{"id":520274,"date":"2024-06-14T14:45:07","date_gmt":"2024-06-14T18:45:07","guid":{"rendered":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report"},"modified":"2024-06-27T10:00:18","modified_gmt":"2024-06-27T14:00:18","slug":"cyber-recovery-readiness-report","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","title":{"rendered":"2024 Cyber Recovery Readiness Report\u00a0"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tCyber Recovery Readiness Report: Discover What a Breach Can Teach\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tLearn hard fought lessons about data security, recovery, and cyber resilience from 1,000 global leaders in the inaugural Cyber Recovery Readiness Report from Commvault and GigaOm. &nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#get-report\"\n\t\t\taria-label=\"Download report\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tDownload report\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-Cyber-Recovery-Readiness_Hero_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-Cyber-Recovery-Readiness_Hero_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-Cyber-Recovery-Readiness_Hero_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-stats\">\n\t<div class=\"grid-container no-gap\">\n\t\t\t\t<div class=\"col-12 col-md-10 infoBlock\">\n\t\t\t\t\t\t\t<span class=\"eyebrowStats text-eyebrow-m text-color-mode font-medium\">\n\t\t\t\t\tCyber Readiness Gaps&nbsp;\t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t<h2 class=\"titleStats text-heading-l text-md-heading-xl text-lg-heading-xxxl text-color-mode\">\n\t\t\t\tAre you ready for the next breach? <mark class=\"has-inline-color has-almost-black-color\">Our data says you may not be.&nbsp;<\/mark>\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t<div class=\"stats__container__statistic col-12 col-lg-10 offset-lg-1\">\n\t\t\t\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t83%\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tof organizations surveyed experienced a material security breach.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t42%\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tof leaders lack clarity on who is responsible for cyber resilience and recovery.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t55%\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tof respondents are not fully confident they could recover systems and data following a major incident.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-content-carousel\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"header-cols col-12 col-xl-8 \">\n\t\t\t<div class=\"header-wrapper \">\n\t\t\t\t<div class=\"text-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__title text-heading-l text-md-heading-xl text-lg-heading-xxl text-xl-heading-xxxl m-0\">5 Proven Resiliency Markers of Cyber-Ready Organizations<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\n\t\t<div class=\"carousel-content\">\n\t\t<div class=\"carousel-content__inner indent\">\n\t\t\t<div class=\"glide carousel-wrapper\" data-perview-desktop=\"3.2\" data-perview-tablet=\"1.2\">\n\t\t\t\t<div class=\"glide__track\" data-glide-el=\"track\">\n\t\t\t\t\t<div class=\"glide__slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-analyst-report-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__analyst-report \" style=\"background-color: #F3F4FA\">\n\t<div class=\"analyst-report__container\">\n          <div class=\"cmvlt-component-card__flex-wrapper\">\n        <div class=\"cmvlt-component-card__image-wrapper \">\n          <img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Cloud-Storage-Warning_Crocus_RGB.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>        <\/div>\n      <\/div>\n    \n          <h3 class=\"cmvlt-component-card__title text-left text-heading-xs text-md-heading-s text-xl-heading-m\"><mark class=\"has-inline-color has-rose-color\"><mark class=\"has-inline-color has-rose-color\">Security tools to enable early warning about risk, including insider risk&nbsp;<\/mark><\/mark><\/h3>\n    \n          <p class=\"cmvlt-component-card__description text-left text-body-s text-md-body-m \">Early warning security tools such as Intrusion Detection Systems and Endpoint Detection and Response proactively identify and mitigate cyber threats before they cause significant damage.<\/p>\n    \n    \n      <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-analyst-report-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__analyst-report \" style=\"background-color: #F3F4FA\">\n\t<div class=\"analyst-report__container\">\n          <div class=\"cmvlt-component-card__flex-wrapper\">\n        <div class=\"cmvlt-component-card__image-wrapper \">\n          <img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Servers_Crocus_RGB.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>        <\/div>\n      <\/div>\n    \n          <h3 class=\"cmvlt-component-card__title text-left text-heading-xs text-md-heading-s text-xl-heading-m\"><mark class=\"has-inline-color has-rose-color\">A known-clean dark site or secondary system in place&nbsp;<\/mark><\/h3>\n    \n          <p class=\"cmvlt-component-card__description text-left text-body-s text-md-body-m \">An isolated recovery environment can be quickly activated to maintain business continuity and data integrity during a cyber attack, enhancing cyber resiliency and minimizing downtime.