{"id":70562,"date":"2023-03-01T11:00:06","date_gmt":"2023-03-01T16:00:06","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=70562"},"modified":"2024-08-20T09:34:56","modified_gmt":"2024-08-20T13:34:56","slug":"glossary","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/glossary","title":{"rendered":"Glossary"},"content":{"rendered":"<div class=\"alignfull wp-block-commvault-v2-glossary-library\">\n\t<div id=\"glossary-nav-trigger\"><\/div>\n\t<div class=\"glossary-nav\">\n\t\t<div class=\"container\">\n\t\t\t<ul>\n\t\t\t<li><a href=\"#A\">A<\/a><\/li><li><a href=\"#B\">B<\/a><\/li><li><a href=\"#C\">C<\/a><\/li><li><a href=\"#D\">D<\/a><\/li><li><a href=\"#E\">E<\/a><\/li><li><a href=\"#F\">F<\/a><\/li><li><span>G<\/span><\/li><li><a href=\"#H\">H<\/a><\/li><li><a href=\"#I\">I<\/a><\/li><li><span>J<\/span><\/li><li><a href=\"#K\">K<\/a><\/li><li><span>L<\/span><\/li><li><a href=\"#M\">M<\/a><\/li><li><span>N<\/span><\/li><li><a href=\"#O\">O<\/a><\/li><li><span>P<\/span><\/li><li><span>Q<\/span><\/li><li><a href=\"#R\">R<\/a><\/li><li><a href=\"#S\">S<\/a><\/li><li><span>T<\/span><\/li><li><span>U<\/span><\/li><li><a href=\"#V\">V<\/a><\/li><li><span>W<\/span><\/li><li><span>X<\/span><\/li><li><span>Y<\/span><\/li><li><a href=\"#Z\">Z<\/a><\/li>\t\t\t<\/ul>\n\n\t\t\t<div class=\"glossary-selector-wrapper\">\n\t\t\t\tJump to:\t\t\t\t<select name=\"\" id=\"glossary-selector\">\n\t\t\t\t\t<option>A<\/option><option>B<\/option><option>C<\/option><option>D<\/option><option>E<\/option><option>F<\/option><option>G<\/option><option>H<\/option><option>I<\/option><option>J<\/option><option>K<\/option><option>L<\/option><option>M<\/option><option>N<\/option><option>O<\/option><option>P<\/option><option>Q<\/option><option>R<\/option><option>S<\/option><option>T<\/option><option>U<\/option><option>V<\/option><option>W<\/option><option>X<\/option><option>Y<\/option><option>Z<\/option>\t\t\t\t<\/select>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"container\">\n\t\t<div class=\"grid-container\">\n\t\t\t<div class=\"col-12 col-md-9\">\n\t\t\t\t<div class=\"left-sidebar\">\n\t\t\t\t\t<header id='A'><span>A<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Active Directory\u00a0<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It\u2019s essential in managing the identities and relationships that make up a network environment. It provides the foundation for a secure and efficient IT infrastructure for businesses, making it easier to manage users, computers, and other resources.\u00a0<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/active-directory\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Air Gap Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a &#8220;gap&#8221; between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/air-gap-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='B'><span>B<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Backup as a Service (BaaS)<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Backup as a service (BaaS) solutions offer cloud-based data backup and recovery capabilities without the presence of physical, on-premises hardware or appliances to host and run the backup infrastructure.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/backup-as-a-service-baas\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Backup Policy Enterprise Strategy: Set of Rules and Procedures<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">A backup policy is a set of rules and procedures that describe the enterprise\u2019s strategy when making backup copies of data for safekeeping.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/backup-policy\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Business Continuity Disaster Recovery (BCDR)<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">\u201cBusiness Continuity Disaster Recovery\u201d, or \u201cBCDR\u201d for short, is used throughout the IT industry as a benchmark for organization resiliency in the face of unplanned disruptions. \u2018Business Continuity\u2019 refers to an organization\u2019s level of readiness to continue mission-critical operations throughout and after an emergency or disruption. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/business-continuity-disaster-recovery-bcdr\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='C'><span>C<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Cleanroom Recovery<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Cleanroom Recovery is a specialized data recovery process that ensures the secure and reliable retrieval of critical information from damaged storage devices in environments where data contamination poses a significant risk.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-cleanroom-recovery\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Cloud Storage an IT infrastructure deployment<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Cloud storage describes an IT infrastructure deployment model where storage resources reside in the cloud instead of being housed in data centers on-premises.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/cloud-storage\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Containerization<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Containerization is a method of software application deployment that involves packaging an application and its dependencies into a single lightweight container. The container provides a consistent and isolated runtime environment, which allows the application to run reliably and consistently across different computing environments, such as local machines, data centers, or cloud platforms.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-containerization\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Cyber Deception<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/cyber-deception\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Cyber Kill Chain<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='D'><span>D<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Center Consolidation<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data center consolidation is an important strategy for many modern organizations. By combining multiple physical data centers into one or more larger data centers, organizations can save money, improve efficiency, and increase scalability. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-center-consolidation\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Center Migration<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data center migration is the process of moving data and applications from one physical or virtual environment to another. This process can be complex but is necessary to keep up with changing technology and customer demands.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-center-migration\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Deduplication<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data deduplication, also called \u201cdedup\u201d, eliminates duplicate or redundant information in a dataset. In short, dedup is a process that ensures only one copy of data exists in a particular dataset or block.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-deduplication\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Encryption<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-encryption\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Loss Prevention<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data protection is everyone\u2019s job, not just an IT function. Data loss prevention (DLP) is part of a company\u2019s security policy to prevent the loss, leakage, misuse, or access of data by unauthorized parties.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-loss-prevention\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Management as a Service (DMaaS)<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">DMaaS stands for Data Management as a Service. It is a cloud-based service model that allows organizations to outsource their data management tasks and responsibilities to a third-party service provider.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-management-as-a-service-dmaas\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Protection<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Data protection refers to the practices, technologies, and policies that are used to safeguard data against unauthorized access, loss, corruption, and other threats. This includes protecting data at rest (stored data), in transit (data being transferred between systems), and in use (data being accessed by authorized users).<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-data-protection\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Data Retention Policy<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">An organization\u2019s data retention policy is a set of rules that describe the types of data that will be retained by the entity and for how long.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-retention-policy\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Database Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Database backup is the process of creating a copy (backing up) of an organization\u2019s structured data utilized by popular databases such as SAP HANA and Microsoft SQL Server.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/database-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Digital Transformation<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Digital transformation is the process of using digital technologies to fundamentally change how a business operates and delivers value to its customers. It involves using digital technologies to automate processes, improve efficiency, and create new business models, products, and services.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-digital-transformation\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Disaster Recovery<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Disaster recovery (DR) is the process of restoring an organization&#8217;s IT infrastructure and operations after a major disruption or disaster. The goal of disaster recovery is to minimize the impact of a disruptive event and restore normal operations as quickly as possible to minimize the impact on the organization&#8217;s business processes and reputation.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-disaster-recovery\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Distributed File System\u00a0<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">The world of IT and computing has become increasingly complex and distributed, with data stored on multiple servers or devices. To manage this complexity, organizations are turning to Distributed File Systems (DFS) to store, organize, and share data in a secure and efficient manner.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/distributed-file-system\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Dynamic 365 Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Dynamic 365 Backup is simple. It is data backup for Microsoft Dynamics 365, which offers comprehensive coverage for CRM data stored within the platform, such as files, customer records, transactions, behaviors and preferences, as well as order information, inventory and shipping.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/dynamics-365-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='E'><span>E<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">eDiscovery<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Electronic Discovery (eDiscovery) is the process of finding and collecting electronically stored information (or ESI) \u2013 typically for lawsuits, investigation, or legal purposes.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/ediscovery\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Endpoint Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='F'><span>F<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">FedRAMP High Authorization<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">With the escalating frequency of data breaches, concerns regarding cybersecurity have reached new heights, particularly within the Federal government. Despite assumptions about impenetrable security measures, federal agencies remain vulnerable to cyber threats, making them prime targets for malicious actors. The Federal Risk and Authorization Management Program (FedRAMP) serves as a standardized framework aimed at mitigating risks associated with cloud products and services used by federal agencies. This comprehensive guide delves into the intricacies of FedRAMP, including its objectives, development history, compliance categories, certification process, and the benefits of achieving FedRAMP compliance.