About Us

We're working to keep your data safe.

Our Belief

Is that safe data must be central to every organization’s operating model, and it can be done efficiently and cost-effectively.

We Deliver

A comprehensive sensitive data landscape, risk scoring, scalable cloud solution, and production data without production risk.

Our Mission

To create data privacy solutions for our clients, enabling them to drive innovation.

Data Security

Our goal is to reduce risk by proactively securing data

C² Data Technology aims to eliminate blind spots in sensitive data protection by continuously discovering and classifying data across all environments with AI.

Modern AI Technology

Our goal is to use AI to evolve with emerging threats and adapt protection strategies.

C² Data Technology leverages machine learning to go beyond rule-based detection, enabling intelligent identification of sensitive data patterns, relationships, and inference risks.

Cloud

Our goal is to make securing data in the cloud as seamless and scalable as deploying it there.

C² Data Technology develops products for today’s cloud-first reality, with support for public clouds like AWS and hybrid architectures.

Work Smarter

Our goal is to give you control of your data landscape so your teams can leverage data to train AI models securely.

C² Data Technology enables organizations to use sensitive data securely—ensuring business innovation, performance, and compliance.

CREW
CREW

Our Experts

We’ve spent 25 years in the trenches of data privacy and security, and one thing is clear: you cannot protect what you cannot see. We built the C² Data Privacy Platform to go deeper — using AI by combining real machine learning with customized detection logic from experts who’ve spent decades solving these challenges.

CREW

Our Experts

We’ve spent 25 years in the trenches of data privacy and security, and one thing is clear: you cannot protect what you cannot see. We built the C² Data Privacy Platform to go deeper — using AI by combining real machine learning with customized detection logic from experts who’ve spent decades solving these challenges.

George Barroso

Career-long systems whisperer who never met a legacy database he couldn’t tame. Spent 25+ years stitching together security, privacy, and performance in environments where downtime is not an option. Lives at the intersection of architecture diagrams and incident runbooks, making sure sensitive data stays visible to the right people and invisible to everyone else.

CIO

George Barroso

Career-long systems whisperer who never met a legacy database he couldn’t tame. Spent 25+ years stitching together security, privacy, and performance in environments where downtime is not an option. Lives at the intersection of architecture diagrams and incident runbooks, making sure sensitive data stays visible to the right people and invisible to everyone else.

CIO

George Barroso

Career-long systems whisperer who never met a legacy database he couldn’t tame. Spent 25+ years stitching together security, privacy, and performance in environments where downtime is not an option. Lives at the intersection of architecture diagrams and incident runbooks, making sure sensitive data stays visible to the right people and invisible to everyone else.

CIO

Michael Logan

Recovering operator turned data evangelist. Two decades wrangling regulated data sets, cloud migrations, and grumpy auditors. Builder of products that let enterprises move fast on AI without waking up in front-page breach headlines. Still believes the right privacy architecture can turn “no” into “now” for the business.

CEO

Michael Logan

Recovering operator turned data evangelist. Two decades wrangling regulated data sets, cloud migrations, and grumpy auditors. Builder of products that let enterprises move fast on AI without waking up in front-page breach headlines. Still believes the right privacy architecture can turn “no” into “now” for the business.

CEO

Michael Logan

Recovering operator turned data evangelist. Two decades wrangling regulated data sets, cloud migrations, and grumpy auditors. Builder of products that let enterprises move fast on AI without waking up in front-page breach headlines. Still believes the right privacy architecture can turn “no” into “now” for the business.

CEO

Kris Glover

Hands-on architect with a bias for shipping secure-by-design systems, not just slideware. Veteran of large-scale cloud deployments where sensitive data hides in all the places scanners forget to look. Part machine-learning tinkerer, part threat-modeling purist, dedicated to building an AI-driven privacy platform that actually keeps up with how fast your engineers ship code.

Principal Architect

Kris Glover

Hands-on architect with a bias for shipping secure-by-design systems, not just slideware. Veteran of large-scale cloud deployments where sensitive data hides in all the places scanners forget to look. Part machine-learning tinkerer, part threat-modeling purist, dedicated to building an AI-driven privacy platform that actually keeps up with how fast your engineers ship code.

Principal Architect

Kris Glover

Hands-on architect with a bias for shipping secure-by-design systems, not just slideware. Veteran of large-scale cloud deployments where sensitive data hides in all the places scanners forget to look. Part machine-learning tinkerer, part threat-modeling purist, dedicated to building an AI-driven privacy platform that actually keeps up with how fast your engineers ship code.

Principal Architect