{"id":514701,"date":"2024-02-14T08:41:54","date_gmt":"2024-02-14T13:41:54","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=514701"},"modified":"2024-10-08T08:29:23","modified_gmt":"2024-10-08T12:29:23","slug":"risk","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/platform\/risk","title":{"rendered":"Risk"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><a href=\"https:\/\/www.commvault.com\/platform\">Platform<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Risk<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tContinuous Data Security to Protect Data Across Hybrid Workloads\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tUnderstand sensitive data to apply appropriate protection and deploy advanced early warning and threat detection mechanisms to protect data and AI pipelines proactively.&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Request demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRequest demo\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n<div class=\"alignfull sticky wp-block-commvault-v2-page-navigation\">\n\t<div class=\"custom-container\">\n\t\t<div class=\"nav-wrapper\">\n\t\t\t<div class=\"left-nav\">\n\t\t\t\t<div class=\"tab-menu\">\n\t\t\t\t\t<span>Risk<\/span>\n\t\t\t\t\t<button class=\"toggle\">\n\t\t\t\t\t\t<svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<path d=\"M11 1.5L6 6.5L1 1.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/>\n\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<ul class=\"wp-block-commvault-v2-page-navigation__ul\" aria-label=\"Page navigation\" =\"true\" role=\"navigation\">\n\t\t\t\t\t\t\t\t\t\t<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Overview-video\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Overview Video<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#benefits\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Benefits<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Analyst-Report\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Analyst Report<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#resources\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Resources<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#faqs\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>FAQs<\/span>\n\t<\/a>\n<\/li>\n\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"right-nav\">\n\t\t\t\t<a href=\"\/free-trial\" class=\"nav-cta\" target=\"_blank\">\n\t\t\t\t\t<span>Start a Trial<\/span>\n\t\t\t\t\t<svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M5 1.5L10 6.5M10 6.5L5 11.5M10 6.5H0\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<div style=\"background-color: #fff;\" class=\"standard-media__container alignfull wp-block-commvault-v2-standard-video\" id=\"Overview-video\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-6 col-lg-6 video\">\n\t\t\t<div class=\"video-wrapper\">\n\t\t\t\t<div class=\"video-container\">\n\t\t\t\t\t\t\t\t\t\t\t<img\n\t\t\t\t\t\tclass=\"vidyard-player-embed\"\n\t\t\t\t\t\tsrc=\"https:\/\/play.vidyard.com\/QTd21tzxkAsfo2xn5LA5NM.jpg\"\n\t\t\t\t\t\tdata-uuid=\"QTd21tzxkAsfo2xn5LA5NM\"\n\t\t\t\t\t\tdata-v=\"4\"\n\t\t\t\t\t\tdata-type=\"inline\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-6 col-lg-6 info\">\n\t\t\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tOverview video\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tCommvault Risk Governance \t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tAdvanced data governance capabilities coupled with proactive threat detection helps secure today&rsquo;s cloud-first enterprises.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/commvault.com\/resources\/video\/risk-governance-overview\"\n\t\t\taria-label=\"Watch now\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#\"\n\t\t\taria-label=\"Read More\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div id=\"Risk\" class=\"wp-block-group is-style-group-padding-zero\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"block-aligncenter wp-block-commvault-v2-stats\" id=\"benefits\">\n\t<div class=\"grid-container no-gap\">\n\t\t\t\t<div class=\"col-12 col-md-10 infoBlock\">\n\t\t\t\t\t\t\t<span class=\"eyebrowStats text-eyebrow-m text-color-mode font-medium\">\n\t\t\t\t\tData SECURITY &amp; Risk Minimization benefits&nbsp;\t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t<h2 class=\"titleStats text-heading-l text-md-heading-xl text-lg-heading-xxxl text-color-mode\">\n\t\t\t\tData governance controls &amp; threat and anomaly detection\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class='descriptionStats text-body-m text-md-body-l'>\n\t\t\t\tImprove your data and cybersecurity posture by better understanding data and proactively monitoring for cyber threats like hackers, ransomware, and malware.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t<div class=\"stats__container__statistic col-12\">\n\t\t\t\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Ransomware_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tDiscover, classify, and protect sensitive data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tReduce your data footprint and safeguard sensitive data to maintain trust, including secrets like keys or passwords, PII, and other sensitive or regulated data.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/GDPR-Sensitive-Data_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tReduce risk and improve cyber resilience&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tAdded protection for applications and data, including proactive and in-line scanning of data for new and persistent threats, helps reduce risk of recovery failures.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/User-Alert_Crocus_RGB_e92bdf.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tUnderstand data and backup resiliency posture\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tEasily check configurations and settings within your data against best practices to reduce risk to your live and backup environments.