0% found this document useful (0 votes)
2 views26 pages

Email Archive 2024

Uploaded by

ovaiskazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views26 pages

Email Archive 2024

Uploaded by

ovaiskazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Commvault

Archive
Solution
PRESENTED BY
Etienne Niken

Copyright © 2019 Commvault | All Rights Reserved.


INTRODUCTION

Commvault’s contribution to
Cyber Resilience
#1
in cyber resilience for more
1.4K
We have over 1.4K patents for
than 25 years and counting. groundbreaking innovation:

Gartner MQ Leader The first to unify data protection for on-


12 years running prem, cloud and hybrid.

Safeguard more than The first to integrate ransomware protection


> 4
EB 4 exabytes of cloud data into our platform.

Only FedRAMP High The only to offer unique architecture with


cyber resilience platform any-to-any portability and defense in depth

The only vendor to offer


Cleanroom Recovery.
© Commvault 20 3
24
© Commvault 20 4
24
The world has
changed

Ransomware everywhere — Breaches are Average time to recover


including the backup becoming the norm is devastating
99% of ransomware tampers 66% of organizations surveyed 24 days is the average
with security and backup were breached in 20231 reported time to recover from a
infrastructure cyberattack

Sources: Microsoft. Sophos. Coveware. © Commvault 2024 5


RECOVERY READINESS: A SECURITY IMPERATIVE

CISOs are shifting right

NIST 2.0 Cyber Security Framework

Identify Protect Detect Respond Recovery

NIST 1800-25
NIST 800-53 NIST 800-207 NIST 800-53 NIST 800-61 NIST 800-184
Asset
Security Zero trust Security Incident Cyber
Identification
Controls architecture monitoring Handling Recovery
and protection

Security is blind to unknowns. Recovery readiness and testing


They must embrace the breach. enables business to be cyber resilient.

© Commvault 2024
Cyber Resilience Journey Maps
BUILDING END-TO-END CYBER RESILIENCE

RISK READINESS RECOVERY

Cyber Incident
Risk Early
Recommendations Warning
Incident
Clean Point
Response
Restore &
Planning
Verification
Recovery Point
Sensitive Data Validation At Scale
Scanning Cyber Deception Recovery
Risk Cyber Recovery
Remediation

Forensic
Analysis
Sensitive Data Threat Cyber Recovery
Categorization Recommendations Testing
Zero Trust Access

MFA | Multi Person Auth | SAML | PAM | RBAC | KMIP | YubiKey | MS Auth | Google Auth

Palo Alto | MS Sentinel | Dark Trace | Netskope | CyberArk | Entrust | ServiceNow

Risk Analysis Early Warning Indicators of Compromise Immutable Storage ThreatScan AI Cleanroom Recovery

 Identify Data Owners  Cyber deception lures  Canary Files Object Appliance  Quarantine suspicious  On-premise IRE
| Access |  File hashing files Cloud IRE
 Threat Sensors
Permissions  Pre-view Corrupt file
 Agentless VM CMDR Forensics
 PII or other critical versions SIM Hash
GDPR contents for  Extension changes Cloud NAS  Validate Recovery
 Signature Based scan
leakage or exposure Points
 MIME Type Mismatch
risks  AI Zero Day Scan
 File Entropy Detection

© Commvault 2023 8
Mission over 2 decades : “No Workload Left Unprotected”
Immutable, de-duplicated, & encrypted
Single Control Plane

Native Instances

Managed VMs IaaS SQL PaaS SQL Air-Gap offsite


S3 / S3IA Google Commvault
In Cloud Cloud Metallic™ Cloud
Storage
Storage Service
Amazon Amazon Amazon Data Vault
EC2 RDS Aurora S3 Glacier

We protect 4+ EB’s on Cloud


We report on over 100,000+ jobs weekly

+ +
On-Premises
Datacenter HyperScale™ X HyperScale™ X
Data Management. Done Differently

Primary Workloads

Endpoint Data Remote Data- Physical Virtua Hyper- Cloud SaaS Email Snapshots
Site bases l converged
Data

Backup & Recovery Email Archive

Virtual Data Repository

Distributed Index Artificial Intelligence Automated Policy Engine

Physica Virtual Cloud Scale-out Hybrid Tape


l
A single view for managing your entire environment
Main dashboard with RBAC and Reporting

Resource
monitoring

Health check
Day to day
operations

Daily
operations

Storage usage
and prediction

Copyright © 2020 Commvault | All Rights Reserved. 11


Email Archive

Copyright © 2019 Commvault | All Rights Reserved.


Complete Email Management

CommVault Archive is a smarter approach to collecting, retaining and accessing email


data across the enterprise while providing intuitive, role-based search for business insight,
lower risk and cost
Storage Optimization Productivity Compliance

Efficient long-term retention & End-user, self-service preview & Purpose-built, advanced
collection search with ContentStore Mail compliance search & legal
hold
Persona: IT Persona: IT, End-User, LOB Persona: Legal, Compliance

Benefits Benefits Benefits


• Control growth & cost • Transparent access • Reduced risk
• Eliminate PST’s • Improved productivity • Eliminate IT burden
• Improve visibility • Business value & insight • Control costs
Email Archive
MS Exchange Protection

• Full DAG aware support with automated


single master client
• DB, Single Mail, Attachments, Mailbox
Restore from DB backup
• Near zero impact instant backup with
granular restore
• Multiple Streaming DB backup
• Auto-Discovery of Users, AD Groups and
Mailboxes
• End-user and Journal Mailbox email
archive
• Legal Compliance e-Discovery and
Search

Copyright © 2019 Commvault | All Rights Reserved. 17


Commvault Email Archiving vs Other Vendors

Criteria Commvault Other vendors

Number of Products in the Solution One platform Multiple Products

Long Term Retention Natively push data to tape or Requires additional product to be able to
object storage for long term push data to tape for long term retention
retention
Replication to 2nd Site Replication is built in the same Requires additional products with additional
solution with block level licenses and consoles
replication
Product Recovery Have built-in self recovery Need to be backed up in order to get
features recovered with additional backup licenses
Storage reduction features Block level deduplication Single instancing

Reporting Built in comprehensive Limited reporting


reporting

Copyright © 2019 Commvault | All Rights Reserved.


Architecture
and Summary

Copyright © 2019 Commvault | All Rights Reserved.


EXCHANGE MAILBOX AGENT ARCHITECTURE
USER MAILBOX & JOURNAL MAILBOX

Exchange
Servers

Microsoft Outlook
Data Data Browsers
IMAP Clients

Index
MediaAgents /
Exchange Mailbox
Agents

Data Data

Perimeter Network
(DMZ)
Why Commvault?

• Email Archive with Granular Restores for All Mailboxes

• Block-level Deduplication, rather than Single Instancing


(SIS)

• Application Consistent DR Replication

• Native Tape out for Long-term Retention

• Native Reporting

• Simpler PST Migration

• Compliance Search
24
Compliance &
eDiscovery

Copyright © 2019 Commvault | All Rights Reserved.


Commvault eDiscovery & Compliance
®

Issues Needs

Altered or deleted ESI Guaranteed trust in the data

Lengthy compliance searches and audits Efficient, fast and scalable data collection solution

Costly legal reviews Streamlined data sets for review

Business inefficiency Data reuse

Operational inefficiency Ease of use

Copyright © 2021 Commvault | All Rights Reserved 26


Assurance that Relevant Data is Unaltered Using
a Trusted Chain-of-Custody
• Ensure that data cannot be lost or modified by Collection from backup Configurable Legal Hold
proactively preserving electronically stored
information (ESI) from immutable backups
• Ensure case folders and their contents survive
default data retention policies though the use of
legal holds
• Guarantee chain-of-custody and trust in the data
Case Dashboards
for legal and compliance purposes

Copyright © 2021 Commvault | All Rights Reserved 27


Efficient Compliance Data Collection that’s
Fast and Scalable
• Improve productivity by automatically capturing Custom definitions
data for custodians or file locations based on
rules, search criteria, and content filters
• Streamline operational efficiency for data
collection by supporting of one-time, scheduled,
or continuous operations
• Reduce risk by automating the removal of
redundant and obsolete ESI

Copyright © 2021 Commvault | All Rights Reserved 28


Streamlined Data Review via Advanced
Search Capabilities
• Simplify search operations using a single Unified search Content preview & tagging
interface search across email and file data
sources, leveraging advanced techniques (e.g.
fuzzy, proximity searches) on content and
filtering of email/file metadata
• Improve compliance and eDiscovery tasks with
enhanced review tools such as tagging
• Reduce costly legal reviews by streamlining the
export of data sets for integration with external
systems ESI export

Copyright © 2021 Commvault | All Rights Reserved 29


Data Collection from a Single Pane of Glass,
at Massive Scale
• Compliment your data protection strategy with Customizable dashboards
streamlined integration with existing archiving and
retention policies
• Maintain security by ensuring the right users have
access to insights using role-based access to
dashboards, operations and management tools
• Maintain compliance and support audits with all actions
and access history logged

Copyright © 2021 Commvault | All Rights Reserved 30


Thank you.

Copyright © 2019 Commvault | All Rights Reserved. 31

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy