{"id":527732,"date":"2023-06-07T07:00:00","date_gmt":"2023-06-07T11:00:00","guid":{"rendered":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations"},"modified":"2024-10-11T13:43:30","modified_gmt":"2024-10-11T17:43:30","slug":"data-compliance-and-regulations","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations","title":{"rendered":"Data Compliance and Regulations"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><span>Use Cases<\/span><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Data Compliance and Regulations<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tRegulatory Compliance Made Easier&nbsp;\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tCommvault Cloud assists in your journey toward regulatory compliance around data security, privacy, and resilience.&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/demos\/commvault-cloud-compliance\"\n\t\t\taria-label=\"Watch the demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch the demo\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Use-Cases-Data-Compliance_650x650.png\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Use-Cases-Data-Compliance_650x650.png 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Use-Cases-Data-Compliance_650x650.png?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n<div class=\"alignfull sticky wp-block-commvault-v2-page-navigation\">\n\t<div class=\"custom-container\">\n\t\t<div class=\"nav-wrapper\">\n\t\t\t<div class=\"left-nav\">\n\t\t\t\t<div class=\"tab-menu\">\n\t\t\t\t\t<span>Data Compliance and Regulations<\/span>\n\t\t\t\t\t<button class=\"toggle\">\n\t\t\t\t\t\t<svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<path d=\"M11 1.5L6 6.5L1 1.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/>\n\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<ul class=\"wp-block-commvault-v2-page-navigation__ul\" aria-label=\"Page navigation\" =\"true\" role=\"navigation\">\n\t\t\t\t\t\t\t\t\t\t\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Why-It-Matters\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Why It Matters<\/span>\n\t<\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Benefits-and-Features\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Benefits<\/span>\n\t<\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Capabilities\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>How It Works<\/span>\n\t<\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#analyst\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Analyst Report<\/span>\n\t<\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Resources\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Resources<\/span>\n\t<\/a>\n<\/li>\n\n\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#FAQ\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>FAQ<\/span>\n\t<\/a>\n<\/li>\n\n\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"right-nav\">\n\t\t\t\t<a href=\"\/free-trial\" class=\"nav-cta\" target=\"_blank\">\n\t\t\t\t\t<span>Get a Free Trial<\/span>\n\t\t\t\t\t<svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M5 1.5L10 6.5M10 6.5L5 11.5M10 6.5H0\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"stats wp-block-commvault-v3-stats-v3\" id=\"Why-It-Matters\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12\">\n\t\t\t\t\n\n<div class=\"aligncenter wp-block-commvault-v3-section-header-v3\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      WHY IT MATTERS&nbsp;    <\/h5>\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      Compliance is more than checkboxes&nbsp;    <\/h2>\n  \n      <p class=\"section__description text-body-s text-md-body-m text-lg-body-l\">\n      More organizations than ever are subject to regulations, rules, and guidance data privacy, protection, resilience, and cyber readiness.&nbsp;    <\/p>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__statistic\">\n\t\t\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t2%\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tup to 2% of global revenue potential penalty for compliance violations under NIS2.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t2.6x&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tis the cost of noncompliance vs. the cost of maintaining or meeting compliance standards.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\t48%&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tof breaches include customer PII, often covered by regulation.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"px-4 col-12 citations__container text-center mt-14 mt-md-5 mt-lg-13\">\n\t\t\t\t\tSource: <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\" target=\"_blank\" rel=\"noreferrer noopener\">European Union Law<\/a><br>Source: Ponemon Institute: The True Cost of Compliance<br>Source: 2024 IBM Cost of Data Breach Report<br>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\n<div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\" id=\"Benefits-and-Features\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\" id=\"Resilience\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tRESILIENCE &amp; RECOVERY&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tSubstantiate IT and security efforts that bolster resilience&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tRecent breaches and business outages have spurred new regulations, like DORA, to help guide cyber resilience efforts. Commvault Cloud can assist you on this journey.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Substantiate-IT-Security-Efforts_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Substantiate-IT-Security-Efforts_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Substantiate-IT-Security-Efforts_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Substantiate-IT-Security-Efforts_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"stats alignfull dark-mode wp-block-commvault-v3-stats-v3\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__statistic\">\n\t\t\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tRisk management for ICT&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tThreat and anomaly detection capabilities and visibility into behaviors make it easy to identify security risks. Integrations with security tools automate incident response.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tCyber incident management &amp; response&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tSpeed up the incident response process by automating countermeasures. Get an audit trail to investigate the incident&rsquo;s cause, impact, and scope for forensics.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tOperational resilience testing&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tOrchestrate full cyber recovery testing with a cleanroom in the cloud or on-premises. Data is restored from an air-gapped, immutable copy that is proactively scanned for malware and threats.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tSupply chain and third-party risk&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tCloud, hypervisor, and data portability to recover data, systems, and infrastructure to a new provider in the event of a failure or breach.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tInformation sharing&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tThreat intelligence is integrated from built-in sources and threat intelligence partners. Insights from Commvault Cloud, including threats, behaviors, and status can be shared via API with other tools.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\" id=\"data-protection\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tDATA PRIVACY &amp; PROTECTION&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tValidate data protection measures&nbsp;&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tData protection regulations, like GDPR, help organizations advance their security initiatives and improve their security posture by&nbsp;<br>providing guidance on how to best handle and secure sensitive data.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Validate-Data-Protection_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Validate-Data-Protection_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Validate-Data-Protection_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Validate-Data-Protection_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"stats wp-block-commvault-v3-stats-v3\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12 reduced-container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__statistic\">\n\t\t\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tDiscover, classify, and protect sensitive data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tEasily understand what kinds of data you have within your environment so you can apply appropriate protection mechanisms. Implement best practices around the security of your data and backups.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tDetect anomalies and threats to sensitive data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tDeploy decoys and traps near sensitive data sets to divert attention and trigger high-fidelity alerts as attackers perform reconnaissance.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tAccountability and audit-ability&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tUnderstand your data and how it&rsquo;s protected, with dashboard views that indicate overall security posture and drill down into controls in place and anomalies in your environment.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tMulti-level access control&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tApply data protection policies for access depending on sensitivity and classification. Commvault Cloud backup environments feature RBAC, 2FA, MPA, and more to secure your data.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tQuickly recover trusted data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tAnalyze backups and automatically quarantine infected, encrypted, or corrupted files so you can quickly recover trusted data versions.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\n<div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\" id=\"Capabilities\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tHow it Works&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tDrive regulatory compliance&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tCommvault Cloud delivers built-in controls and capabilities to assist with compliance&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Drive-Regulatory-Compliance_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Drive-Regulatory-Compliance_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Drive-Regulatory-Compliance_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Use-Cases-Data-Compliance_Benefit_Drive-Regulatory-Compliance_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"stats alignfull dark-mode wp-block-commvault-v3-stats-v3\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12 reduced-container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__statistic\">\n\t\t\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tReduce risk and defend sensitive data&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tAutomatically discover sensitive and regulated data and apply protection policies that prevent inappropriate access or destructive actions.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/risk-analysis\"\n\t\t\taria-label=\"Learn about Risk Analysis&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn about Risk Analysis&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tSee threats sooner &ndash; before data is compromised&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tProactive threat, anomaly detection, and cyber deception provide early warning to risks, threats, and attackers before they find, exfiltrate, or damage sensitive critical data.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/threatwise\"\n\t\t\taria-label=\"Learn about Threatwise&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn about Threatwise&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tHarness cloud-ready resiliency&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tAn on-demand recovery environment for facilitating full cyber recovery testing, forensic analysis and quarantine, and production environment failover in the event of an outage or breach.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/cleanroom-recovery\"\n\t\t\taria-label=\"Learn about Cleanroom Recovery&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn about Cleanroom Recovery&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tKeep backup data clean&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tContinuously scan backup data and VMs for malware to prevent infection or reinfection upon data restoration. Facilitate clean data recovery following an outage or breach.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/threat-scan\"\n\t\t\taria-label=\"Learn about Threat Scan&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn about Threat Scan&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tRapidly recover with integrated cloud storage&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m \">\n\t\t\tSecure, air-gapped, immutable, and indelible storage to fulfill 3-2-1&nbsp; backup, recovery, and resilience requirements. Tamper-proof backups and archiving with multi-layered access controls.&nbsp;\t\t<\/p>\n\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/platform\/air-gap-protect\"\n\t\t\taria-label=\"Learn about Air Gap Protect&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn about Air Gap Protect&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-featured-media\" id=\"analyst\">\n\t<div class=\"\">\n\t\t<div class=\"cmvlt-component-card cmvlt-component-card__resource-item \">\n\t<div class=\"grid-container\">\n\t\t<div class=\"cmvlt-component-card__media col-12 col-md-5\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"825\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image.png\" class=\"cmv-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image.png 1080w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image.png?resize=800,644 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image.png?resize=768,619 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t<\/div>\n\t\t<div class=\"cmvlt-component-card__content col-12 col-md-5 offset-md-6 \">\n\t\t\t<div class=\"cmvlt-component-card__content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m\">Analyst Report&nbsp;<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__title text-heading-l text-xl-heading-xxl\">Commvault leads the way to cyber resilience and continuous business&nbsp;<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__description text-body-m text-lg-body-l\">For the 13th time in a row, Commvault has been named a Leader in the Gartner&reg; Magic Quadrant&trade; for Enterprise Backup and Recovery Software Solutions.&nbsp;&nbsp;<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/gc\/itleaders\"\n\t\t\taria-label=\"Read the report\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead the report\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\n\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-content-carousel\" id=\"testimonials\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"header-cols col-12 col-xl-8 \">\n\t\t\t<div class=\"header-wrapper \">\n\t\t\t\t<div class=\"text-container\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m m-0\">Our Reach<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__title text-heading-l text-md-heading-xl text-lg-heading-xxl text-xl-heading-xxxl m-0\">Supporting more than 100,000 companies<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\t\t<div class=\"gallery\">\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"449\" height=\"235\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/astra-zeneca-case-study.png?w=449\" class=\"cmv-component-card__logos\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\n\t\t<div class=\"carousel-content\">\n\t\t<div class=\"carousel-content__inner indent\">\n\t\t\t<div class=\"glide carousel-wrapper\" data-perview-desktop=\"1.3\" data-perview-tablet=\"1.3\">\n\t\t\t\t<div class=\"glide__track\" data-glide-el=\"track\">\n\t\t\t\t\t<div class=\"glide__slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #E7D5EF\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"32\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Testimonial_Tontect_1cBlack-3.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;Commvault Cloud delivers integrated, zero-trust security for peace of mind. We have complete confidence that our data is safe.&#8221;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Nelson Lam<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">President at Tontec International Limited<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #F3F4FA\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"172\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/power-integrations-logo-1c-black.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;With a long retention strategy, our cloud storage costs were accelerating quickly. Commvault Cloud gave us a way to dramatically lower those costs and keep them predictable, while simultaneously providing us with the data resilience needed to keep our business running.&#8221;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Jacob Gsoedl<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">CIO at Power Integrations<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #C5C7E3\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"296\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/BILTHOVEN-BIOLOGICALS-logo-black.svg\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;With Commvault, we can build a defense mechanism to prevent cyberattacks and enable rapid recovery. With just a few clicks, we can restore a virtual machine or backups after an attack, which is vital in our line of work as a pharmaceutical company with very sensitive data.&rdquo;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Paul Vries<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\"> IT Team Lead at Bilthoven Biologicals<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"carousel-footer bullets\">\n\t\t\t\t\t<div data-glide-el=\"controls\" class=\"carousel-controls\">\n\t\t\t\t\t\t<button class=\"carousel-control prev\" data-glide-dir='<' aria-label=\"Previous\">\n\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M0.799999 20C0.799999 30.6039 9.39613 39.2 20 39.2C30.6039 39.2 39.2 30.6039 39.2 20C39.2 9.39613 30.6039 0.8 20 0.8C9.39613 0.8 0.799999 9.39613 0.799999 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<path d=\"M20.0002 14.168L14.1668 20.0013M14.1668 20.0013L20.0002 25.8346M14.1668 20.0013H25.8335\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"carousel-control next\" data-glide-dir=\"&gt;\" aria-label=\"Next\">\n\t\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t\t<path d=\"M39.2 20C39.2 30.6039 30.6039 39.2 20 39.2C9.39613 39.2 0.8 30.6039 0.8 20C0.8 9.39613 9.39613 0.8 20 0.8C30.6039 0.8 39.2 9.39613 39.2 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t\t<path d=\"M19.9998 14.168L25.8332 20.0013M25.8332 20.0013L19.9998 25.8346M25.8332 20.0013H14.1665\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"glide__bullets\" data-glide-el=\"controls[nav]\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=0\" aria-label=\"Slide-0\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=1\" aria-label=\"Slide-1\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=2\" aria-label=\"Slide-2\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\n\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n\n\n<div class=\"wp-block-commvault-v2-customer-story\" id=\"case-study\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FedRAMP-High_Hero_650x650.png\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FedRAMP-High_Hero_650x650.png 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FedRAMP-High_Hero_650x650.png?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">Case Study&nbsp;<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Federal government agency cuts AWS costs, eases cloud migration<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">A major federal agency shrinks its AWS footprint by hundreds of terabytes, frees an estimated 25% of IT staff time by delegating FOIA requests, reduces the risk of cyberattacks, and automates backup and recovery for less complexity and lower costs.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/case-studies\/case-study-federal-agency\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\n\n\n<div class=\"wp-block-commvault-v3-section-header-v3\" id=\"Resources\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      Resources    <\/h5>\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      Explore more of our compliance-related resources&nbsp;    <\/h2>\n  \n  <\/div>\n\n<div class=\"commvault-v3-custom-buttons-component scalable-cta-button flex-shrink-0\">\n      <div class=\"commvault-v3-button flex-shrink-0 is-style-primary-alt \"\n            >\n\n              <a\n          class=\"cmvlt-2-custom-button btn-md text-body-l font-medium js-open-modal\"\n          href=\"\/resources\"\n          aria-label=\"View all resources\"\n          target=\"_blank\"\n        >\n\n                      <svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n              <path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n              <path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n            <\/svg>\n\n            <span class=\"font-medium\">\n              View all resources            <\/span>\n                  <\/a>\n          <\/div>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n\n<div class=\"wp-block-commvault-v3-masonry-grid\">\n\t\n<div class=\"spacing-none wp-block-commvault-v3-layout-grid\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container \">\n\t\t\t\n<div class=\"col-lg-5 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t\n<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-2.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-2.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-2.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-2.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">solution brief<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Using Commvault Cloud<br>to assist in DORA Compliance<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Learn how using a cyber resilience platform like Commvault Cloud can assist your compliance team with proving operational resilience as outlined by DORA.&nbsp;<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/solution-brief\/using-commvault-cloud-to-assist-in-dora-compliance\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\n<div class=\"col-lg-7 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t\n<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-3.png\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-3.png 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-3.png?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-3.png?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">Solution Brief<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Commvault Cloud GDPR&nbsp;Compliance<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Apply data protection principles and cyber resilience capabilities in Commvault Cloud to help your organization bolster privacy practices outlined by GDPR.&nbsp;<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/solution-brief\/gdpr-compliance\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\n\n<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_Generic_888x500-13.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">solution brief<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Commvault &amp; Microsoft to assist with HIPAA Data&nbsp;<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Learn how your organization can help secure patient data and deliver cyber resilience with Commvault Cloud on Microsoft Azure&nbsp;<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/solution-brief\/secure-patient-data-deliver-cyber-resilience\"\n\t\t\taria-label=\"Read more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<\/div>\n\n\n\n<section style=\"background-color: #f3f4fa;\" class=\"alignfull wp-block-commvault-v3-accordion-v3\" id=\"FAQ\">\n\t<div class=\"container accordion__wrapper\">\n\t\t\t\t\t\n\n<div class=\"aligncenter wp-block-commvault-v3-section-header-v3\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      Frequently Asked Questions&nbsp;    <\/h2>\n  \n      <p class=\"section__description text-body-s text-md-body-m text-lg-body-l\">\n          <\/p>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"0616e843-058f-4ce6-9a07-8924511a1dc6\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tDo any regulations mention backup and recovery capabilities as part of compliance requirements?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">Several laws and regulations consider backup, recovery, and resilience to be crucial parts of a good cyber program. These include the General Data Protection regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standards (PCI DSS), Network and Information Systems 2 Directive (NIS2), New York Cyber Security Law (NYCRR 500), California Consumer Privacy Act (CCPA), and Digital Operational Resilience Act (DORA). We recommend consulting with your compliance and legal teams to determine which may apply to your business.&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"22f3ae65-490a-4cd0-b9b9-2c54e4a5d95d\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhat are some common data protection regulations?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">Some well-known regulations include the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the Health Insurance Portability and Accountability Act (HIPAA).&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"fc3edbc2-5bd8-4056-a1bc-6f83bf1f3ee4\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow can businesses comply with data protection regulations?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">Every organization should consult with attorneys and auditors regarding specific regulations. Still, a good place for a program to start would be to conduct regular assessments and audits of data protection practices, implement and monitor security controls, and enlist the help of IT and security practitioners (on staff or through service providers) to validate that security measures are applied and functioning appropriately. A risk-based approach where organizations weigh regulatory requirements and possible risk of loss in the event of a breach or non-compliance with the effort needed to implement controls can also be advised.