First Generative AI Powered Conversational Search Assistant

A leading AI-powered data security firm, Cohesity, has introduced Cohesity Gaia, a first-to-market AI-powered enterprise search assistant that brings retrieval augmented generation (RAG) AI and large language models (LLMs) to high-quality backup data within Cohesity environments.

Cohesity Gaia is now generally available to demonstrate the conversational AI assistant enabling users to ask questions and receive answers by accessing and analysing vast pools of enterprise data.

When coupled with the Cohesity Data Cloud, these AI advances transform data into knowledge and can help accelerate the goals of an organisation while keeping data secure and compliant. Cohesity has announced plans with the three largest public cloud providers to bring their LLM services to Cohesity Gaia.

The underlying architecture of Cohesity Data Cloud manages and secures data with a unique blend of performance, extensibility, and scale. 

Gaia enables companies to quickly leverage their existing stored data with the power of generative AI, while preserving data security and compliance. With Cohesity Gaia, customers can quickly turn data into insights, without the complexity of creating an AI application themself, or worrying about their data privacy and security.

Cohesity Gaia Extends The Value Proposition of Cohesity Data Cloud

  • By building a RAG AI solution on Cohesity's multicloud platform, Cohesity will be able to seamlessly provide RAG AI conversational search experiences across cloud and hybrid environments that will allow enterprises to gain deeper insights into their data and make informed decisions in the future, no matter where their stored data resides.
  • Cohesity will maintain a fully indexed database of all files, across all workloads, and at all points in time. This robust capability supports the creation of AI-ready indexes for rapid conversational search and responses, providing enterprises with quick and accurate results. Initially, Cohesity will support Microsoft 365 and OneDrive data and will expand to more workloads over time.
  • The unique architecture of Cohesity Gaia ensures that all indexed data is immediately available for reading without the need for backups to be reconstructed. This allows the Cohesity Data Cloud to function like a data lake, providing businesses with real-time access to their data for analysis and decision-making.
  • The Cohesity Data Cloud employs granular role-based access controls and zero-trust security principles, ensuring that only authorised users and models have access to the necessary data. This not only protects sensitive information but also helps enterprises maintain compliance with various regulatory requirements.

Enterprises looking to utilise LLMs often face several challenges. Developers must first create more copies of data, thereby increasing the threat footprint for an attack. What's more, the data may be incomplete or dated.

This approach requires additional time and resources, and puts an added burden on the system's performance. Cohesity Gaia overcomes these challenges by integrating AI capabilities within a customer’s backup environment.

Cohesity Gaia Helps Organisations Make Better Decisions Across Numerous Use Cases:

  • To assess an organisation’s level of cyber resilience.
  • To quickly perform financial and compliance audit checks.
  • To answer complex legal questions.
  • To serve as a knowledge base to train new employees.

Enterprises have faced several challenges gaining insights into secondary data, including backup, archived and vaulted data, because every approach requires 're-hydrating' the data, with the effect of delaying availabilty of the data for analysis. Cohesity Gaia can dramatically simplifies this process  "Our approach delivers rapid, insightful results without the drawbacks of more manual and risky approaches. In short, it turns data into knowledge within seconds and minutes.” according to the CEO of Cohesity, Sanjay Poonen

At the core of Cohesity AI technologies is Cohesity Turing, a patent-pending collection of AI capabilities and technologies integrated into Cohesity’s multicloud data management and security platform, providing operational and data insights. The foundation of these AI innovations is the concept of “responsible AI,” with capabilities and frameworks that enable customers to introduce AI to backup data securely and safely at scale.

All Cohesity Turing solutions adhere to these responsible AI principles:

  • Transparency: Protect access to the data with role-based access controls. Promote transparency and accountability around access and policies.
  • Governance: Ensure the security and privacy of data used by AI models and the workforce—so the right data is exposed only to the right people (and models) with the right privileges.
  • Access: Integrate indexed and searchable data securely and easily while ensuring data is immutable and resilient.

“It is important to understand that Cohesity Gaia does not retrieve data like a search engine; it answers questions,” said Greg Statton, office of the CTO – Data & AI at Cohesity. “With Cohesity Gaia, you simply ask, ‘Why have costs increased in the region?’, and Cohesity Gaia will pull the relevant data from your stored data, analyse it, and return an answer to your question. It’s that simple.”

You Might Also Read: 

Understanding The Threats & Opportunities Posed By AI:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Canada’s New Online Safety Law
$15m Bounty To Identify LockBit Bosses »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.