{"id":520176,"date":"2024-06-25T08:30:00","date_gmt":"2024-06-25T12:30:00","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=news&p=520176"},"modified":"2024-06-25T08:22:43","modified_gmt":"2024-06-25T12:22:43","slug":"new-commvault-cyber-recovery-readiness-report","status":"publish","type":"news","link":"https:\/\/www.commvault.com\/news\/new-commvault-cyber-recovery-readiness-report","title":{"rendered":"New Commvault Survey Uncovers Five Capabilities that Helped Companies Recover Faster from Cyberattacks"},"content":{"rendered":"\n
Media Contact:<\/strong><\/th>Investor Relations Contact:<\/strong><\/th><\/tr><\/thead>
Kevin Komiega
Commvault
978-834-6898
kkomiega@commvault.com<\/a><\/td>
Michael J. Melnyk, CFA
Commvault
646-522-6160
mmelnyk@commvault.com<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

TINTON FALLS, NJ \u2013 June 25, 2024 \u2013 <\/strong>Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today in collaboration with research firm GigaOm, released its 2024 Cyber Recovery Readiness Report<\/strong><\/a>.This eye-opening, global survey of 1,000 security and IT respondents across 11 countries directly addresses a fundamental question \u2013 \u201cwhat can businesses do to be more resilient in the face of cyberattacks?\u201d<\/p>\n\n\n\n

Commvault and GigaOm were able to pinpoint five key capabilities, also called resiliency markers, that when deployed together, helped companies recover faster from cyberattacks and experience fewer breaches compared to companies that did not follow the same path.<\/p>\n\n\n\n

These five resiliency markers emerged after data analysis teams combed through survey results across a range of topics including: how often companies were breached, what resilience technologies were (or were not) deployed, and how rapidly businesses were able to recover data and resume normal operations. The resiliency markers are as follows:<\/p>\n\n\n\n

    \n
  1. Security tools that enable early warning about risk, including insider risk.<\/li>\n\n\n\n
  2. A known-clean dark site or secondary system in place.<\/li>\n\n\n\n
  3. An isolated environment to store an immutable copy of the data.<\/li>\n\n\n\n
  4. Defined runbooks, roles, and processes for incident response.<\/li>\n\n\n\n
  5. Specific measures to show cyber recovery readiness and risk.<\/li>\n<\/ol>\n\n\n\n

    In assessing the results, only 13% of respondents were categorized as cyber mature. The survey yielded very interesting observations:<\/p>\n\n\n\n