{"id":62179,"date":"2022-04-06T13:47:05","date_gmt":"2022-04-06T13:47:05","guid":{"rendered":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover"},"modified":"2023-08-28T17:28:19","modified_gmt":"2023-08-28T21:28:19","slug":"identify-protect-monitor-respond-and-recover","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover","title":{"rendered":"Identify, Protect, Monitor, Respond, and Recover"},"content":{"rendered":"\n

In today\u2019s geopolitical climate, having your data is just part of the battle.<\/p>\n\n\n\n

You need to be prepared for anything that could happen: it\u2019s not if<\/em>, but when<\/em>. Currently ransomware attacks are happening every 11 seconds1<\/sup> throughout the world. With that, it means that you need to have not only your data ready and available, but in the event of a disaster, you must be able to rapidly recover. At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.<\/p>\n\n\n\n

\nhttps:\/\/play.vidyard.com\/4ZTXfskUCDiDJt9p33nMpt\n<\/div><\/figure>\n\n\n\n

Identify:<\/h3>\n\n\n\n

First, you must identify all the sources of data that you may need to back up. It can come from all sorts of places\u2014from file servers to data centers, that\u2019s just the basics. You might have emails in O365, or Salesforce, or even things like SaaS apps. You have to identify the data and know what you\u2019re working with to know what you\u2019re working with, and the things that are critical for you to run your business.<\/p>\n\n\n\n

Protect:<\/h3>\n\n\n\n

Protecting your data should be something you are very used to. You likely have some sort of backup, just doing standard backups and standard procedures. The problem is, standard backups and procedures just don\u2019t cut it anymore. Whether you\u2019re looking at on-prem or cloud usage, native tools simply aren\u2019t enough. To enhance your data protection, you must have at least one more copy to back up from, preferably at a secondary site. By having a secondary copy at another site, you have replication and rapid recovery. This is a good solution for recovering data in the event of a disaster site. But what if you have a cyber attack and both sites are impacted? To enhance your protection and holistically defend your data from local and cyber attacks, having a third copy of your data in a cloud solution (like Metallic Cloud Storage Services) is the best option. Particularly by air gapping the solution to take it offline for standard access, you know you have a good, protected copy of your data. This 3, 2, 1 strategy is the key to solid data protection: three copies, two different locations (minimum), and one of them in an air gap.<\/p>\n\n\n\n

Monitor:<\/h3>\n\n\n\n

How do you monitor your data to make sure it is secure? First, you need simplicity to ensure you\u2019re not only able to see all of your data and understand what\u2019s happening, but see it all in one place. The Commvault Command Center is an ideal solution: it manages all your backups at all locations, keeping your notice of what\u2019s going on. Plus, it utilizes things like honeypots and AI ML capabilities to make sure that we know what\u2019s going on to your data. Even better is the Security Dashboard, which allows you to see what is going on across your data and across your environment from a single space. This gives your insight into the pieces that you\u2019re protecting, and gives you the ability to do active monitoring on your data. You can even tell if things have changed on both live and backup data, which is a key differentiator when looking at the Commvault solution.<\/p>\n\n\n\n

Respond:<\/h3>\n\n\n\n

Once you have protection and monitoring down,  it\u2019s time to test your response. You need to be able to respond rapidly if something happens to your data. With Commvault, you can use our API-driven architecture to have recovery tests scripted, to test backups. The world isn\u2019t perfect, and as backup professionals, we know that things can fail. Testing your recovery is essential to your response.<\/p>\n\n\n\n

Recover:<\/h3>\n\n\n\n

The goal is rapid recovery, being able to go into your system and quickly get your data back\u2014this can keep you up and running in any environment. No matter what industry you\u2019re in, you need to be able to come back quickly and maintain your system. So, remember when you\u2019re looking at how to rapidly recover and protect your data, that you need to look at identifying, protecting, monitoring, responding, and rapidly recovering.<\/p>\n\n\n\n

You can do all that with Commvault: to learn more, visit https:\/\/www.commvault.com\/ransomware<\/a><\/p>\n\n\n\n

<\/div>\n\n\n\n

References<\/strong><\/p>\n\n\n\n

1. https:\/\/infimasec.com\/blog\/11-seconds\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.<\/p>\n","protected":false},"author":85,"featured_media":64307,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[206,678],"tags":[],"cmv_author":[1032],"class_list":{"0":"post-62179","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-data-protection-2","8":"category-ransomware","9":"cmv_author-michael-letschin","10":"entry"},"yoast_head":"\nIdentify, Protect, Monitor, Respond, and Recover<\/title>\n<meta name=\"description\" content=\"At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identify, Protect, Monitor, Respond, and Recover\" \/>\n<meta property=\"og:description\" content=\"At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-06T13:47:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-28T21:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"957\" \/>\n\t<meta property=\"og:image:height\" content=\"548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dpauciullo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dpauciullo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identify, Protect, Monitor, Respond, and Recover","description":"At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover","og_locale":"en_US","og_type":"article","og_title":"Identify, Protect, Monitor, Respond, and Recover","og_description":"At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.","og_url":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2022-04-06T13:47:05+00:00","article_modified_time":"2023-08-28T21:28:19+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","type":"image\/jpeg"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Identify, Protect, Monitor, Respond, and Recover","datePublished":"2022-04-06T13:47:05+00:00","dateModified":"2023-08-28T21:28:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover"},"wordCount":717,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","articleSection":["Data Protection","Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover","url":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover","name":"Identify, Protect, Monitor, Respond, and Recover","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","datePublished":"2022-04-06T13:47:05+00:00","dateModified":"2023-08-28T21:28:19+00:00","description":"At Commvault, we believe a multi-layered framework is the way to get you prepared and ready for anything your data is facing.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/identify-protect-monitor-respond-and-recover#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Identify, Protect, Monitor, Respond, and Recover"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/identify-mike-letschin-blog_.jpg?quality=80","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/62179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=62179"}],"version-history":[{"count":2,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/62179\/revisions"}],"predecessor-version":[{"id":63433,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/62179\/revisions\/63433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/64307"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=62179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=62179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=62179"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=62179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}