{"id":516124,"date":"2024-06-05T16:08:25","date_gmt":"2024-06-05T20:08:25","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&#038;p=516124"},"modified":"2024-06-05T17:53:38","modified_gmt":"2024-06-05T21:53:38","slug":"cyber-deception","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","title":{"rendered":"Cyber Deception"},"content":{"rendered":"\n<div class=\"alignfull wp-block-commvault-v2-glossary-content\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"table__content\">\n\t\t\t\t<div class=\"js-toc_glossary\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 table__content__mobile hidden-md\">\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-8\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"js-toc-content\">\n\t\t\t\t\t\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"what-is-cyber-deception\">What is cyber deception?<\/h2>\n\n\n\n<p class=\"\">Cyber deception&nbsp;is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks. <br><br>Industry-leading cyber deception solutions pick up where conventional security tools leave off \u2013 employing at two-step process to slow down and surface unknown and zero-day threats. First, using decoys, bad actors or intrusive malware are diverted toward engaging look-a-like, fake assets. <br><br>Once engaged with, high fidelity alerts are immediately sent to key stakeholders and security systems, flagging ongoing threats before they reach or compromise actual systems or data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading shift-cls heading__glossary__content is-style-heading-4\" id=\"help-combat-ransomware\">How does cyber deception help combat ransomware?<\/h2>\n\n\n\n<p class=\"\">Cyberthreats have reached record highs and are continuing to expand in both scope and sophistication, with one goal in mind \u2013 compromise your systems and your data. And while encryption is still a primary focal point for ransomware gangs, bad actors have evolved, employing double and triple extortion tactics to exploit businesses data. In fact, over 83% of ransomware attacks today involve some form of data leakage, exfiltration, or theft. Put differently, most ransomware threats aren\u2019t just focus on holding your data hostage but monetizing it in new ways.<\/p>\n\n\n\n<p class=\"\">Cyber deception arms today\u2019s businesses with early warning signals into ransomware attacks. While conventional security tools aim to harden and fortify your perimeter from threats, cyber deception actively defends against threats that have successfully bypassed or breached customer environments. <\/p>\n\n\n\n<p class=\"\">Using sophisticated decoys, cyber deception solutions engage bad actors the moment an attack begins. This delivers a multi-layered defense against ongoing attacks, equipping businesses with capabilities to immediately divert and spot silent threats \u2013 before data is lost, damaged, or compromised.<\/p>\n\n\n\n<div class=\"wp-block-group is-style-group-reduced-padding\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-style-group-rounded mt-sm\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns alignfull are-vertically-aligned-center has-eggshell-background-color has-background is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-large is-style-heading-5 has-almost-black-color has-text-color\" id=\"h-want-to-see-data-protection-in-action\">Want to see data protection in action? <\/h2>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" alt=\"\" class=\"wp-image-74628\"\/><\/figure><\/div>\n\n\n<p class=\"has-text-align-left is-style-small has-almost-black-color has-text-color\">See the fully functional, full-service product today, and see how Commvault can serve your needs directly.<\/p>\n\n\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Get a demo\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet a demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"Exfiltration-and-leakage\">What is data exfiltration and leakage?<\/h2>\n\n\n\n<p class=\"\">Ransomware gangs have shifted their approach. They no longer just settle for encrypting data \u2013 but seek larger payouts by comprising businesses and data in new ways. Now, the goal often is to extort data in multiple ways, by stealing, leaking, or damaging it along the way.<\/p>\n\n\n\n<p class=\"\">Data exfiltration is when malware or bad actors enact an unauthorized data transfer from one device or system to another. This is a form of data theft that is also known as data extrusion or data exportation, which are infiltrated through a wide variety of means (such as phishing, etc.).&nbsp;Data leakage is another form of theft which occurs when transmission from within an organization is purposefully sent to an external source or recipient. Leakage can expose sensitive or valuable business data to unwarranted parties including nation states, public forums, and the dark web.<\/p>\n\n\n\n<p class=\"\">In both instances, exfiltration and leakage present to new challenges and imperatives to safeguard data \u2013 beyond just recovering from post-encrypted states.<\/p>\n\n\n\n<div style=\"height:13px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"What-are-threat-sensors\">What are threat sensors?<\/h2>\n\n\n\n<p id=\"What-are-honeypots\" class=\"\">Threat sensors are a unique, central aspect to <a href=\"\/platform\/threatwise\">Commvault<sup>\u00ae<\/sup>&nbsp;ThreatWise\u2122<\/a> cyber deception capabilities.&nbsp; Unlike honeypots, Threatwise threat sensors are designed to actively engage bad actors the moment an attack begins. Using a light-weight, webservice-like architecture, Commvault threat sensors are highly specialized, can mimic any customer asset, and can be rapidly deployed in minutes. <br><br>This floods customer environments with falsified digital assets that are indistinguishable to attackers.