{"id":81278,"date":"2023-10-20T15:03:51","date_gmt":"2023-10-20T19:03:51","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=81278"},"modified":"2023-11-21T07:47:04","modified_gmt":"2023-11-21T12:47:04","slug":"idc-whitepaper-the-cyber-resilient-organization","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization","title":{"rendered":"The Cyber-Resilient Organization: Maximum Preparedness with Bulletproof Recovery"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tThe Cyber-Resilient Organization: Maximum Preparedness with Bulletproof Recovery\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tEnhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#form_whitepaper\"\n\t\t\taria-label=\"Download whitepaper\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tDownload whitepaper\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/CVLT_Campaign_Compete-Hero_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"A man gazes out the window against a pink backdrop, lost in thought.\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/CVLT_Campaign_Compete-Hero_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/CVLT_Campaign_Compete-Hero_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"\">It\u2019s the biggest threat companies face today: AI-driven ransomware and cyberattacks that hold companies hostage and even attack backups. It takes AI to fight AI, and this IDC whitepaper will show you how you can use to enhance detection, accelerate response times, and become more cyber resilient across your business.&nbsp;<\/p>\n\n\n\n<p class=\"\">This involves not only establishing defenses but also adopting a proactive and robust approach to preparedness and recovery.&nbsp;<\/p>\n\n\n\n<p class=\"\">IDC conducted a survey of over 500 IT and security professionals to gather insights on cyber resilience. Their findings, based on input from knowledgeable IT and security executives, have been condensed into a white paper that outlines key considerations and best practices for preparing and recovering from threats.<\/p>\n\n\n\n<p class=\"section__description text-body-s text-md-body-m text-lg-body-l\">Download the in-depth white paper to discover:<\/p>\n\n\n\n<ul class=\"is-style-numbered-large wp-block-list\">\n<li class=\"section__description text-body-s text-md-body-m text-lg-body-l\">How organizations are approaching cyber-resilience across ITOps and SecOps<\/li>\n\n\n\n<li class=\"section__description text-body-s text-md-body-m text-lg-body-l\">Common gaps in cyber-response strategies<\/li>\n\n\n\n<li class=\"section__description text-body-s text-md-body-m text-lg-body-l\">Best practices from senior IT and security professionals across the globe<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-medium is-resized is-style-rounded\"><img decoding=\"async\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/10\/Phil_Circle.png\" alt=\"\" class=\"wp-image-83346\" style=\"object-fit:cover;width:179px;height:174px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"\">       <strong>Author<\/strong><br>       Phil Goodwin,<br>       Research Vice President, Infrastructure          systems, Platforms and Technologies Group, IDC<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" id=\"form_whitepaper\">\n<h4 class=\"wp-block-heading has-text-align-center section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mb-6\">Download<strong> <\/strong>the IDC whitepaper<\/h4>\n\n\n\n<script>\n\twindow.Commvault = window.Commvault || {};\n\tif ( ! window.Commvault.marketo ) {\n\t\twindow.Commvault.marketo = {\n\t\t\tforms: [],\n\t\t\tbaseUrl: '\/\/discover.commvault.com',\n\t\t\trecaptchaKey: '',\n\t\t};\n\t}\n\twindow.Commvault.marketo.forms.push( {\n\t\tformId: 6078,\n\t\tmunchkinId: '097-UGL-749',\n\t\tredirectUrl: 'https:\/\/commvault.com\/gc\/thank-you\/idc-whitepaper-the-cyber-resilient-organization',\n\t\tblockPersonalEmail: false,\n\t\tdriftFastlane: false,\n\t\tdriftFastlaneCampaignId:undefined,\n\t\tdriftFastlaneMobileRedirectUrl: '',\n\t\tdataLayer: {\n\t\t\tformName: '',\n\t\t\tgoalType: ''\n\t\t}\n\t} );\n<\/script>\n\n<div class=\"marketo-form marketo-form--\">\n\t<form id=\"mktoForm_6078\" class=\"mktoForm mktoFormId_6078 track-event-form\" data-goaltype=\"\" data-formname=\"\" form=\"\">\n\t<\/form>\n<\/div>\n\n<script src=\"\/\/discover.commvault.