Improved Security and Protection with Cohesity Data Cloud 70

A data security and management company has recently released version 7.0 of its Cohesity Data Cloud platform. This new version provides customers with improved cyber resilience features to help protect their data from cyberattacks. These features include improved access control, faster ransomware recovery for files and objects, and the ability to reduce the attack surface with AWS GovCloud support. Cohesity 7.0 focuses on a data-centric approach to cyber resilience, which includes data immutability, data isolation, and recovery at scale. According to Chris Kent, VP product and solutions marketing at Cohesity, organizations are facing major challenges when it comes to managing and securing their data across cloud and on-premises, with ransomware and data theft being their biggest concern. Cohesity Data Cloud 7.0 adds an extra layer of protection and recovery for organizations' most important data. It also offers hardened access controls, data lifecycle features, and AWS GovCloud support. Hardened access controls help to make it more difficult for threat actors to tamper with backup data. Split key capabilities require multiple people to authenticate for privileged access to administrative controls, so that no single administrator can issue privileged commands. Cohesity has also improved ransomware recovery for files and objects with Cohesity SmartFiles. Data lifecycle features are designed to reduce the attack surface for data exfiltration, and custom security policies help to secure unstructured data from unauthorized access and attacks. The new release also introduces new capabilities for analyzing and visualizing data utilization on third party NAS systems, and it adds support for AWS GovCloud for target data and metadata protection. Additionally, it offers support for local backup on third-party platforms such as Lenovo SR645, HPE DL360 and DL380, Cisco UCS C220M6 AFC and C240 M6, and Dell 740XD for private cloud deployments. According to Randy Kerns, senior strategist and analyst at Evaluator Group, Cohesity Data Cloud 7.0's split key and KMS auto-failover capabilities are a great way to help customers and partners protect their data from cyberattacks.

This Cyber News was published on www.csoonline.com. Publication date: Wed, 08 Feb 2023 14:02:02 +0000


Cyber News related to Improved Security and Protection with Cohesity Data Cloud 70

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Cohesity partners with NVIDIA to harness the power of generative AI - Cohesity announced a collaboration with NVIDIA to help organizations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. ...
9 months ago Helpnetsecurity.com
Cohesity Extends Collaboration to Strengthen Cyber Resilience With IBM Investment in Cohesity - PRESS RELEASE. SAN JOSE, Calif. - April 11, 2024 - Cohesity today announced a deepening of its cyber resilience collaboration with IBM. The enhanced relationship will accelerate the development of essential cyber resilience capabilities to address ...
8 months ago Darkreading.com
Improved Security and Protection with Cohesity Data Cloud 70 - A data security and management company has recently released version 7.0 of its Cohesity Data Cloud platform. This new version provides customers with improved cyber resilience features to help protect their data from cyberattacks. These features ...
1 year ago Csoonline.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
11 months ago Techtarget.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
1 year ago Techtarget.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
10 months ago Esecurityplanet.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
1 year ago Cybersecurity-insiders.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
6 months ago Esecurityplanet.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
9 months ago Techtarget.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
11 months ago Feeds.dzone.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
10 months ago Securityzap.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
5 months ago Esecurityplanet.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
6 months ago Esecurityplanet.com
Cohesity Research Reveals Most Companies Pay Millions in Ransoms - PRESS RELEASE. SAN JOSE, Calif. - January 30, 2024 - Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals today's pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ...
10 months ago Darkreading.com
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
11 months ago Securityzap.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
8 months ago Techtarget.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
10 months ago Techtarget.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org
Strategies for Securing Student Data in Cloud Services - This article addresses the strategies that educational organizations can employ to ensure the protection and confidentiality of student data in cloud services. Implementing strong access controls is crucial for ensuring the security of student data ...
11 months ago Securityzap.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
7 months ago Crowdstrike.com
Understanding Cloud Workload Protection: Technologies and Best Practices - A cloud workload refers to an application or storage element within a cloud environment, whether it's public, private or hybrid. Each cloud workload uses a cloud's resources, including computation, networking, and storage. Cloud workloads can be as ...
11 months ago Securityboulevard.com
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL CERTIFICATION - The Certified Cloud Security Professional is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand ...
11 months ago Cybersecurity-insiders.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
5 months ago Crowdstrike.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)