{"id":516131,"date":"2024-06-05T16:18:08","date_gmt":"2024-06-05T20:18:08","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&#038;p=516131"},"modified":"2024-06-05T16:18:09","modified_gmt":"2024-06-05T20:18:09","slug":"data-encryption","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/data-encryption","title":{"rendered":"Data Encryption"},"content":{"rendered":"\n<div class=\"alignfull wp-block-commvault-v2-glossary-content\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"table__content\">\n\t\t\t\t<div class=\"js-toc_glossary\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 table__content__mobile hidden-md\">\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-8\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"js-toc-content\">\n\t\t\t\t\t\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"data-encryption-definition\">Definition<\/h2>\n\n\n\n<p class=\"\">Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext. <br><br>Encryption effectively scrambles usable data into a unique, random string of bits \u2013 rendering it undecipherable. <br><br>Decrypting data &nbsp;requires access to a private encryption key, which decodes and unscrambles the encrypted dataset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading shift-cls heading__glossary__content is-style-heading-4\" id=\"what-is-data-encryption\">What is encryption?<\/h2>\n\n\n\n<p class=\"\">Encryption is a security measure that transforms readable data (data in the clear) into an unreadable format using a unique (and private) encryption key. encryption renders business data unreadable and of no value to cybercriminals who do not have access to the key used to encrypt the data. <br><br>Organizations that rely on plaintext format when storing or transmitting data have an increased risk of valuable business data and assets becoming compromised or falling into the wrong hands. Another danger that accompanies data theft is the possibility of public exposure of the victim\u2019s private data.<\/p>\n\n\n\n<p class=\"\">Encryption provides an extra layer of security and helps organizations insulate their data, wherever it lives. Data protection solutions offer advanced encryption for both data at rest and in flight. In addition to encryption, cloud-based solutions can also isolate data copies in air-gapped, immutable locations. This ensures that data backups are unreadable and housed in immutable locations outside an organization\u2019s network \u2013 keeping them out of reach from bad actors.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"how-does-it-work\">What is encryption, and how does it work?<br><\/h2>\n\n\n\n<p class=\"\">On the surface, encryption is a simple approach to a complex problem, and is an essential element in data protection and disaster recovery. Encryption adds a necessary layer of protection by rendering value business information unreadable, unless unlocked with a proper encryption key. Without access to this unique encryption key, unauthorized parties who gain access to data have no way of deciphering or exploiting your data.<\/p>\n\n\n\n<p class=\"\">The main aspects of encryption include,<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\"><strong>Robust security posture<\/strong>. Adopt an edge-to-cloud security posture that protects the edge, the data centers and the cloud properties. Empower IT to monitor the state of the environment\u2019s security, manage access, encrypt data and proactively fight risk of potential attacks.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Encryption.&nbsp;<\/strong>Organizations must establish strict policies for encrypting everything, especially data in flight, data at rest, and when possible, data in use. A unique encryption key is required to scramble data initiating the encryption process. Encryption is not a luxury and is widely available for IT to incorporate in data protection policies. There are two primary types of encryption keys: public and private. Most cloud providers offer rock-solid encryption and key management for the multi-tenant public cloud environments.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Decryption<\/strong>. Using the unique encryption key, one can decrypt data, turning scrambled data back into a readable plaintext format. Encryption and decryption are commonly used in our day to day lives as many applications silently encrypt messages, data, and files without intervention from users.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Key management<\/strong>. Like passwords, encryption keys need to be protected with restricted access. Some solutions maintain and protect encryption as part of their offerings. For solutions that allow customers to bring their own keys (BYOK), key management tools often sophisticated cryptography for safeguarding.<br><br><\/li>\n\n\n\n<li class=\"\">&nbsp;<strong>Prevention.<\/strong>&nbsp;Implement robust, zero-trust access controls and keep all antivirus apps up to date. Companies can avoid most of the potential risks by keeping unauthorized parties out of their environments at the first contact with the network.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Proactive education.&nbsp;<\/strong>Cybercriminals use phishing and social engineering to penetrate the intended targets. Enterprises should routinely train and educate employees on the nature and the dangers of cyberattacks and the vital role they play in protecting valuable digital assets.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group is-style-group-reduced-padding\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-style-group-rounded mt-sm\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns alignfull are-vertically-aligned-center has-eggshell-background-color has-background is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-large is-style-heading-5 has-almost-black-color has-text-color\" id=\"h-want-to-see-data-protection-in-action\">Want to see data protection in action? <\/h2>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" alt=\"\" class=\"wp-image-74628\"\/><\/figure><\/div>\n\n\n<p class=\"has-text-align-left is-style-small has-almost-black-color has-text-color\">See the fully functional, full-service product today, and see how Commvault can serve your needs directly.<\/p>\n\n\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Get a demo\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet a demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"why-is-data-encryption-important\">Why is encryption important?<\/h2>\n\n\n\n<p class=\"\">The number of malicious cyberattacks incidents is on the rise, driven by &nbsp;work from home (\u201cWFM\u201d) and distance learning vulnerabilities. <br><br>Complex user passwords are no longer an effective form of protection and are often hijacked and sold for profit. <br><br>Without proper encryption, companies are more likely than not to fall victim to attacks, lose data and experience business disruptions. With proper data protection and encryption tools, businesses can effectively keep their data secure, recoverable, and out of the wrong hands.