First Generative AI Powered Conversational Search Assistant

A leading AI-powered data security firm, Cohesity, has introduced Cohesity Gaia, a first-to-market AI-powered enterprise search assistant that brings retrieval augmented generation (RAG) AI and large language models (LLMs) to high-quality backup data within Cohesity environments.

Cohesity Gaia is now generally available to demonstrate the conversational AI assistant enabling users to ask questions and receive answers by accessing and analysing vast pools of enterprise data.

When coupled with the Cohesity Data Cloud, these AI advances transform data into knowledge and can help accelerate the goals of an organisation while keeping data secure and compliant. Cohesity has announced plans with the three largest public cloud providers to bring their LLM services to Cohesity Gaia.

The underlying architecture of Cohesity Data Cloud manages and secures data with a unique blend of performance, extensibility, and scale. 

Gaia enables companies to quickly leverage their existing stored data with the power of generative AI, while preserving data security and compliance. With Cohesity Gaia, customers can quickly turn data into insights, without the complexity of creating an AI application themself, or worrying about their data privacy and security.

Cohesity Gaia Extends The Value Proposition of Cohesity Data Cloud

  • By building a RAG AI solution on Cohesity's multicloud platform, Cohesity will be able to seamlessly provide RAG AI conversational search experiences across cloud and hybrid environments that will allow enterprises to gain deeper insights into their data and make informed decisions in the future, no matter where their stored data resides.
  • Cohesity will maintain a fully indexed database of all files, across all workloads, and at all points in time. This robust capability supports the creation of AI-ready indexes for rapid conversational search and responses, providing enterprises with quick and accurate results. Initially, Cohesity will support Microsoft 365 and OneDrive data and will expand to more workloads over time.
  • The unique architecture of Cohesity Gaia ensures that all indexed data is immediately available for reading without the need for backups to be reconstructed. This allows the Cohesity Data Cloud to function like a data lake, providing businesses with real-time access to their data for analysis and decision-making.
  • The Cohesity Data Cloud employs granular role-based access controls and zero-trust security principles, ensuring that only authorised users and models have access to the necessary data. This not only protects sensitive information but also helps enterprises maintain compliance with various regulatory requirements.

Enterprises looking to utilise LLMs often face several challenges. Developers must first create more copies of data, thereby increasing the threat footprint for an attack. What's more, the data may be incomplete or dated.

This approach requires additional time and resources, and puts an added burden on the system's performance. Cohesity Gaia overcomes these challenges by integrating AI capabilities within a customer’s backup environment.

Cohesity Gaia Helps Organisations Make Better Decisions Across Numerous Use Cases:

  • To assess an organisation’s level of cyber resilience.
  • To quickly perform financial and compliance audit checks.
  • To answer complex legal questions.
  • To serve as a knowledge base to train new employees.

Enterprises have faced several challenges gaining insights into secondary data, including backup, archived and vaulted data, because every approach requires 're-hydrating' the data, with the effect of delaying availabilty of the data for analysis. Cohesity Gaia can dramatically simplifies this process  "Our approach delivers rapid, insightful results without the drawbacks of more manual and risky approaches. In short, it turns data into knowledge within seconds and minutes.” according to the CEO of Cohesity, Sanjay Poonen

At the core of Cohesity AI technologies is Cohesity Turing, a patent-pending collection of AI capabilities and technologies integrated into Cohesity’s multicloud data management and security platform, providing operational and data insights. The foundation of these AI innovations is the concept of “responsible AI,” with capabilities and frameworks that enable customers to introduce AI to backup data securely and safely at scale.

All Cohesity Turing solutions adhere to these responsible AI principles:

  • Transparency: Protect access to the data with role-based access controls. Promote transparency and accountability around access and policies.
  • Governance: Ensure the security and privacy of data used by AI models and the workforce—so the right data is exposed only to the right people (and models) with the right privileges.
  • Access: Integrate indexed and searchable data securely and easily while ensuring data is immutable and resilient.

“It is important to understand that Cohesity Gaia does not retrieve data like a search engine; it answers questions,” said Greg Statton, office of the CTO – Data & AI at Cohesity. “With Cohesity Gaia, you simply ask, ‘Why have costs increased in the region?’, and Cohesity Gaia will pull the relevant data from your stored data, analyse it, and return an answer to your question. It’s that simple.”

You Might Also Read: 

Understanding The Threats & Opportunities Posed By AI:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Canada’s New Online Safety Law
$15m Bounty To Identify LockBit Bosses »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

National Cybersecurity Student Association (NCSA) - USA

National Cybersecurity Student Association (NCSA) - USA

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.

Securitum

Securitum

Securitum is a leading penetration testing company in central and eastern Europe.