{"id":516390,"date":"2024-04-11T09:52:47","date_gmt":"2024-04-11T13:52:47","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_resource&p=516390"},"modified":"2024-04-11T09:54:43","modified_gmt":"2024-04-11T13:54:43","slug":"use-deception-technology-to-protect-vulnerable-legacy-systems","status":"publish","type":"cmv_resource","link":"https:\/\/www.commvault.com\/resources\/whitepaper\/use-deception-technology-to-protect-vulnerable-legacy-systems","title":{"rendered":"Use Deception Technology to Protect Vulnerable Legacy Systems"},"content":{"rendered":"