Commvault’s immutable infrastructure architecture<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"Constantly in step with the changing times, Commvault, armed with 25 years of experience in the data protection and management arena, helps customers recover their data and bounce back from cyber and disaster recovery (DR) crises via a multi layered security approach. <\/p>\n","protected":false},"author":85,"featured_media":64373,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[716,713,678],"tags":[],"cmv_author":[879],"class_list":{"0":"post-46093","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hyperscale-x","8":"category-metallic-category","9":"category-ransomware","10":"cmv_author-vidya-shankaran","11":"entry"},"yoast_head":"\n
Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability","description":"Constantly in step with the changing times, Commvault, armed with 25 years of experience in the data protection and management arena, helps customers recover their data and bounce back from cyber and disaster recovery (DR) crises via a multi layered security approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth","og_locale":"en_US","og_type":"article","og_title":"Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability","og_description":"Constantly in step with the changing times, Commvault, armed with 25 years of experience in the data protection and management arena, helps customers recover their data and bounce back from cyber and disaster recovery (DR) crises via a multi layered security approach.","og_url":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2021-10-18T13:37:48+00:00","article_modified_time":"2024-01-03T18:52:34+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability","datePublished":"2021-10-18T13:37:48+00:00","dateModified":"2024-01-03T18:52:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth"},"wordCount":1429,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","articleSection":["Hyperscale X","Metallic","Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth","url":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth","name":"Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","datePublished":"2021-10-18T13:37:48+00:00","dateModified":"2024-01-03T18:52:34+00:00","description":"Constantly in step with the changing times, Commvault, armed with 25 years of experience in the data protection and management arena, helps customers recover their data and bounce back from cyber and disaster recovery (DR) crises via a multi layered security approach.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/ransomware-defense-in-depth#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware Defense in Depth \u2013 Best Practices for Security and Backup Data Immutability"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/blog-data_.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/46093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=46093"}],"version-history":[{"count":13,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/46093\/revisions"}],"predecessor-version":[{"id":505682,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/46093\/revisions\/505682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/64373"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=46093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=46093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=46093"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=46093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}