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n<\/div><\/div><div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\" id=\"features\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\" alignfull dark-mode wp-block-commvault-v2-section-header\" id=\"Capabilities\">\n\t\n\t<div class=\"section-header-inner-wrapper container\">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tenhanced control\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tAdvanced data governance\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tCommvault&reg; Cloud provides visibility and control over your data estate with automated data governance policies that help reduce your attack surface and assist with regulatory compliance.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/risk-analysis\"\n\t\t\taria-label=\"Explore Risk Analysis\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tExplore Risk Analysis\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Advanced-Data-Governance_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Advanced-Data-Governance_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Advanced-Data-Governance_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Advanced-Data-Governance_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\" alignfull dark-mode block-aligncenter wp-block-commvault-v2-stats\">\n\t<div class=\"grid-container no-gap\">\n\t\t\n\t\t<div class=\"stats__container__feature col-12\">\n\t\t\t<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tScan and classify live data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tAutomatically label and tag data to apply retention and data protection policies.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tAutomate data lifecycle actions&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tTrigger retention policies based on your data lifecycle, or pause those policies indefinitely in the case of eDiscovery or legal holds.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tMinimize redundant, obsolete, and trivial data\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tShrink your attack surface and storage costs by eliminating duplicate, unnecessary, or unneeded data from your data estate.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tFully customizable data discovery&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tIn addition to dozens of out-of-the-box classifiers for sensitive data, automatically discover anything your data governance teams deem sensitive&mdash;including keywords and secrets like API keys.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\" id=\"Capabilities\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tADVANCED SECURITY &amp; RISK MITIGATION\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tEarly warning &amp; threat and anomaly detection\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tCommvault Cloud helps shift your cyber defenses left to detect threats and mitigate risk earlier in the attack lifecycle.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Early-Warning_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Early-Warning_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Early-Warning_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Early-Warning_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"block-aligncenter wp-block-commvault-v2-stats\">\n\t<div class=\"grid-container no-gap\">\n\t\t\n\t\t<div class=\"stats__container__statistic col-12\">\n\t\t\t<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tDetect threats and unusual activity&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tDiscover malware, automatically quarantine suspicious files, and create a clean point so that corrupt or compromised data isn&rsquo;t restored during recovery.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/threat-scan\"\n\t\t\taria-label=\"Explore Threat Scan&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tExplore Threat Scan&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tDeploy decoys and traps for attackers&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tStrategically place high-value decoy data to look legitimate but act as an early warning sensor to detect threats proactively.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome\"\n\t\t\taria-label=\"Learn more about deception\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more about deception\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tImplement continuous monitoring&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tUse sensors across your environment to detect nefarious network traffic or suspicious behavior, allowing your security operations teams to analyze security incidents.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/threatwise\"\n\t\t\taria-label=\"Explore Threatwise&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tExplore Threatwise&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n<div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\" alignfull dark-mode wp-block-commvault-v2-section-header\" id=\"Capabilities\">\n\t\n\t<div class=\"section-header-inner-wrapper container\">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tDATA SECURITY POSTURE MONITORING&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tHarden and safeguard data from internal and external threats&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tReduce exposure, drive resilience, and organically improve your security posture.