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<script>\n\tMktoForms2.loadForm(\"\/\/discover.commvault.com\", \"097-UGL-749\", 6078, function( form ){\n\t\tvar nameOfTheForm = document.querySelector( '.mktoFormId_6078' ).getAttribute( 'data-formname' );\n\t\tvar goaltypeOfTheForm = document.querySelector( '.mktoFormId_6078' ).getAttribute( 'data-goaltype' );\n\n\t\tform.getFormElem()\n\t\t.find('button.mktoButton')\n\t\t.html('Download now');\n\n\t\tform.onSuccess( function( values, followUpUrl ) {\n\t\t\tvar fieldValues = form.getValues();\n\t\t\tvar qparams = '';\n\t\t\tdataLayer.push({\n\t\t\t\tevent: 'gtm.submit',\n\t\t\t\tgtm:{\n\t\t\t\t\telement:{\n\t\t\t\t\t\tdataset:{\n\t\t\t\t\t\t\tgoaltype:goaltypeOfTheForm,\n\t\t\t\t\t\t\tformname: nameOfTheForm\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} );\n\t\t\t\t\t\t\tlocation.href = \"https:\/\/commvault.com\/gc\/thank-you\/idc-whitepaper-the-cyber-resilient-organization\";\n\t\t\t\treturn false;\n\t\t\t\t\t} );\n\t} );\n<\/script>\n\n<!--clearbit script-->\n<script type=\"text\/javascript\">\n\tvar pollForDefinition = function (scope, varname, callback) {\n\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\treturn callback();\n\t\t}\n\t\tvar interval = setInterval(function () {\n\t\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\t\tclearInterval(interval);\n\t\t\t\tcallback();\n\t\t\t}\n\t\t}, 250);\n\t};\n\tvar script = document.createElement(\"script\");\n\tscript.src = \" https:\/\/marketo.clearbit.com\/assets\/v1\/marketo\/forms.js\";\n\tscript.async = true;\n\tscript.setAttribute(\"data-clearbit-publishable-key\", \"pk_80bd48dbad484efde7bc5fde7c48c59f\");\n\tscript.onerror = function (e) {\n\t\tconsole.log(\"Clearbit Form JS unable to load\");\n\t\tpollForDefinition(window, \"MktoForms2\", function () {\n\t\t\tMktoForms2.whenReady(function (form) {\n\t\t\t\tform.setValues({clearbitFormStatus: \"Clearbit Form JS unable to load\"});\n\t\t\t});\n\t\t});\n\t};\n\tdocument.body.appendChild(script);\n\n<\/script>\n\t<\/div>\n<\/div>\n\n\n\n<div style=\"height:5rem\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s the biggest threat companies face today: AI-driven ransomware and cyberattacks that hold companies hostage and even attack backups. It takes AI to fight AI, and this IDC whitepaper will show you how you can use to enhance detection, accelerate response times, and become more cyber resilient across your business.&nbsp; This involves not only establishing [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":497598,"parent":79331,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-81278","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Cyber Resilient IDC Whitepaper | Commvault<\/title>\n<meta name=\"description\" content=\"Enhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cyber-Resilient Organization: Maximum Preparedness with Bulletproof Recovery\" \/>\n<meta property=\"og:description\" content=\"Enhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-21T12:47:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Cyber Resilient IDC Whitepaper | Commvault","description":"Enhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization","og_locale":"en_US","og_type":"article","og_title":"The Cyber-Resilient Organization: Maximum Preparedness with Bulletproof Recovery","og_description":"Enhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.","og_url":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2023-11-21T12:47:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization","url":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization","name":"The Cyber Resilient IDC Whitepaper | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","datePublished":"2023-10-20T19:03:51+00:00","dateModified":"2023-11-21T12:47:04+00:00","description":"Enhance your organization\u2019s cyber resilience posture with insights from senior IT and security professionals across the globe.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/gc\/idc-whitepaper-the-cyber-resilient-organization#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Gated Content","item":"https:\/\/www.commvault.com\/gc"},{"@type":"ListItem","position":3,"name":"The Cyber-Resilient Organization: Maximum Preparedness with Bulletproof Recovery"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/81278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=81278"}],"version-history":[{"count":17,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/81278\/revisions"}],"predecessor-version":[{"id":518573,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/81278\/revisions\/518573"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/79331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/497598"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=81278"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=81278"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=81278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}