First Generative AI Powered Conversational Search Assistant

A leading AI-powered data security firm, Cohesity, has introduced Cohesity Gaia, a first-to-market AI-powered enterprise search assistant that brings retrieval augmented generation (RAG) AI and large language models (LLMs) to high-quality backup data within Cohesity environments.

Cohesity Gaia is now generally available to demonstrate the conversational AI assistant enabling users to ask questions and receive answers by accessing and analysing vast pools of enterprise data.

When coupled with the Cohesity Data Cloud, these AI advances transform data into knowledge and can help accelerate the goals of an organisation while keeping data secure and compliant. Cohesity has announced plans with the three largest public cloud providers to bring their LLM services to Cohesity Gaia.

The underlying architecture of Cohesity Data Cloud manages and secures data with a unique blend of performance, extensibility, and scale. 

Gaia enables companies to quickly leverage their existing stored data with the power of generative AI, while preserving data security and compliance. With Cohesity Gaia, customers can quickly turn data into insights, without the complexity of creating an AI application themself, or worrying about their data privacy and security.

Cohesity Gaia Extends The Value Proposition of Cohesity Data Cloud

  • By building a RAG AI solution on Cohesity's multicloud platform, Cohesity will be able to seamlessly provide RAG AI conversational search experiences across cloud and hybrid environments that will allow enterprises to gain deeper insights into their data and make informed decisions in the future, no matter where their stored data resides.
  • Cohesity will maintain a fully indexed database of all files, across all workloads, and at all points in time. This robust capability supports the creation of AI-ready indexes for rapid conversational search and responses, providing enterprises with quick and accurate results. Initially, Cohesity will support Microsoft 365 and OneDrive data and will expand to more workloads over time.
  • The unique architecture of Cohesity Gaia ensures that all indexed data is immediately available for reading without the need for backups to be reconstructed. This allows the Cohesity Data Cloud to function like a data lake, providing businesses with real-time access to their data for analysis and decision-making.
  • The Cohesity Data Cloud employs granular role-based access controls and zero-trust security principles, ensuring that only authorised users and models have access to the necessary data. This not only protects sensitive information but also helps enterprises maintain compliance with various regulatory requirements.

Enterprises looking to utilise LLMs often face several challenges. Developers must first create more copies of data, thereby increasing the threat footprint for an attack. What's more, the data may be incomplete or dated.

This approach requires additional time and resources, and puts an added burden on the system's performance. Cohesity Gaia overcomes these challenges by integrating AI capabilities within a customer’s backup environment.

Cohesity Gaia Helps Organisations Make Better Decisions Across Numerous Use Cases:

  • To assess an organisation’s level of cyber resilience.
  • To quickly perform financial and compliance audit checks.
  • To answer complex legal questions.
  • To serve as a knowledge base to train new employees.

Enterprises have faced several challenges gaining insights into secondary data, including backup, archived and vaulted data, because every approach requires 're-hydrating' the data, with the effect of delaying availabilty of the data for analysis. Cohesity Gaia can dramatically simplifies this process  "Our approach delivers rapid, insightful results without the drawbacks of more manual and risky approaches. In short, it turns data into knowledge within seconds and minutes.” according to the CEO of Cohesity, Sanjay Poonen

At the core of Cohesity AI technologies is Cohesity Turing, a patent-pending collection of AI capabilities and technologies integrated into Cohesity’s multicloud data management and security platform, providing operational and data insights. The foundation of these AI innovations is the concept of “responsible AI,” with capabilities and frameworks that enable customers to introduce AI to backup data securely and safely at scale.

All Cohesity Turing solutions adhere to these responsible AI principles:

  • Transparency: Protect access to the data with role-based access controls. Promote transparency and accountability around access and policies.
  • Governance: Ensure the security and privacy of data used by AI models and the workforce—so the right data is exposed only to the right people (and models) with the right privileges.
  • Access: Integrate indexed and searchable data securely and easily while ensuring data is immutable and resilient.

“It is important to understand that Cohesity Gaia does not retrieve data like a search engine; it answers questions,” said Greg Statton, office of the CTO – Data & AI at Cohesity. “With Cohesity Gaia, you simply ask, ‘Why have costs increased in the region?’, and Cohesity Gaia will pull the relevant data from your stored data, analyse it, and return an answer to your question. It’s that simple.”

You Might Also Read: 

Understanding The Threats & Opportunities Posed By AI:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Canada’s New Online Safety Law
$15m Bounty To Identify LockBit Bosses »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.