Commvault partners with Google Cloud Platform to protect data in multi-cloud, hybrid IT environments.
At Commvault GO, Commvault’s annual customer event, the company will make three key announcements that aim to empower organisations to have flexibility, security, availability and business agility no matter the outside constraints on data. Specifically, Commvault is enabling customers to better manage multi-cloud environments, ensure compliance with upcoming regulations and maintain strong data protection levels no matter how many endpoints are utilised.
Commvault Announces Partnership with Google Cloud and Expands Support for Customers’ Multi-Cloud Strategies
According to a recent Commvault executive cloud survey conducted in partnership with CITO Research, 56 percent of responding organisations are cloud-only or plan to move 100 per cent of their workloads to the cloud. In a separate cloud security survey, commissioned by Google, MIT Sloan found that 75 per cent of IT and business executives said data storage was their top workload deployed in the cloud today. These findings reinforce this new strategic partnership between Commvault and Google Cloud as it presents new opportunities for joint enterprise customers to scale faster, innovate easier, and more securely protect, store and use data in the cloud.
By supporting all four Google Cloud Platform storage classes for content repositories – Coldline, Nearline, Regional and Multi-Regional – Commvault is helping customers optimise their cloud investments by enabling them to achieve the right balance between access and cost economics of data storage.
Commvault Introduces New Data Privacy Analytics Application for Identifying and Reducing GDPR Compliance Risk
As organisations around the world prepare to comply with GDPR, one of the toughest data privacy regulations in the world, Commvault’s new information governance for data privacy application enables enterprises to:
· Detect an expandable set of personal data, initially focusing on Personally Identifiable Information (PII) on file systems and endpoints.
· Use dashboards, reports and visualisations to map where this PII information is located and drill down into this data, allowing them to develop, implement and automate data privacy risk management policies.
· Create automated workflows that address customer requests and other remediation actions for PII data disclosure, export and erasure.
· Produce audit trails of PII data management actions.
The information governance of data privacy application is the first application in Commvualt’s new analytics platform to be launched. The tightly intergraded portfolio of applications, solutions and services is designed to help customers use the powerful analytics central to the Commvault Data Platform to obtain data insights for compliance, eDiscovery and a variety of other digital transformation use cases. Commvault will announce several other additions to the portfolio over the comping year.
Commvault Launches Endpoint Data Protection as a Service to Simplify Data Recovery on Laptops and Other Devices
Businesses today average about three endpoint devices per employee and one laptop is stolen nearly every minute. Combined with the increasing threat of ransomware, with more than 150 countries impacted by global outbreaks of WannaCry, Petya, and NotPetya attacks in 2017, the need for endpoint data protection has never been greater.
Commvault Endpoint Data Protection as a Service simplifies and streamlines the backup and recovery of corporate data stored on laptops, desktops and other devices in one flexible, easy-to-use software as a service (SaaS) offering. Fully managed by Commvault in the cloud with 24/7 customer support, the service offering eliminates the need for in-house infrastructure installation or application management resources. Customers can leverage the simplicity and flexibility of the Commvault Endpoint Data Protection as a Service to automatically and securely backup data on employee desktops, laptops and other devices, reducing the risk of data loss from breaches and lost or stolen endpoint devices.