\u2028<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/fedramp-high-authorization\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">FedRAMP High vs Moderate<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">The Federal Risk and Authorization Management Program (FedRAMP) stands as a critical government-wide initiative aimed at protecting the security of federal data stored in cloud computing environments. This analysis dives into FedRAMP High, providing a comprehensive exploration of its key components. It\u2019s use in cloud environments, implementation challenges, and an intricate comparison with FedRAMP Moderate. Additionally, specific use cases are scrutinized to offer recommendations on when one level proves more suitable than the other.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/fedramp-high-vs-moderate\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">File and Object Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">File and object backup solutions offer data protection for two different unstructured data types: object storage and file systems. First, object storage is a computer data storage architecture that manages data as objects, unlike file systems that contain data in a file hierarchy.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/file-and-object-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='H'><span>H<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Hybrid Cloud<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Hybrid cloud is IT architecture that combines at least one private cloud, also known as an on-premises data center, with one or more public cloud services.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/hybrid-cloud\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Hyper-Converged Infrastructure<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Hyper-converged infrastructure (HCI) is a type of software-defined infrastructure that integrates computing, storage, and networking components into a single system. HCI aims to simplify data center management and reduce the complexity of traditional IT infrastructure.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/what-is-hyper-converged-infrastructure\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='I'><span>I<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">IaaS, PaaS, and SaaS<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">IaaS PaaS and SaaS in the ever-evolving world of technology, cloud computing is revolutionizing how businesses operate and innovate. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/iaas-paas-and-saas\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='K'><span>K<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Kubernetes backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Kubernetes backup is the process of backing up the components running in a Kubernetes orchestration platform, that is an abstraction layer for containerized applications and services. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/kubernetes-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='M'><span>M<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Microsoft 365 Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Microsoft 365 (sometimes referred to as O365) is a popular SaaS (solution-as-a-service) offering for today\u2019s businesses. With Microsoft 365, end users and organizations get a robust suite of productivity tools, which include Exchange Online, OneDrive for Business, SharePoint Online, and Microsoft Teams among others.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/microsoft-365-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='O'><span>O<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">On-premise, Cloud, and Hybrid<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">When it comes to choosing the right technology solution for your business, understanding the key differences between on-premises, cloud, and hybrid solutions is essential.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/on-premises-cloud-and-hybrid\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='R'><span>R<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Ransomware Protection<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Ransomware protection is the process of preventing the occurrence of a ransomware event, and\/or mitigating the risk of a successful attack. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/ransomware-protection\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">RTO (Recovery Time Objective) and RPO (Recovery Point Objective)<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">RTO (Recovery Time Objective) and RPO (Recovery Point Objective) are two important metrics used in disaster recovery and business continuity planning.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/rto-rpo\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='S'><span>S<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">SaaS Data Protection<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">SaaS data protection offers organizations tools to manage and safeguard critical SaaS apps, endpoints, and hybrid cloud environments from data loss threats such as corruption, accidental deletion, and malicious attack. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/saas-data-protection\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Salesforce Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Salesforce backup and recovery offers automated data protection for content, files, objects, metadata relationships, and more living in Salesforce production organizations and sandbox environments.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/salesforce-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='V'><span>V<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Virtual Machine Backup<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Virtual machine backup (VM backup) is the process of backing up the virtual machines (VMs) running in an enterprise environment. <\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/vm-backup\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">VMware Data Recovery\u00a0<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">VMware Data Recovery is designed specifically for VMware virtualized environments and enables organizations to protect and recover their virtual machines (VMs) and data efficiently and reliably.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/vmware-data-recovery\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Vulnerability Network Scanning<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Vulnerability network scanning is an invaluable tool for keeping networks safe from malicious actors. It is a process that involves the scanning of a network for security weaknesses or vulnerabilities, and it can be done either manually or with automated software.