{"id":522815,"date":"2024-07-24T12:32:56","date_gmt":"2024-07-24T16:32:56","guid":{"rendered":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics"},"modified":"2024-08-21T11:42:23","modified_gmt":"2024-08-21T15:42:23","slug":"cisco-secure-malware-analytics","status":"publish","type":"cmv_supported-tech","link":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics","title":{"rendered":"Cisco Secure Malware Analytics"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><a href=\"https:\/\/www.commvault.com\/supported-technologies\/cisco\">Cisco<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Cisco Secure Malware Analytics<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tCisco Secure Malware Analytics\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tCommvault and Cisco deliver advanced threat intelligence and malware analysis, helping your organization stay ahead of evolving threats.&nbsp;&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/request-demo\"\n\t\t\taria-label=\"Request demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRequest demo\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"http:\/\/Commvault.com\/contact-us\"\n\t\t\taria-label=\"Contact us\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tContact us\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Threat-Grid_Hero_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Threat-Grid_Hero_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Threat-Grid_Hero_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n\n\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-8 offset-lg-2 text-center heading__double__side__image\">\n\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\t\tTop Benefits\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<h2 class=\"text-heading-l text-md-heading-xl text-lg-heading-xxl section_title\">\n\t\t\t\t\t\t\tAccelerate <mark class=\"has-inline-color has-crocus-color\">threat detection<\/mark> and respond with intelligence\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<p class=\"description text-body-m text-lg-body-l\">\n\t\t\t\t\t\tDetect threats faster with unique cyber deception, then analyze them to quickly deliver a targeted response.&nbsp;\t\t\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order2\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tIdentify threats before data is compromised\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tUncover cyberthreats the moment they begin and minimize spread with patented cyber deception technology.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order1 offset-md-1\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Identify-Threats_1088x870.jpg?quality=80\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Identify-Threats_1088x870.jpg 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Identify-Threats_1088x870.jpg?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Identify-Threats_1088x870.jpg?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tAnalyze malware to gauge impact\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tGain a comprehensive analysis of file behavior against large malware samples, offering a view of the global and historical threat it poses to your organization.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?quality=80\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Analyze-Malware_1088x870.jpg 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Analyze-Malware_1088x870.jpg?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order2\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tPrioritize threats and coordinate response\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tPrioritize attacks efficiently and coordinate a cross-organization response, including advanced cyber recovery capabilities.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order1 offset-md-1\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Prioritze-Threats_1088x870.jpg?quality=80\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Prioritze-Threats_1088x870.jpg 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Prioritze-Threats_1088x870.jpg?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/Cisco-Benefit_Prioritze-Threats_1088x870.jpg?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"alignfull show-cta is-style-default wp-block-commvault-v2-card-grid\">\n\t<div class=\"content container\">\n\t\t<div class=\"header\">\n\t\t\t<div class=\"header-text-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"title text-heading-m text-md-heading-l text-lg-heading-xl\">\n\t\t\t\t\t\tRelated capabilities\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"description text-body-m text-lg-body-l\">Learn more about our platform capabilities.<\/p>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"buttons-container\">\n\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/capabilities-a-to-z\"\n\t\t\taria-label=\"View all capabilities \"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tView all capabilities \t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#\"\n\t\t\taria-label=\"Read More\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"grid columns-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__resource wp-block-commvault-v2-resource-card\">\n\t<div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"https:\/\/www.commvault.com\/platform\/cleanroom-recovery\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-cleanroom_830170.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-cleanroom_830170.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-cleanroom_830170.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-cleanroom_830170.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">capability<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Cleanroom Recovery        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Cleanroom Recovery combines unique capabilities to identify and deliver a safe, clean recovery to a cleanroom in the cloud.&nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/cleanroom-recovery\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__resource wp-block-commvault-v2-resource-card\">\n\t<div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"\/platform\/backup-and-recovery\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-backup-recovery_011c04.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-backup-recovery_011c04.jpg 889w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-backup-recovery_011c04.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-backup-recovery_011c04.