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/security-iq\"\n\t\t\taria-label=\"Explore Security IQ&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tExplore Security IQ&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#\"\n\t\t\taria-label=\"Read More\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Safeguard-Data_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Safeguard-Data_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Safeguard-Data_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Platform_Risk_Safeguard-Data_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\" alignfull dark-mode block-aligncenter wp-block-commvault-v2-stats\">\n\t<div class=\"grid-container no-gap\">\n\t\t\n\t\t<div class=\"stats__container__statistic col-12\">\n\t\t\t<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tSecurity control monitoring&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tVisualize the security posture of your environment with intuitive dashboards and reporting.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tEvaluate configuration against best practice&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tGet intelligent recommendations to help improve your backup environment&rsquo;s security posture based on industry best practices.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tAdvanced threat indicators&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tQuickly drill down into suspicious activity and investigate malware- or ransomware-infected files.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n<div class=\"wp-block-commvault-v2-customer-story\" id=\"Analyst-Report\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CustomerStory_BMA_650x650.png\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CustomerStory_BMA_650x650.png 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CustomerStory_BMA_650x650.png?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">Analyst Report&nbsp;<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Analyzing the Economic Benefits of Cyber Resilience with Commvault&reg; Cloud&nbsp;<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Commvault Cloud drives cost-efficiency, agility, and cyber resilience with lower TCO<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/gc\/the-economic-benefits-of-cyber-resilience-with-commvault-on-azure\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<div class=\"wp-block-commvault-v2-content-carousel\" id=\"testimonials\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"header-cols col-12 col-xl-8 \">\n\t\t\t<div class=\"header-wrapper \">\n\t\t\t\t<div class=\"text-container\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m m-0\">Our Reach<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__title text-heading-l text-md-heading-xl text-lg-heading-xxl text-xl-heading-xxxl m-0\">Supporting more than 100,000 companies<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\t\t<div class=\"gallery\">\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"449\" height=\"235\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/astra-zeneca-case-study.png?w=449\" class=\"cmv-component-card__logos\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\n\t\t<div class=\"carousel-content\">\n\t\t<div class=\"carousel-content__inner indent\">\n\t\t\t<div class=\"glide carousel-wrapper\" data-perview-desktop=\"1.3\" data-perview-tablet=\"1.3\">\n\t\t\t\t<div class=\"glide__track\" data-glide-el=\"track\">\n\t\t\t\t\t<div class=\"glide__slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #E7D5EF\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"32\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Testimonial_Tontect_1cBlack-3.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;Commvault Cloud delivers integrated, zero-trust security for peace of mind. We have complete confidence that our data is safe.&rdquo;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Nelson Lam<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">President at Tontec International Limited<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #F3F4FA\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"172\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/power-integrations-logo-1c-black.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;With a long retention strategy, our cloud storage costs were accelerating quickly. Commvault Cloud gave us a way to dramatically lower those costs and keep them predictable, while simultaneously providing us with the data resilience needed to keep our business running.&rdquo;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Jacob Gsoedl<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">CIO, Power Integrations<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #C5C7E3\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"296\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/BILTHOVEN-BIOLOGICALS-logo-black.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;With Commvault, we can build a defense mechanism to prevent cyberattacks and enable rapid recovery. With just a few clicks, we can restore a virtual machine or backups after an attack, which is vital in our line of work as a pharmaceutical company with very sensitive data.&rdquo;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Paul Vries<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\"> IT Team Lead, Bilthoven Biologicals<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"carousel-footer bullets\">\n\t\t\t\t\t<div data-glide-el=\"controls\" class=\"carousel-controls\">\n\t\t\t\t\t\t<button class=\"carousel-control prev\" data-glide-dir='<' aria-label=\"Previous\">\n\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M0.799999 20C0.799999 30.6039 9.39613 39.2 20 39.2C30.6039 39.2 39.2 30.6039 39.2 20C39.2 9.39613 30.6039 0.8 20 0.8C9.39613 0.8 0.799999 9.39613 0.799999 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<path d=\"M20.0002 14.168L14.1668 20.0013M14.1668 20.0013L20.0002 25.8346M14.1668 20.0013H25.8335\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"carousel-control next\" data-glide-dir=\"&gt;\" aria-label=\"Next\">\n\t\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t\t<path