nothing

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202513:00:00 ET
              More events

              Upcoming 360 View Events

              • Jun
                18

                360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                06/18/202512:00:00 ET
                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00:00 ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00:00 ET
                    More events

                    Upcoming Industry Events

                    • Jun
                      04

                      Rubrik FORW>>RD

                      06/04/202510:00:00 ET
                      • Jun
                        04

                        Securing the Surge: AppSec in the Age of AI-Generated Code

                        06/04/202513:00:00 ET
                        • Jun
                          26

                          Mastering Modern Security with Wallarm's Advanced API Solutions

                          06/26/202513:00:00 ET
                          • Jul
                            15

                            Recognizing Identity Threats: Effective Detection and Response Strategies with Netwrix

                            07/15/202502:00:00 ET
                            More events
                            Truth in IT
                            • Advertise
                            • About Us
                            • Terms of Service
                            • Privacy Policy
                            • Contact Us
                            • Be Our Guest
                            • Preference Management
                            Desktop version
                            Standard version