&nbsp; They do not interfere with normal operations within an organization\u2019s network, but lure attackers in with decoys that divert and trick cyber attackers during recon, discovery, lateral movement, and more. When a bad actor touches a threat sensor, real-time high-fidelity alerts are directly passed to key stakeholders and security tools for remediation. <br><br>And because threat sensors are only visible to an attacker, businesses get highly precise notifications without false positives \u2013 for a direct line of sight into activity, attack paths, and techniques deployed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"What-are-honeypots\">What are honeypots?<\/h2>\n\n\n\n<p class=\"\"><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/honey-pot\" target=\"_blank\" rel=\"noreferrer noopener\">Honeypots<\/a>&nbsp;are a conventional form of threat detection. Rather than engaging an attacker, honeypots are designed to examine and learn from attackers and their attempts. Honeypots differ from threat sensors as they are traditionally leveraged to investigate and study how cybercriminals operate \u2013 not engage, surface, and divert ongoing attacks. Honeypots are commonly a network-attacked, full operating system \u2013 making them more resource-heavy to develop, monitor, and maintain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"Metallic-threatwise-different\">How is Commvault Threatwise different?<\/h2>\n\n\n\n<p class=\"\"><a href=\"\/platform\/threatwise\">Commvault Threatwise<\/a>&nbsp;delivers integrated cyber deception across our award-winning DMaaS portfolio, to proactively defend data and enhances recoverability, before encryption, leakage, exfiltration, or damage. ThreatWise\u2122 combines game-changing, early warning alerts with rapid response capabilities to enable customers to neutralize otherwise undetected attacks before they cause any harm. Even the stealthiest zero-day attacks are detected and diverted despite their efforts to circumvent traditional detection tech and security controls.<\/p>\n\n\n\n<p class=\"\">Other traditional solutions certainly provide baseline capabilities, but these only operate within backup environments and detect and deal with threats after it\u2019s already too late to completely safeguard the data. ThreatWise\u2122 enables organizations to immediately reveal latent and silent threats traversing network environments to neutralize ransomware activity before it reaches the target.<\/p>\n\n\n\n<p class=\"\">This is truly unique pre-attack identification and containment, redefining the data protection market. Commvault is the single solution capable of identifying, deceiving, and recovering from threats across your data estate.&nbsp;<\/p>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"alignfull wp-block-commvault-v2-free-trial-glossary\" id=\"free-trial-glossary\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12\">\n\t\t\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tCyber Deception:<br>Why staying one step ahead is crucial to first-class security\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tHow cyber deception can help augment organizations\u2019 incident detection and response strategies.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/cyber-deception-and-first-class-security\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tEarly Threat Detection with Threatwise\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tAs adversaries aiming to steal your data early threat detection has never been more important.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/resources\/early-threat-detection-with-threatwise\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading heading__quick-links\" id=\"h-quick-links\">Quick Links<\/h4>\n\n\n\n<ul class=\"list__free-trial wp-block-list\">\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/resources\">All Resources<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/customers?cmv_lang=en_US\">Case Studies<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/supported-technologies\">Supported Tech<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/webinars-and-events?cmv_lang=en_US\">Webinars &amp; Events<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/services\">Training &amp; Education<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.<\/p>\n","protected":false},"author":143,"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""}},"class_list":{"0":"post-516124","1":"cmv_glossary","2":"type-cmv_glossary","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Deception | Knowledge Center | Commvault<\/title>\n<meta name=\"description\" content=\"Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/glossary-library\/cyber-deception\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Deception\" \/>\n<meta property=\"og:description\" content=\"Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/glossary-library\/cyber-deception\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T21:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Deception | Knowledge Center | Commvault","description":"Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","og_locale":"en_US","og_type":"article","og_title":"Cyber Deception","og_description":"Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.","og_url":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-06-05T21:53:38+00:00","og_image":[{"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","url":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","name":"Cyber Deception | Knowledge Center | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg","datePublished":"2024-06-05T20:08:25+00:00","dateModified":"2024-06-05T21:53:38+00:00","description":"Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/glossary-library\/cyber-deception"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Deception"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary\/516124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/143"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=516124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}