{"id":505654,"date":"2024-01-03T08:40:57","date_gmt":"2024-01-03T13:40:57","guid":{"rendered":"https:\/\/www.commvault.com\/?p=505654"},"modified":"2024-01-08T10:20:58","modified_gmt":"2024-01-08T15:20:58","slug":"minimize-the-blast-radius-of-ransomware","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware","title":{"rendered":"Minimize the Blast Radius of Ransomware with Early Threat Detection and Diversion"},"content":{"rendered":"\n

Continuously evolving ransomware and modern cyberthreats that utilize artificial intelligence (AI) and machine learning (ML) plague today’s businesses across all industries. According to IBM\u2019s Cost of a Data Breach 2023 Report<\/a>, the average cost of a single data breach reached a new all-time high with USD 4.45 million per breach. Leaving organizations with the challenge to become cyber resilient through limiting costs associated with ransomware.<\/p>\n\n\n\n

Stop the Threat from Spreading<\/h4>\n\n\n\n

Rather than the businesse’s decision to pay a ransom or not, your company’s cyber resilience relies on its capability to remediate and recover from a breach. Data protection takes up a critical role in this effort that ensures the business can operate by evaluating and testing clean points, standing up safe environments, recovering backed up data sets, and continually protecting and testing data in air-gapped instances. Meanwhile, the scope of necessary recovery efforts per incident widely varies and increases over time, making the ability to discover threats early, react sooner, and minimize how much needs to be recovered.<\/p>\n\n\n\n

According to Sophos\u2019 The State of Ransomware 2023 report<\/a>, two-thirds of organizations reported being hit by ransomware in 2023. With increasing damages year over year, conventional methods for threat detection are missing the mark to protect companies\u2019 crown jewel: data. So how does the Commvault Cloud spot malicious activity quicker to minimize the blast radius and stop the threat from spreading?<\/p>\n\n\n\n

See Threats Sooner<\/h4>\n\n\n\n

Threatwise cyber deception detects threats fast as bad actors move laterally across production environments in the search for your data. Indistinguishable threat sensors blanket the path to critical data instances setting up trip wires that trigger alerts upon first touch while staying invisible to legitimate users. Gathering in-depth threat intelligence data, every step of the threat actor is monitored and fed into existing security tools to surface used tactics, techniques, and procedures. By taking an inward-out approach that spots both external and internal malicious activity targeting business data, Threatwise unveils threats sooner. This allows key IT and security stakeholders to identify and remediate breaches the moment they happen and divert attacks to interact with deceptive assets instead of real machines.<\/p>\n\n\n\n

Automated Best Practices Built-in<\/h4>\n\n\n\n

Thanks to the Commvault Cloud telemetry, Threatwise Advisor reduces the cognitive load for users by continuously monitoring data protection workflows in backup environments and recommending optimal sensor placement that further hardens critical environments. In the near future, Threatwise Advisor will take it a step further by notifying the Commvault backup environment which assets are at significant risk based on malicious activity detected by threat sensors. The unified control provided by the Commvault Cloud allows backup protection admins to take proactive steps along the lifecycle of the data, making sure backups stay clean, available, and recoverable at all times.<\/p>\n\n\n\n

Start protecting your data sooner to build true cyber resilience and limit the burden of remediation and recovery across your hybrid environment. For more information on how to guard your organization against AI-driven attacks, read this blog post<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Learn how Commvault Cloud’s Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.<\/p>\n","protected":false},"author":85,"featured_media":505655,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[678],"tags":[],"cmv_author":[1453],"class_list":{"0":"post-505654","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ransomware","8":"cmv_author-guy-williams","9":"entry"},"yoast_head":"\nMinimize the Blast Radius of Ransomware | Blog | Commvault<\/title>\n<meta name=\"description\" content=\"Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Minimize the Blast Radius of Ransomware with Early Threat Detection and Diversion\" \/>\n<meta property=\"og:description\" content=\"Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T13:40:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T15:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dpauciullo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dpauciullo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Minimize the Blast Radius of Ransomware | Blog | Commvault","description":"Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware","og_locale":"en_US","og_type":"article","og_title":"Minimize the Blast Radius of Ransomware with Early Threat Detection and Diversion","og_description":"Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.","og_url":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-01-03T13:40:57+00:00","article_modified_time":"2024-01-08T15:20:58+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Minimize the Blast Radius of Ransomware with Early Threat Detection and Diversion","datePublished":"2024-01-03T13:40:57+00:00","dateModified":"2024-01-08T15:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware"},"wordCount":504,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware","url":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware","name":"Minimize the Blast Radius of Ransomware | Blog | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","datePublished":"2024-01-03T13:40:57+00:00","dateModified":"2024-01-08T15:20:58+00:00","description":"Learn how Commvault Cloud's Threatwise cyber deception helps spot and divert ransomware threats early, reducing the blast radius. Discover automated best practices for quicker threat detection and protection against evolving cyberattacks.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/minimize-the-blast-radius-of-ransomware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Minimize the Blast Radius of Ransomware with Early Threat Detection and Diversion"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/01\/Threatwise-Blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/505654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=505654"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/505654\/revisions"}],"predecessor-version":[{"id":505663,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/505654\/revisions\/505663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/505655"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=505654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=505654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=505654"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=505654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}