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">capability<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Backup &amp; Recovery        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Commvault Cloud Backup &amp; Recovery delivers resilience and recovery capabilities that provide complete backup and recovery of all workloads across on-premises, at the edge, and in the cloud.&nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/backup-and-recovery\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__resource wp-block-commvault-v2-resource-card\">\n\t<div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"\/platform\/threat-scan\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threat-scan_ee99d3.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threat-scan_ee99d3.jpg 889w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threat-scan_ee99d3.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threat-scan_ee99d3.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">capability<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Threat Scan        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Proactively identify malware threats to avoid reinfection during recovery and quickly recover trusted versions of data.&nbsp;        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/platform\/threat-scan\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__resource wp-block-commvault-v2-resource-card\">\n\t<div class=\"cmvlt-component-card__image-wrapper\">\n    \t\t\t\t\t\t\t<a href=\"https:\/\/www.commvault.com\/platform\/threatwise\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threatwise_f62c2d.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threatwise_f62c2d.jpg 889w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threatwise_f62c2d.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ui-threatwise_f62c2d.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/>\t\t\t\t<\/a>\n\t\t\t\t\t  <\/div>\n  <div class=\"cmvlt-component-card__content\">\n    <div class=\"cmvlt-component-card__text-wrapper\">\n              <h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">CAPABILITY<\/h3>\n\t\t\t              <h4 class=\"cmvlt-component-card__title text-heading-xs text-lg-heading-s text-xl-heading-m\">\n          Threatwise        <\/h4>\n                    <p class=\"cmvlt-component-card__subheading\">\n          Early warning capabilities actively defend your data with fully integrated cyber deception to uncover, contain, and minimize threats when a ransomware attack begins.        <\/p>\n          <\/div>\n          <div class=\"scalable-cta-button\">\n        \n\n<div class=\"is-style-secondary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/threatwise\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"49\" height=\"48\" viewBox=\"0 0 49 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path class=\"circle\" d=\"M47 24C47 36.7025 36.7025 47 24 47C11.2975 47 1 36.7025 1 24C1 11.2975 11.2975 1 24 1C36.7025 1 47 11.2975 47 24Z\" stroke=\"black\" stroke-width=\"2\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"black\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n      <\/div>\n      <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":163,"featured_media":522816,"parent":53321,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":true,"title":" Want to see our technology in action? ","subtitle":"Share a few details. A Commvault specialist will follow up with a custom demo. ","cta_text":"Request demo","cta_link":"\/request-demo","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_cmv_custom_url":""},"cmv_integrations":[1121,1561],"cmv_providers":[1562],"class_list":{"0":"post-522815","1":"cmv_supported-tech","2":"type-cmv_supported-tech","3":"status-publish","4":"has-post-thumbnail","6":"cmv_integrations-security","7":"cmv_integrations-threat-detection-response-for-cisco","8":"cmv_providers-cisco","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cisco Secure Malware Analytics | Supported Technology | Commvault<\/title>\n<meta name=\"description\" content=\"Discover how Commvault and Cisco are revolutionizing cybersecurity with advanced threat intelligence and malware analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Secure Malware Analytics\" \/>\n<meta property=\"og:description\" content=\"Discover how Commvault and Cisco are revolutionizing cybersecurity with advanced threat intelligence and malware analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T15:42:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco Secure Malware Analytics | Supported Technology | Commvault","description":"Discover how Commvault and Cisco are revolutionizing cybersecurity with advanced threat intelligence and malware analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics","og_locale":"en_US","og_type":"article","og_title":"Cisco Secure Malware Analytics","og_description":"Discover how Commvault and Cisco are revolutionizing cybersecurity with advanced threat intelligence and malware analysis.","og_url":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-08-21T15:42:23+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics","url":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics","name":"Cisco Secure Malware Analytics | Supported Technology | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/PartnerCisco-ColorFull-Color.svg","datePublished":"2024-07-24T16:32:56+00:00","dateModified":"2024-08-21T15:42:23+00:00","description":"Discover how Commvault and Cisco are revolutionizing cybersecurity with advanced threat intelligence and malware analysis.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/PartnerCisco-ColorFull-Color.svg","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/PartnerCisco-ColorFull-Color.svg","width":320,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/supported-technologies\/cisco\/cisco-secure-malware-analytics#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Cisco","item":"https:\/\/www.commvault.com\/supported-technologies\/cisco"},{"@type":"ListItem","position":3,"name":"Cisco Secure Malware Analytics"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_supported-tech\/522815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_supported-tech"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_supported-tech"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/163"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_supported-tech\/53321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/522816"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=522815"}],"wp:term":[{"taxonomy":"cmv_integrations","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_integrations?post=522815"},{"taxonomy":"cmv_providers","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_providers?post=522815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}