At the same time, another may require complete recovery of the business applications at a new location. One scenario may be a data recovery event to revert to the prior instances before the corruption. To combat internal threats, Commvault has implemented a control mechanism to ensure administrative tasks that could threaten data are approved by two or more administrators from a selected privilege group, applying the four-eyes principle to data security.Ī recovery solution is only viable if it is resilient across various failure modes. Threats are not always externally sourced, the result of compromised credentials or deliberate acts of rogue actors. These controls work via all access types, UI, Command-Line, or API. Adhering to the zero trust principles as outlined in NIST SP 800-207, Commvault provides customers the range of services required to segment/isolate data, establish the user identity, provide access with the least required privilege, be safe from user error, and have a full granular logging and auditing capability. Commvault uses it to assess, improve, and showcase its capabilities and adherence to industry regulations and best practices. The AAA Security Framework for Authentication, Authorization, and Accounting is a valuable way to assess any software solution and is well known within the security community. Commvault leads the way, securing data and providing protection for concerns such as privacy, theft, corruption, and deletion, whether by internal, external threats, either malicious or misguided. Providing data security while allowing for software to be administered effectively can be a challenge for many. Commvault agrees with this approach and has a proven history of providing immutable protection, geographic segregation, and air gap capabilities for the on-premises and cloud storage targets we write to, with the choice of using our appliances or your storage. When thinking about threats to the backup data itself, a common approach is to create data copies with a level of isolation, such as an air gap and immutable copies. Organizations require tools to constantly measure their recovery readiness state to expose and remediate problems, validate the recoverability of their data and business applications through automated testing, and continually harden their environment to improve their security and reduce their risk profile. Commvault has earned a strong reputation as a dedicated and trusted partner and has many customers who will testify to our responsiveness, innovation, and rapid execution in the high-pressure, high-impact world of a ransomware attack.ĭata security is a strategic goal for Commvault and is addressed through our multi-layered protection, advanced detection, and rapid recovery from security threats, including ransomware and data breaches. We are highly responsive to our customers with the products and services we deliver. The right solution requires the best technology, the right people, and processes.Īt Commvault, much like a CISO, we operate in a constant state of alertness. To ensure you can recover your data and not pay the ransom, you need to trust that your data protection vendor shares your level of vigilance. The cyber threat landscape, including ransomware, has transitioned to a case of when not if. Data management and protection software must share your mission with proven technology, constant vigilance, updates, and guidance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |