{"_id":"GRg59YkRTqLst3CqKBi0k4eTZWsKyFF6shTPHCKuDAQ5hRAqXkK91u","lastupdate":"2025-09-15T00:00:00.000Z","lastModified":"Sep 15, 2025","active":1,"confidence_score":8,"confidence_score_reason":"funding stage, product stage, sector, founding year, founding month, number of employees, tags, invite member, business model, address, logo, description, video or image, funding rounds, news, markets, external profiles, not claimed","urlname":"concentric-ai","minimal_profile":1,"status":"","fullstatus":null,"acquired":null,"country":"United States","hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"blL0zOmZrgcuMkagFE9ptopVpNcoKl6h3lyiBDdpKHEf0of7jOejch","reason":"Pending approval"},{"id":"eMNeQjU8vbqmA9Ww6YYpUsiVWY10LQivRDDbyW11hxq2xcjGGkWy9L","reason":"Foreign Startup"}],"type":"Foreign Startup","logokey":null,"name":"concentric AI","about":"","oneliner":"Data sensitivity and risk discovery platform.","website":"https://concentric.ai/","founded_month":1,"founded_year":null,"primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"","instagram":""},"social":[],"flattenedsociallinks":null,"is_claimed_by_owner":null,"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA"],"businessmodels":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"apps":{},"founded":"","mediagallery":[],"address":[],"timeline":[],"tags":[],"databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Foreign Startup","parsedName":"concentric AI","logourl":"/assets/startups-icon.svg","oglogourl":"http://localhost/assets/snc_logo.svg","team":[],"careerspage":"","employees":"","productstage":"","products":[],"geomarkets":[],"usecases":[],"funding":{"fundingstage":"","totalfunding":"Undisclosed","lastfunding":"Undisclosed"},"seoabout":"concentric AI profile","seoTitle":"Foreign Startup","solutions":[],"teamMembersNumber":0,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security"}],"targetCustomer":[],"coreTechnology":[]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[],"targetCustomerClassifications":[],"classificationNames":{"sector":["Cyber Security"],"coreTechnology":[],"targetCustomer":[]},"section":null,"sectionParams":"","queryParams":"","news":[],"popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{}}