d=\"M39.2 20C39.2 30.6039 30.6039 39.2 20 39.2C9.39613 39.2 0.8 30.6039 0.8 20C0.8 9.39613 9.39613 0.8 20 0.8C30.6039 0.8 39.2 9.39613 39.2 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t\t<path d=\"M19.9998 14.168L25.8332 20.0013M25.8332 20.0013L19.9998 25.8346M25.8332 20.0013H14.1665\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"glide__bullets\" data-glide-el=\"controls[nav]\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=0\" aria-label=\"Slide-0\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=1\" aria-label=\"Slide-1\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=2\" aria-label=\"Slide-2\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\n\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\n<div class=\"wp-block-commvault-v3-section-header-v3\" id=\"resources\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      related resources    <\/h5>\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      Explore more platform resources    <\/h2>\n  \n  <\/div>\n\n<div class=\"commvault-v3-custom-buttons-component scalable-cta-button flex-shrink-0\">\n      <div class=\"commvault-v3-button flex-shrink-0 is-style-primary-alt \"\n            >\n\n              <a\n          class=\"cmvlt-2-custom-button btn-md text-body-l font-medium js-open-modal\"\n          href=\"\/resources\"\n          aria-label=\"View all resources\"\n          target=\"_blank\"\n        >\n\n                      <svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n              <path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n              <path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n            <\/svg>\n\n            <span class=\"font-medium\">\n              View all resources            <\/span>\n                  <\/a>\n          <\/div>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n<div class=\"wp-block-commvault-v3-masonry-grid\">\n\t<div class=\"spacing-none wp-block-commvault-v3-layout-grid\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container \">\n\t\t\t<div class=\"col-lg-5 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t<div class=\"wp-block-commvault-v2-customer-story\" id=\"related-resources\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">datasheet<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Commvault&reg; Cloud Risk Analysis<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Identify and categorize sensitive data to protect it from unauthorized access, theft, and misuse.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"http:\/\/commvault.com\/resources\/datasheet\/proactively-defend-data-with-commvault-risk-analysis\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<\/div>\n<div class=\"col-lg-7 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Cisco-Benefit_Analyze-Malware_1088x870.jpg 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">DATASHEET<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Identify malware and prevent reinfection<br>with Commvault&reg; Cloud: Threat Scan<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Learn to enable swift and trusted data recovery by analyzing backup data to find encrypted and corrupted files.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"http:\/\/commvault.com\/resources\/datasheet\/identify-malware-and-prevent-reinfection-with-commvault-threat-scan\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Cyberthreat-Recovery-Solution-Brief_888x500-1.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Cyberthreat-Recovery-Solution-Brief_888x500-1.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Cyberthreat-Recovery-Solution-Brief_888x500-1.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Cyberthreat-Recovery-Solution-Brief_888x500-1.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">SOLUTION BRIEF<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Cyberthreat protection with resilience and recovery<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Secure and defend data broadly across cloud, on-prem, and SaaS workloads.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"http:\/\/commvault.com\/resources\/solution-brief\/commvault-cyber-threat-protection-and-recovery\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\n<section class=\"wp-block-commvault-v2-accordion-block\" id=\"faqs\">\n\t<div class=\"accordion__header\">\n\t\t\t\t\t<h4 class=\"accordion__title text-center text-heading-m text-lg-heading-l text-xl-heading-xxl mb-0\">Frequently Asked Questions<\/h4>\n\t\t\t\t\t<\/div>\n\t<div class=\"accordion__rows\">\n\t\t\t\t\t\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"4e3fb4aa-05ab-44a6-9189-c4b88254fa89\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhat is cyber risk?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tCyber risk comes from threats against technology that a business uses daily. These risks sometimes arise from simple failures of SaaS applications or from malicious actors looking to compromise your data, infrastructure, or operations with malware or ransomware.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"bc62ad7d-42d1-4d3a-90bd-09b2e54f8d14\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow does the use of early warning or threat detection technology help reduce risk?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tThe earlier an attack or malicious actor is found within your environment, the higher the likelihood you can stop or minimize a full-scale data breach. Instrumenting your environment with sensors or monitoring behaviors can uncover suspicious activity so security operations teams can shut it down.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"12e1b862-ef93-42dd-9000-46391e124197\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow does cyber risk management contribute to a cyber resilience plan or program?