{"id":25452,"date":"2020-07-29T17:33:22","date_gmt":"2020-07-29T17:33:22","guid":{"rendered":""},"modified":"2024-06-05T08:44:16","modified_gmt":"2024-06-05T12:44:16","slug":"public-sector","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/use-cases\/public-sector","title":{"rendered":"Commvault – Public Sector"},"content":{"rendered":"\n
\n\t
\n\t\t\n\t\t\t\t\t

Public Sector <\/h3>\n\t\t\n\t\t\n\t\t

\n\t\t\tPublic Sector Cyber Resilience Depends On Data Resilience \t\t<\/h1>\n\n\t\t

\n\t\t\tCommvault Cloud is now a data cyber resilience platform with FedRAMP®<\/strong> High status, designed to meet the stringent data protection demands of the public sector. Experience unparalleled effectiveness and efficiency at the best value.\t\t<\/p>\n\n\t\t

\n\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\tLearn about FedRAMP High\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tSee our Federal partners\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t
\n\t\t\t\t\t\t\"\"\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div><\/div>\n\n\n\n
\n\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\tChoose the best or second best?\t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t

\n\t\t\t\tPublic Sector organizations choose Commvault as the most innovative technology for over 25 years<\/mark> <\/mark>with the best value and ease of use\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\tCommvault Cloud is the industry’s only platform for true cloud cyber resilience that eliminates risk, minimizes damage, and ensures rapid recovery. \t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t

\n\t\t\t\n
\n\t\"\"\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\tEducation \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tCommvault Cloud simplifies data security for universities, schools, and research institutes – helping them achieve cyber resilience via unprecedented data visibility, protection across clouds and on-prem, and fast, reliable recovery at a fraction of the cost.  \t\t<\/p>\n\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n
\n\t\"\"\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\tState & Local Government \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tNext-generation data protection and security empower state and local governments to safeguard critical data, proactively mitigate risks, minimize harm, and swiftly recover from any potential threats they may face. \t\t<\/p>\n\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n
\n\t\"\"\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\tFederal Government \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\t Our nation’s security and Public Sector needs incomparable data security protection and insights to ensure operational readiness, ransomware protection and mission accomplishment.  Commvault delivers while also meeting all the most stringent federal government cyber security and zero trust certifications, including FedRamp HIGH in Process status. \t\t<\/p>\n\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n\n\n\n
\n\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\tdid You know?\t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t

\n\t\t\t\tCommvault and the Public Sector \t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t
\n\t\t\t\n
\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t30%\t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof outages result in direct revenue loss.1<\/sup> \t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n

\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t52.8% \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tOf total data in the specific DoD data center had not been accessed in two years.2<\/sup> \t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n

\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t82%\t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof organizations experienced at least one unplanned downtime incident in a 3-year period.3<\/sup> \t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\t\t\t

\n\t\t\t\t1. Trili, The True Cost of Downtime: 21 Stats You Need to Know, August 2022.
2. Results from onsite analysis with Commvault FSO tool supporting EITaaS contract. 
3. Sundeep V. Ravande, Forbes, Unplanned Downtime Costs More Than You Think, February 2022.  \t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n
\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\"\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t
\n\t\t\t\t\n\n
\n\t\n\t
\n\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\tWhy Commvault<\/strong> \t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tCloud Smart demands trusted & experienced partners  \t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\t\tCommvault’s proven track record comes from partnering with industry leaders at the outset to create native cloud solutions. \t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n

\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t

How we do it<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\n\t\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n\t\t
\n\t\t\t\t\t\t\t

Data Cyber Resiliency<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Anticipate risks.  <\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Cyber resiliency depends on being proactive not just reactive.  Automated alerts based on ML and AI provide critical time to prevent a ransomware attack before it begins.   <\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t

\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\"\"\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n\t\t
\n\t\t\t\t\t\t\t

Key benefits even greater data cyber resiliency <\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Reduce damage. Diverting the attack.<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Automated zero-day threat diversion away from production environments and backup infrastructure and isolate the attack. <\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t

\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\"\"\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t
\n\t
\n\t\t
\n\t\t\t\t\t\t\t

 Ease of Use <\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Eliminate downtime. Let the software do the heavy lifting.<\/h3>\n\t\t\t\n\t\t\t\t\t\t\t

Spot anomalous behavior and latent threats, prevent sensitive data from exposure and exfiltration and isolate data for clean recoverability is great, but to have that automated is critical to operational readiness and resiliency. <\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t

\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\"\"\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t