0% found this document useful (0 votes)
68 views26 pages

Commvault Archive Solution

Commvault's Archive Solution emphasizes cyber resilience, offering a unified platform for data protection across on-premises, cloud, and hybrid environments. The solution includes advanced features like ransomware protection, compliance search, and eDiscovery capabilities, ensuring efficient data management and recovery. With over 1.4K patents and a focus on innovative data protection strategies, Commvault aims to safeguard organizations against evolving cyber threats.

Uploaded by

ovaiskazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views26 pages

Commvault Archive Solution

Commvault's Archive Solution emphasizes cyber resilience, offering a unified platform for data protection across on-premises, cloud, and hybrid environments. The solution includes advanced features like ransomware protection, compliance search, and eDiscovery capabilities, ensuring efficient data management and recovery. With over 1.4K patents and a focus on innovative data protection strategies, Commvault aims to safeguard organizations against evolving cyber threats.

Uploaded by

ovaiskazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Commvault

Archive Solution

PRESENTED BY
Etienne Niken

Copyright © 2019 Commvault | All Rights Reserved.


INTRODUCTION

Commvault’s contribution to
Cyber Resilience
#1
in cyber resilience for more
1.4K
We have over 1.4K patents for
than 25 years and counting. groundbreaking innovation:

Gartner MQ Leader The first to unify data protection for on-


12 years running prem, cloud and hybrid.

Safeguard more than The first to integrate ransomware protection


> 4 EB 4 exabytes of cloud data into our platform.

Only FedRAMP High The only to offer unique architecture with


cyber resilience platform any-to-any portability and defense in depth

The only vendor to offer


Cleanroom Recovery.
© Commvault 2024 3
© Commvault 2024 4
The world has
changed

Ransomware everywhere — Breaches are Average time to recover


including the backup becoming the norm is devastating
99% of ransomware tampers 66% of organizations surveyed 24 days is the average
with security and backup were breached in 2023 1 reported time to recover from
infrastructure a cyberattack

Sources: Microsoft. Sophos. Coveware. © Commvault 2024 5


RECOVERY READINESS: A SECURITY IMPERATIVE

CISOs are shifting right

NIST 2.0 Cyber Security Framework

Identify Protect Detect Respond Recovery

NIST 1800-25
NIST 800-53 NIST 800-207 NIST 800-53 NIST 800-61 NIST 800-184
Asset
Security Zero trust Security Incident Cyber
Identification
Controls architecture monitoring Handling Recovery
and protection

Security is blind to unknowns. Recovery readiness and testing


They must embrace the breach. enables business to be cyber resilient.

© Commvault 2024
Cyber Resilience Journey Maps
BUILDING END-TO-END CYBER RESILIENCE

RISK READINESS RECOVERY

Cyber Incident
Risk Early
Recommendations Warning
Incident
Clean Point
Response
Planning Restore &
Verification
Recovery Point
Sensitive Data Validation At Scale
Scanning Cyber Deception Recovery
Risk
Remediation Cyber Recovery

Forensic
Analysis
Sensitive Data Threat Cyber Recovery
Categorization Recommendations Testing
Zero Trust Access

MFA | Multi Person Auth | SAML | PAM | RBAC | KMIP | YubiKey | MS Auth | Google Auth

Palo Alto | MS Sentinel | Dark Trace | Netskope | CyberArk | Entrust | ServiceNow

Risk Analysis Early Warning Indicators of Compromise Immutable Storage ThreatScan AI Cleanroom Recovery

✓ Identify Data Owners ✓ Cyber deception lures ✓ Canary Files Object Appliance ✓ Quarantine suspicious ✓ On-premise IRE
| Access | Permissions files ✓ Cloud IRE
✓ Threat Sensors ✓ File hashing
✓ PII or other critical ✓ Pre-view Corrupt file ✓ Forensics
✓ Agentless VM CMDR
GDPR contents for versions SIM Hash
leakage or exposure ✓ Extension changes Cloud NAS ✓ Validate Recovery
✓ Signature Based scan Points
risks
✓ MIME Type Mismatch
✓ AI Zero Day Scan
✓ File Entropy Detection

© Commvault 2023 8
Mission over 2 decades : “No Workload Left Unprotected”
Immutable, de-duplicated, & encrypted
Single Control Plane

Native Instances

Managed VMs IaaS SQL PaaS SQL Air-Gap offsite


S3 / S3IA Google Commvault
In Cloud Cloud Metallic Cloud
Storage Storage Service
Amazon Amazon Amazon Data Vault
EC2 RDS Aurora S3 Glacier

We protect 4+ EB’s on Cloud


We report on over 100,000+ jobs weekly

+ +
On-Premises
Datacenter HyperScale X HyperScale X
Data Management. Done Differently

Primary Workloads

Endpoint Data Remote Data-bases Physical Virtual Hyper- Cloud SaaS Email Snapshots
Site Data converged

Backup & Recovery Email Archive

Virtual Data Repository

Distributed Index Artificial Intelligence Automated Policy Engine

Physical Virtual Cloud Scale-out Hybrid Tape


A single view for managing your entire environment
Main dashboard with RBAC and Reporting

Resource
monitoring

Health check
Day to day
operations

Daily
operations

Storage usage
and prediction

Copyright © 2020 Commvault | All Rights Reserved. 11


Email Archive

Copyright © 2019 Commvault | All Rights Reserved.


Complete Email Management

CommVault Archive is a smarter approach to collecting, retaining and accessing email


data across the enterprise while providing intuitive, role-based search for business
insight, lower risk and cost
Storage Optimization Productivity Compliance

Email Search LegalHold-label

Efficient long-term retention & End-user, self-service preview & Purpose-built, advanced
collection search with ContentStore Mail compliance search & legal
hold
Persona: IT Persona: IT, End-User, LOB Persona: Legal, Compliance

Benefits Benefits Benefits


• Control growth & cost • Transparent access • Reduced risk
• Eliminate PST’s • Improved productivity • Eliminate IT burden
• Improve visibility • Business value & insight • Control costs
15

Email Archive
MS Exchange Protection

• Full DAG aware support with automated


single master client
• DB, Single Mail, Attachments, Mailbox
Restore from DB backup
• Near zero impact instant backup with
granular restore
• Multiple Streaming DB backup
• Auto-Discovery of Users, AD Groups and
Mailboxes
• End-user and Journal Mailbox email archive
• Legal Compliance e-Discovery and Search

Copyright © 2019 Commvault | All Rights Reserved. 17


Commvault Email Archiving vs Other Vendors

Criteria Commvault Other vendors

Number of Products in the Solution One platform Multiple Products

Long Term Retention Natively push data to tape or Requires additional product to be able to
object storage for long term push data to tape for long term retention
retention
Replication to 2nd Site Replication is built in the same Requires additional products with additional
solution with block level licenses and consoles
replication
Product Recovery Have built-in self recovery Need to be backed up in order to get
features recovered with additional backup licenses
Storage reduction features Block level deduplication Single instancing

Reporting Built in comprehensive Limited reporting


reporting

Copyright © 2019 Commvault | All Rights Reserved.


Architecture and
Summary

Copyright © 2019 Commvault | All Rights Reserved.


EXCHANGE MAILBOX AGENT ARCHITECTURE
USER MAILBOX & JOURNAL MAILBOX

Exchange Servers

Microsoft Outlook
Data Data Browsers
IMAP Clients

Index MediaAgents /
Exchange Mailbox
Agents

Data Data

Perimeter Network
(DMZ)
Why Commvault?

• Email Archive with Granular Restores for All Mailboxes

• Block-level Deduplication, rather than Single Instancing (SIS)

• Application Consistent DR Replication

• Native Tape out for Long-term Retention

• Native Reporting

• Simpler PST Migration

• Compliance Search
24
Compliance &
eDiscovery

Copyright © 2019 Commvault | All Rights Reserved.


®
Commvault eDiscovery & Compliance

Issues Needs

Altered or deleted ESI Guaranteed trust in the data

Lengthy compliance searches and audits Efficient, fast and scalable data collection solution

Costly legal reviews Streamlined data sets for review

Business inefficiency Data reuse

Operational inefficiency Ease of use

Copyright © 2021 Commvault | All Rights Reserved 26


Assurance that Relevant Data is Unaltered Using
a Trusted Chain-of-Custody
• Ensure that data cannot be lost or modified by Collection from backup Configurable Legal Hold
proactively preserving electronically stored
information (ESI) from immutable backups

• Ensure case folders and their contents survive


default data retention policies though the use of
legal holds
• Guarantee chain-of-custody and trust in the data Case Dashboards
for legal and compliance purposes

Copyright © 2021 Commvault | All Rights Reserved 27


Efficient Compliance Data Collection that’s
Fast and Scalable
• Improve productivity by automatically capturing Custom definitions
data for custodians or file locations based on
rules, search criteria, and content filters
• Streamline operational efficiency for data
collection by supporting of one-time, scheduled,
or continuous operations
• Reduce risk by automating the removal of
redundant and obsolete ESI

Copyright © 2021 Commvault | All Rights Reserved 28


Streamlined Data Review via Advanced
Search Capabilities
• Simplify search operations using a single Unified search Content preview & tagging
interface search across email and file data
sources, leveraging advanced techniques (e.g.
fuzzy, proximity searches) on content and
filtering of email/file metadata

• Improve compliance and eDiscovery tasks with


enhanced review tools such as tagging
• Reduce costly legal reviews by streamlining the
export of data sets for integration with external
systems ESI export

Copyright © 2021 Commvault | All Rights Reserved 29


Data Collection from a Single Pane of Glass,
at Massive Scale
• Compliment your data protection strategy with Customizable dashboards
streamlined integration with existing archiving and
retention policies
• Maintain security by ensuring the right users have
access to insights using role-based access to
dashboards, operations and management tools
• Maintain compliance and support audits with all actions
and access history logged

Copyright © 2021 Commvault | All Rights Reserved 30


Thank you.

Copyright © 2019 Commvault | All Rights Reserved. 31

You might also like