<\/p>\n    \n    \n      <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-analyst-report-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__analyst-report \" style=\"background-color: #F3F4FA\">\n\t<div class=\"analyst-report__container\">\n          <div class=\"cmvlt-component-card__flex-wrapper\">\n        <div class=\"cmvlt-component-card__image-wrapper \">\n          <img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Secure-Data-Storage_Crocus_RGB-1.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>        <\/div>\n      <\/div>\n    \n          <h3 class=\"cmvlt-component-card__title text-left text-heading-xs text-md-heading-s text-xl-heading-m\"><mark class=\"has-inline-color has-rose-color\">An isolated environment to store an immutable copy of the data&nbsp;<\/mark><\/h3>\n    \n          <p class=\"cmvlt-component-card__description text-left text-body-s text-md-body-m \">Maintaining an air-gapped, immutable copy of data behind a third party&rsquo;s infrastructure ensures it remains unchanged and secure from cyber threats like ransomware, enhancing data integrity and providing a reliable recovery option.<\/p>\n    \n    \n      <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-analyst-report-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__analyst-report \" style=\"background-color: #F3F4FA\">\n\t<div class=\"analyst-report__container\">\n          <div class=\"cmvlt-component-card__flex-wrapper\">\n        <div class=\"cmvlt-component-card__image-wrapper \">\n          <img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Business-Downtime_Crocus_RGB.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>        <\/div>\n      <\/div>\n    \n          <h3 class=\"cmvlt-component-card__title text-left text-heading-xs text-md-heading-s text-xl-heading-m\"><mark class=\"has-inline-color has-rose-color\">Defined runbooks, roles, and processes for incident response&nbsp;<\/mark><\/h3>\n    \n          <p class=\"cmvlt-component-card__description text-left text-body-s text-md-body-m \">Tested runbooks offer structured, step-by-step instructions and clearly defined roles to efficiently handle cyber incidents, speeding recovery and maintaining operational continuity.<\/p>\n    \n    \n      <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-analyst-report-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__analyst-report \" style=\"background-color: #F3F4FA\">\n\t<div class=\"analyst-report__container\">\n          <div class=\"cmvlt-component-card__flex-wrapper\">\n        <div class=\"cmvlt-component-card__image-wrapper \">\n          <img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Azure-Subscription_Crocus_RGB.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>        <\/div>\n      <\/div>\n    \n          <h3 class=\"cmvlt-component-card__title text-left text-heading-xs text-md-heading-s text-xl-heading-m\"><mark class=\"has-inline-color has-rose-color\">Specific measures to show cyber recovery readiness and risk&nbsp;<\/mark><\/h3>\n    \n          <p class=\"cmvlt-component-card__description text-left text-body-s text-md-body-m \">Metrics and tests, including regular recovery drills and risk assessments, assess recovery capabilities from cyber incidents, validate recovery strategies, and highlight areas for improvement.<\/p>\n    \n    \n      <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"carousel-footer bullets\">\n\t\t\t\t\t<div data-glide-el=\"controls\" class=\"carousel-controls\">\n\t\t\t\t\t\t<button class=\"carousel-control prev\" data-glide-dir='<' aria-label=\"Previous\">\n\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M0.799999 20C0.799999 30.6039 9.39613 39.2 20 39.2C30.6039 39.2 39.2 30.6039 39.2 20C39.2 9.39613 30.6039 0.8 20 0.8C9.39613 0.8 0.799999 9.39613 0.799999 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<path d=\"M20.0002 14.168L14.1668 20.0013M14.1668 20.0013L20.0002 25.8346M14.1668 20.0013H25.8335\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"carousel-control next\" data-glide-dir=\"&gt;\" aria-label=\"Next\">\n\t\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t\t<path d=\"M39.2 20C39.2 30.6039 30.6039 39.2 20 39.2C9.39613 39.2 0.8 30.6039 0.8 20C0.8 9.39613 9.39613 0.8 20 0.8C30.6039 0.8 39.2 9.39613 39.2 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t\t<path d=\"M19.9998 14.168L25.8332 20.0013M25.8332 20.0013L19.9998 25.8346M25.8332 20.0013H14.1665\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"glide__bullets\" data-glide-el=\"controls[nav]\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=0\" aria-label=\"Slide-0\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=1\" aria-label=\"Slide-1\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=2\" aria-label=\"Slide-2\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=3\" aria-label=\"Slide-3\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=4\" aria-label=\"Slide-4\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\n\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\" id=\"get-report\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading eyebrow text-eyebrow-s text-md-eyebrow-m mb-6 mb-md-10\" id=\"h-cyber-recovery-readiness\">Cyber Recovery Readiness<\/h5>\n\n\n\n<h2 class=\"wp-block-heading section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl  mb-6\" id=\"h-download-the-2024-cyber-recovery-readiness-report\">Download the 2024 Cyber Recovery Readiness Report&nbsp;<\/h2>\n\n\n\n<p class=\"\">Your ability to rapidly recover data after an attack is only as good as your cyber resilience strategy. And with<strong> 83% of companies<\/strong> experiencing a significant breach, the need for a robust cyber recovery strategy has never been more critical.