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tUnderstanding what you have within your environment and how it&rsquo;s currently protected provides a baseline for measuring a cyber resilience program. Implementing better detection mechanisms, minimizing your attack surface, and having good visibility into your current data security posture can all help mature your cyber resilience and help you bounce back in the event of an attack.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"9d17a278-ac65-4057-8800-2faedcd1f8f8\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhat is a decoy in the context of early warning?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tA decoy is a system or piece of data that looks appealing to an attacker performing reconnaissance on your environment and looking for ways to get access to important or sensitive data. Often, decoys are only visible to illegitimate users. When an attacker attempts to open, probe, or manipulate a decoy, a high-fidelity warning is immediately triggered to alert security operations teams to the threat actor.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\t\t\t<\/div>\n<\/section>\n\n<div class=\"alignfull wp-block-commvault-v2-newsletter-block\" id=\"Free-Trial\">\n\t\t<div class=\"newsletter-container container\">\n\t\t\t\t\t\t\t<div class=\"newsletter-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"928\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_StylizedMobile.png\" class=\"cmv-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_StylizedMobile.png 842w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_StylizedMobile.png?resize=726,800 726w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_StylizedMobile.png?resize=768,846 768w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"newsletter__text-wrapper\">\n\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-eyebrow-m text-md-eyebrow-default\">get started<br><\/p>\n\t\t\t\t\t\t\t\t<div class=\"newsletter__text-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"newsletter-block__title text-heading-l text-lg-heading-xxl mb-0\">Try Commvault&reg; Cloud today&nbsp;<br><a href=\"https:\/\/commvault-new-preprod.go-vip.net\/free-trial\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-body-m text-lg-body-l\">Cyber resilience for the cloud-first enterprise, with the first platform built to enable continuous business.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/free-trial\"\n\t\t\taria-label=\"Get free trial\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet free trial\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":163,"featured_media":508246,"parent":73554,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-514701","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Minimize Risk Across Hybrid Workloads | Commvault<\/title>\n<meta name=\"description\" content=\"Explore the Commvault platform \u2013 a comprehensive solution for managing and mitigating risks in your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/platform\/risk\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk\" \/>\n<meta property=\"og:description\" content=\"Explore the Commvault platform \u2013 a comprehensive solution for managing and mitigating risks in your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/platform\/risk\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T12:29:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/02\/MicrosoftTeams-image-45.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Minimize Risk Across Hybrid Workloads | Commvault","description":"Explore the Commvault platform \u2013 a comprehensive solution for managing and mitigating risks in your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/platform\/risk","og_locale":"en_US","og_type":"article","og_title":"Risk","og_description":"Explore the Commvault platform \u2013 a comprehensive solution for managing and mitigating risks in your organization.","og_url":"https:\/\/www.commvault.com\/platform\/risk","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-10-08T12:29:23+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/02\/MicrosoftTeams-image-45.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/platform\/risk","url":"https:\/\/www.commvault.com\/platform\/risk","name":"Minimize Risk Across Hybrid Workloads | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/platform\/risk#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/platform\/risk#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/02\/MicrosoftTeams-image-45.jpg?quality=80","datePublished":"2024-02-14T13:41:54+00:00","dateModified":"2024-10-08T12:29:23+00:00","description":"Explore the Commvault platform \u2013 a comprehensive solution for managing and mitigating risks in your organization.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/platform\/risk#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/platform\/risk"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/platform\/risk#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/02\/MicrosoftTeams-image-45.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/02\/MicrosoftTeams-image-45.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/platform\/risk#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.commvault.com\/platform"},{"@type":"ListItem","position":3,"name":"Risk"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/514701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=514701"}],"version-history":[{"count":8,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/514701\/revisions"}],"predecessor-version":[{"id":529032,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/514701\/revisions\/529032"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/508246"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=514701"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=514701"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=514701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}