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"benefits-of-data-encryption\">Benefits of encryption<\/h2>\n\n\n\n<p class=\"\">Digital data and applications are the drivers of business growth. Protecting business-critical workloads data against potential loss or theft is vital for business survival. Encryption is a staple when combatting cyberthreats and plays a significant role data protection, including:<\/p>\n\n\n\n<p class=\"\"><strong>Mitigating attacks.<\/strong>&nbsp;Encryption\u2019s primary goal is to prevent unauthorized parties from accessing proprietary data. Encrypted data is of no value to cybercriminals seeking to sell or publicly expose the stolen data \u2013 as it cannot be read, exploited or monetized. Without access to unique and private access keys, valuable business data is unreadable, and acts as a deterrent for cybercriminals.<\/p>\n\n\n\n<p class=\"\"><strong>Diminishing risk<\/strong>. Solutions with rigorous Encryption capabilities remove the prospect of negative exposure. While Encryption helps thwart the attempts of bad actors, it also narrows the window of liability when maintaining, managing, and storing sensitive information and data.<\/p>\n\n\n\n<p class=\"\"><strong>Lowering costs.<\/strong>&nbsp;The cost of protection pales compared to the costs of a business shutdown and potential customer data loss. Businesses should err on the side of proactive safety and adopt data protection solutions with robust encryption policies, regardless of their storage destination.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"common-use-cases-for-data-encryption\">Common use cases for encryption<\/h2>\n\n\n\n<p class=\"\">Organizations of all sizes need data protection. Encryption plays a vital role in these solutions and go a long way in securing business data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\"><strong>Data protection<\/strong>. Without proper protection, data remains susceptible to potential loss and corruption. Encryption preserves the integrity of your data and usable backup copies that you alone can access with your protected encryption keys.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Business continuity<\/strong>. With encryption software, businesses can protect all of their data and configurations needed to bring business back to life following unpredictable disruptions. Encrypted data is of no use to cybercriminals and may serve as a deterrent against future attacks.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Disaster recovery<\/strong>. It is accepted that all businesses and IT environments may face disruptive encryption events that could cause data loss, corruption, or disrupted IT operations. Putting a robust encryption strategy in place reduces the risks associated with ill-intended cyberthreats and data theft.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"does-metallic-offer-data-encryption\">Does Commvault offer encryption?<\/h2>\n\n\n\n<p class=\"\">Yes! Commvault SaaS Backup offers integrated encryption of data in flight and data at rest. Whether data is stored on user devices, in SaaS applications, or across on-premises and cloud environments, we provides comprehensive coverage to safeguard your data from today\u2019s data loss threats. <a href=\"\/request-demo\">Get a demo<\/a> today to learn more!<\/p>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"alignfull wp-block-commvault-v2-free-trial-glossary\" id=\"free-trial-glossary\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12\">\n\t\t\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tFoundational Security: Rock-Solid Data Protection\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tSafeguard data across all workloads using encryption, application hardening, zero trust principles, and more.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/blogs\/predictions-digital-transformation-modernization\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\t2023 Top 10 Data Privacy and Protection Priorities\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tStart by creating a Privacy, Backup &amp; Recovery, and Disaster Recovery plan as part of an overall data protection strategy.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/blogs\/top-10-data-privacy-and-protection-priorities\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading heading__quick-links\" id=\"h-quick-links\">Quick Links<\/h4>\n\n\n\n<ul class=\"list__free-trial wp-block-list\">\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/resources\">All Resources<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/customers?cmv_lang=en_US\">Case Studies<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/supported-technologies\">Supported Tech<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/webinars-and-events?cmv_lang=en_US\">Webinars &amp; Events<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/services\">Training &amp; Education<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext. <\/p>\n","protected":false},"author":143,"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""}},"class_list":{"0":"post-516131","1":"cmv_glossary","2":"type-cmv_glossary","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Encryption | Knowledge Center | Commvault<\/title>\n<meta name=\"description\" content=\"Data encryption is a type of security process that converts data from plaintext into an encoded, unreadable form called a ciphertext.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/glossary-library\/data-encryption\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Encryption\" \/>\n<meta property=\"og:description\" content=\"Data encryption is a type of security process that converts data from plaintext into an encoded, unreadable form called a ciphertext.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/glossary-library\/data-encryption\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T20:18:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Encryption | Knowledge Center | Commvault","description":"Data encryption is a type of security process that converts data from plaintext into an encoded, unreadable form called a ciphertext.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/glossary-library\/data-encryption","og_locale":"en_US","og_type":"article","og_title":"Data Encryption","og_description":"Data encryption is a type of security process that converts data from plaintext into an encoded, unreadable form called a ciphertext.","og_url":"https:\/\/www.commvault.com\/glossary-library\/data-encryption","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-06-05T20:18:09+00:00","og_image":[{"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption","url":"https:\/\/www.commvault.com\/glossary-library\/data-encryption","name":"Data Encryption | Knowledge Center | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg","datePublished":"2024-06-05T20:18:08+00:00","dateModified":"2024-06-05T20:18:09+00:00","description":"Data encryption is a type of security process that converts data from plaintext into an encoded, unreadable form called a ciphertext.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/glossary-library\/data-encryption"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/glossary-library\/data-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Data Encryption"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary\/516131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/143"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=516131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}