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/vulnerability-network-scanning\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n<header id='Z'><span>Z<\/span><\/header><div class=\"glossary-item\">\n\t<h3 class=\"glossary-item__title text-heading-s text-md-heading-m text-lg-heading-l\">Zero Trust Security<\/h3>\n\t<p class=\"glossary-item__description text-lg-body-m text-body-s\">Zero Trust Security is a security approach that assumes that all user activity on a network or system is untrusted, even from users who have already been authenticated.<\/p>\n\t<div class=\"is-style-text wp-block-commvault-v2-custom-button\">\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium\" href=\"https:\/\/www.commvault.com\/glossary-library\/zero-trust-security\">\n\t\t\t<span class=\"font-medium\">Read more<\/span>\n\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"><\/path>\n\t\t\t<\/svg>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"col-12 col-md-3\">\n\t\t\t\t\n\n<div class=\"stickycontent\">\n\t<div class=\"content\">\n\t\t\n<div class=\"alignfull wp-block-commvault-v2-free-trial-glossary\" id=\"free-trial-glossary\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12\">\n\t\t\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tFree SAAS Trial\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\t<strong>Get Started with Cloud-Delivered Data Protection Today!<\/strong><br>Try enterprise-grade SaaS data protection with the simplicity of the cloud free for 30-days.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\">\n\n\t\n\t\t<a class=\"cmvlt-2-custom-button btn-md text-body-l font-medium \" href=\"https:\/\/www.commvault.com\/free-trial\" aria-label=\"Try Now\" target=\"_self\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tTry Now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading heading__quick-links\" id=\"h-quick-links\">Quick Links<\/h4>\n\n\n\n<ul class=\"wp-block-list list__free-trial\">\n<li class=\"\"><a href=\"\/resources\" target=\"_blank\" rel=\"noreferrer noopener\">All Resources<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"\/customers\" target=\"_blank\" rel=\"noreferrer noopener\">Case Studies<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"\/supported-technologies\" target=\"_blank\" rel=\"noreferrer noopener\">Supported Tech<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"\/webinars-and-events\" target=\"_blank\" rel=\"noreferrer noopener\">Webinars &amp; Events<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"\/services\" target=\"_blank\" rel=\"noreferrer noopener\">Training &amp; Education<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":145,"featured_media":504712,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"@media (min-width: 768px) {\n.wp-block-glossary-nav {\nwidth: calc(100vw + 20%);\n}\n}","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":true,"title":"Take the first step","subtitle":"See what a world-class data services platform can do for your business.","cta_text":"Get a demo","cta_link":"https:\/\/commvault.com\/request-demo","background":{"id":73962,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/06\/GradientSectionBackground-04-1-1.jpg?quality=80"}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-70562","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Glossary | Commvault<\/title>\n<meta name=\"description\" content=\"The Commvault Glossary Center explains the industry\u2019s most cutting-edge terms for on-prem, SaaS, and hybrid data protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/glossary\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Glossary\" \/>\n<meta property=\"og:description\" content=\"The Commvault Glossary Center explains the industry\u2019s most cutting-edge terms for on-prem, SaaS, and hybrid data protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/glossary\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T13:34:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/MicrosoftTeams-image-45.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Glossary | Commvault","description":"The Commvault Glossary Center explains the industry\u2019s most cutting-edge terms for on-prem, SaaS, and hybrid data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/glossary","og_locale":"en_US","og_type":"article","og_title":"Glossary","og_description":"The Commvault Glossary Center explains the industry\u2019s most cutting-edge terms for on-prem, SaaS, and hybrid data protection.","og_url":"https:\/\/www.commvault.com\/glossary","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-08-20T13:34:56+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/MicrosoftTeams-image-45.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/glossary","url":"https:\/\/www.commvault.com\/glossary","name":"Glossary | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/glossary#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/glossary#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/MicrosoftTeams-image-45.jpg?quality=80","datePublished":"2023-03-01T16:00:06+00:00","dateModified":"2024-08-20T13:34:56+00:00","description":"The Commvault Glossary Center explains the industry\u2019s most cutting-edge terms for on-prem, SaaS, and hybrid data protection.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/glossary#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/glossary"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/glossary#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/MicrosoftTeams-image-45.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/MicrosoftTeams-image-45.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/glossary#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Glossary"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/70562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=70562"}],"version-history":[{"count":65,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/70562\/revisions"}],"predecessor-version":[{"id":524076,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/70562\/revisions\/524076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/504712"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=70562"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=70562"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=70562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}