&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"17d4a9fa-ba5c-4574-8f38-be41ec5b4fbb\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tAre there regulations or guidance around cyber resilience?\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">The Digital Operational Resilience Act, or DORA, is an EU regulation aimed at banks and financial entities and has been enacted to help set cybersecurity and cyber resilience standards. We have observed many compliance teams using DORA as guidance, regardless of industry, but consult with your legal and compliance teams for appropriate guidance for your organization.&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"68b50d89-bcc8-4d0e-ab6f-0595a9d8f201\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhat can I do to build a good data governance program?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">Begin by understanding the types of data and risks within your organization, paying special attention to sensitive and regulated data. You can then set clear, measurable security objectives that can help mitigate and minimize that risk. From there, you can develop and apply data governance policies around the ownership, handling, and lifecycle of data. This can include things like access controls for people or groups, how data is protected, shared, and backed up, and how to dispose of data once it\u2019s no longer relevant or needed.&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"bba2829f-601f-464e-bdce-561209c7efe8\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhat is eDiscovery in the context of data management?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t\n\n<p class=\"\">E-discovery is identifying, preserving, collecting, processing, reviewing, and producing electronically stored information (ESI) in response to litigation, investigations, or other legal requests. It involves searching for, analyzing, and extracting relevant data from live and backup data sources, and controlling that data to prevent it from being altered or deleted.&nbsp;<\/p>\n\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\t\t\t<\/div>\n<\/section>\n\n\n\n<div class=\"alignfull wp-block-commvault-v2-newsletter-block\" id=\"Free-Trial\">\n\t\t<div class=\"newsletter-container container\">\n\t\t\t\t\t\t\t<div class=\"newsletter-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"1050\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_Dashboard-2.png\" class=\"cmv-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_Dashboard-2.png 842w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_Dashboard-2.png?resize=642,800 642w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/ProductUI_InSitu_Dashboard-2.png?resize=768,958 768w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"newsletter__text-wrapper\">\n\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-eyebrow-m text-md-eyebrow-default\">Ready to get started?&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<div class=\"newsletter__text-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"newsletter-block__title text-heading-l text-lg-heading-xxl mb-0\">Experience Commvault cyber resilience&nbsp;<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-body-m text-lg-body-l\">Sign up for a full-access free trial today!<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/free-trial\"\n\t\t\taria-label=\"Get free trial\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet free trial\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":126,"featured_media":527734,"parent":73585,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"See it in action","subtitle":"Sign up for a 30-minute live demo.","cta_text":"GET STARTED","cta_link":"https:\/\/commvault-new-preprod.go-vip.net\/\/\/request-demo","background":{"id":73632,"url":"https:\/\/commvault-new-preprod.go-vip.net\/\/\/wp-content\/uploads\/2023\/06\/GradientSectionBackground-04-1.jpg?quality=80"}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-527732","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Compliance &amp; Governance | Commvault<\/title>\n<meta name=\"description\" content=\"Cyber resilience efforts are subject to more regulations than ever. Commvault Cloud can assist your organization as you work toward data compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Compliance and Regulations\" \/>\n<meta property=\"og:description\" content=\"Cyber resilience efforts are subject to more regulations than ever. Commvault Cloud can assist your organization as you work toward data compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T17:43:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SiteDisplay_Resources_1200x628-1.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Compliance & Governance | Commvault","description":"Cyber resilience efforts are subject to more regulations than ever. Commvault Cloud can assist your organization as you work toward data compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations","og_locale":"en_US","og_type":"article","og_title":"Data Compliance and Regulations","og_description":"Cyber resilience efforts are subject to more regulations than ever. Commvault Cloud can assist your organization as you work toward data compliance.","og_url":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-10-11T17:43:30+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations","url":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations","name":"Data Compliance & Governance | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","datePublished":"2023-06-07T11:00:00+00:00","dateModified":"2024-10-11T17:43:30+00:00","description":"Cyber resilience efforts are subject to more regulations than ever. Commvault Cloud can assist your organization as you work toward data compliance.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/use-cases\/data-compliance-and-regulations#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Use Cases","item":"https:\/\/www.commvault.com\/use-cases"},{"@type":"ListItem","position":3,"name":"Data Compliance and Regulations"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=527732"}],"version-history":[{"count":3,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527732\/revisions"}],"predecessor-version":[{"id":529444,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527732\/revisions\/529444"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/527734"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=527732"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=527732"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=527732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}