&nbsp;<\/p>\n\n\n\n<p class=\"\">Commvault and GigaOm recently surveyed 1,000 security and IT leaders across the globe &#8211; including those who have survived the trenches of a breach &#8211; to understand&nbsp;how organizations remain resilient through the chaos and damage of cyberattacks. &nbsp;<\/p>\n\n\n\n<p class=\"\">Learn the 5 things that separate readiness from resilience, what works, what doesn\u2019t, and what you need to do in the Cyber Recovery Readiness Report.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<script>\n\twindow.Commvault = window.Commvault || {};\n\tif ( ! window.Commvault.marketo ) {\n\t\twindow.Commvault.marketo = {\n\t\t\tforms: [],\n\t\t\tbaseUrl: '\/\/discover.commvault.com',\n\t\t\trecaptchaKey: '',\n\t\t};\n\t}\n\twindow.Commvault.marketo.forms.push( {\n\t\tformId: 6078,\n\t\tmunchkinId: '097-UGL-749',\n\t\tredirectUrl: 'https:\/\/www.commvault.com\/gc\/thank-you\/cyber-recovery-readiness-report',\n\t\tblockPersonalEmail: false,\n\t\tdriftFastlane: false,\n\t\tdriftFastlaneCampaignId:undefined,\n\t\tdriftFastlaneMobileRedirectUrl: '',\n\t\tdataLayer: {\n\t\t\tformName: '',\n\t\t\tgoalType: ''\n\t\t}\n\t} );\n<\/script>\n\n<div class=\"marketo-form marketo-form--\">\n\t<form id=\"mktoForm_6078\" class=\"mktoForm mktoFormId_6078 track-event-form\" data-goaltype=\"\" data-formname=\"\" form=\"\">\n\t<\/form>\n<\/div>\n\n<script src=\"\/\/discover.commvault.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<script>\n\tMktoForms2.loadForm(\"\/\/discover.commvault.com\", \"097-UGL-749\", 6078, function( form ){\n\t\tvar nameOfTheForm = document.querySelector( '.mktoFormId_6078' ).getAttribute( 'data-formname' );\n\t\tvar goaltypeOfTheForm = document.querySelector( '.mktoFormId_6078' ).getAttribute( 'data-goaltype' );\n\n\t\tform.getFormElem()\n\t\t.find('button.mktoButton')\n\t\t.html('Download now');\n\n\t\tform.onSuccess( function( values, followUpUrl ) {\n\t\t\tvar fieldValues = form.getValues();\n\t\t\tvar qparams = '';\n\t\t\tdataLayer.push({\n\t\t\t\tevent: 'gtm.submit',\n\t\t\t\tgtm:{\n\t\t\t\t\telement:{\n\t\t\t\t\t\tdataset:{\n\t\t\t\t\t\t\tgoaltype:goaltypeOfTheForm,\n\t\t\t\t\t\t\tformname: nameOfTheForm\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} );\n\t\t\t\t\t\t\tlocation.href = \"https:\/\/www.commvault.com\/gc\/thank-you\/cyber-recovery-readiness-report\";\n\t\t\t\treturn false;\n\t\t\t\t\t} );\n\t} );\n<\/script>\n\n<!--clearbit script-->\n<script type=\"text\/javascript\">\n\tvar pollForDefinition = function (scope, varname, callback) {\n\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\treturn callback();\n\t\t}\n\t\tvar interval = setInterval(function () {\n\t\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\t\tclearInterval(interval);\n\t\t\t\tcallback();\n\t\t\t}\n\t\t}, 250);\n\t};\n\tvar script = document.createElement(\"script\");\n\tscript.src = \" https:\/\/marketo.clearbit.com\/assets\/v1\/marketo\/forms.js\";\n\tscript.async = true;\n\tscript.setAttribute(\"data-clearbit-publishable-key\", \"pk_80bd48dbad484efde7bc5fde7c48c59f\");\n\tscript.onerror = function (e) {\n\t\tconsole.log(\"Clearbit Form JS unable to load\");\n\t\tpollForDefinition(window, \"MktoForms2\", function () {\n\t\t\tMktoForms2.whenReady(function (form) {\n\t\t\t\tform.setValues({clearbitFormStatus: \"Clearbit Form JS unable to load\"});\n\t\t\t});\n\t\t});\n\t};\n\tdocument.body.appendChild(script);\n\n<\/script>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-call-to-action\">\n\t<div class=\"call-to-action__header no-top-line\">\n\t\t\t\t\t<p class=\"call-to-action__eyebrow text-eyebrow-m mb-4 mb-lg-10\">Related resources<\/p>\n\t\t\t\t<div class=\"call-to-action__title-row\">\n\t\t\t<div class=\"text-row\">\n\t\t\t\t\t\t\t\t<h4 class=\"call-to-action__title text-heading-l text-lg-heading-xxl text-xl-heading-xxl mb-0\">Explore more readiness resources&nbsp;<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"call-to-action__cards-grid columns-3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__cta wp-block-commvault-v2-call-to-action-card\">\n  <div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"https:\/\/www.commvault.com\/resources\/ebook\/ebook-guide-to-cyber-recovery-preparedness\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-3.png\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-3.png 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-3.png?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-3.png?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">ebook<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Guide to Cyber Recovery Preparedness&nbsp;        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Get step-by-step guidance for using the NIST framework to map your cyber recovery strategy.&nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button scalable-cta-button-double\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/ebook\/ebook-guide-to-cyber-recovery-preparedness\"\n\t\t\taria-label=\"Get your copy\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet your copy\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__cta wp-block-commvault-v2-call-to-action-card\">\n  <div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"https:\/\/discover.commvault.com\/webinar-roadmap-to-compliance-confidence-registration.html\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-34.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-34.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-34.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/Resource_Generic_888x500-34.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">Webinar<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Building Cyber Resilience: A Roadmap to Compliance Confidence&nbsp;        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Join experts in this panel discussion to delve into the complexities of data security standards across the globe.&nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button scalable-cta-button-double\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/discover.commvault.com\/webinar-roadmap-to-compliance-confidence-registration.html\"\n\t\t\taria-label=\"Register now\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRegister now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__cta wp-block-commvault-v2-call-to-action-card\">\n  <div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"\/platform\/cleanroom-recovery\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/CleanroomRecovery_Thumbnail_888x500.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/CleanroomRecovery_Thumbnail_888x500.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/CleanroomRecovery_Thumbnail_888x500.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/CleanroomRecovery_Thumbnail_888x500.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">Capabilities<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Commvault&reg; Cloud Cleanroom&trade; Recovery&nbsp;        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Make reliable cyber recovery testing&#8239;and readiness a reality with Cleanroom Recovery. &nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button scalable-cta-button-double\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/cleanroom-recovery\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Recovery Readiness Download the 2024 Cyber Recovery Readiness Report&nbsp; Your ability to rapidly recover data after an attack is only as good as your cyber resilience strategy. And with 83% of companies experiencing a significant breach, the need for a robust cyber recovery strategy has never been more critical.&nbsp; Commvault and GigaOm recently surveyed [&hellip;]<\/p>\n","protected":false},"author":154,"featured_media":520341,"parent":79331,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":true,"title":"Ready to get started? ","subtitle":"Experience the platform that delivers true cloud cyber resilience. ","cta_text":"Get free trial","cta_link":"https:\/\/www.commvault.com\/free-trial ","background":{"id":0,"url":""},"light_mode":true},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-520274","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2024 Cyber Recovery Readiness Report\u00a0 | Commvault<\/title>\n<meta name=\"description\" content=\"Discover key insights on data security and cyber resilience in the inaugural Cyber Recovery Readiness Report by Commvault and GigaOm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2024 Cyber Recovery Readiness Report\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover key insights on data security and cyber resilience in the inaugural Cyber Recovery Readiness Report by Commvault and GigaOm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T14:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-CyberRecovery_Resource-Thumb_888x500.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"888\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2024 Cyber Recovery Readiness Report\u00a0 | Commvault","description":"Discover key insights on data security and cyber resilience in the inaugural Cyber Recovery Readiness Report by Commvault and GigaOm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","og_locale":"en_US","og_type":"article","og_title":"2024 Cyber Recovery Readiness Report\u00a0","og_description":"Discover key insights on data security and cyber resilience in the inaugural Cyber Recovery Readiness Report by Commvault and GigaOm.","og_url":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-06-27T14:00:18+00:00","og_image":[{"width":888,"height":500,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-CyberRecovery_Resource-Thumb_888x500.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","url":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report","name":"2024 Cyber Recovery Readiness Report\u00a0 | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-CyberRecovery_Resource-Thumb_888x500.jpg?quality=80","datePublished":"2024-06-14T18:45:07+00:00","dateModified":"2024-06-27T14:00:18+00:00","description":"Discover key insights on data security and cyber resilience in the inaugural Cyber Recovery Readiness Report by Commvault and GigaOm.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-CyberRecovery_Resource-Thumb_888x500.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/GigaOm-CyberRecovery_Resource-Thumb_888x500.jpg?quality=80","width":888,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/gc\/cyber-recovery-readiness-report#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Gated Content","item":"https:\/\/www.commvault.com\/gc"},{"@type":"ListItem","position":3,"name":"2024 Cyber Recovery Readiness Report\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/520274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/154"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=520274"}],"version-history":[{"count":4,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/520274\/revisions"}],"predecessor-version":[{"id":520613,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/520274\/revisions\/520613"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/79331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/520341"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=520274"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=520274"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=520274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}