The addition of LLM to Sentra’s classification engine allows scanning and classifying sensitive enterprise data like source codes, and employee details. Credit: Galeanu Mihai Classifying sensitive unstructured data like source codes or employee contracts will now be possible with the help of Sentra's classification engine, which will now utilize large language models (LLM). Cloud data security provider, Sentra, has announced that LLMs are now built directly into its data security platform and classification engine to help enterprise customers reduce the data attack surface. "When properly leveraged, LLM has great potential to better classify unstructured data (such as paragraphs of text, and someday even images) than traditional pattern-matching techniques," said Ken Buckler, research analyst at Enterprise Management Associates Inc. Sentra's data classification engine has traditionally used regular expressions, list classifiers, and validation functions, according to Ron Reiter, co-founder, and chief technology officer of Sentra. LLM adds context The use of LLMs has added additional contexts to the process of classification, effecting an efficient tool for the classification of unstructured enterprise data, Sentra said. "There are two additional contexts which the product now supports while classifying customer data -- full (document level) classification and better entity recognition," Reiter said. "Document-level classification enables Sentra to decide on the high-level type of document. For example, whether the document is a legal contract, a payslip, or a technical documentation." Adding LLMs has allowed entity recognition on unstructured text, such as identifying a person's name by understanding the surrounding text, Reiter added. Understanding the business context of unstructured customer data, the company said, will also enable enterprises to better align with compliance benchmarks, including GDPR, CCPA, and HIPPA. Using LLMs still in gray Despite the jump in enterprise adoption, LLMs continue to suffer from criticism. Sentra's new LLM-powered scanning of data assets and analysis of metadata, like file names, schemas, and tags leave much open for discussion. "When properly leveraged, LLM has great potential to better classify unstructured data [such as paragraphs of text, and someday even images] than traditional pattern-matching techniques," Buckler said. However, "as with any technology, we must ensure that the solutions implemented to secure data do not in turn result in additional attack vectors to access that data," he said. Sensitive internal assets should never leave the enterprise boundaries during classification as this would expose the data to unnecessary risk of disclosure to third parties, he added. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe