{"id":73633,"date":"2023-06-07T07:00:00","date_gmt":"2023-06-07T11:00:00","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=73633"},"modified":"2024-10-08T07:27:42","modified_gmt":"2024-10-08T11:27:42","slug":"threat-scan","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/platform\/threat-scan","title":{"rendered":"Threat Scan"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><a href=\"https:\/\/www.commvault.com\/platform\">Platform<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Threat Scan<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tKeep Backup Data Clean\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tRecover and restore clean data quickly and avoid file reinfection by automatically quarantining suspicious or compromised data.&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Request demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRequest demo\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability_ThreatScan_Hero_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability_ThreatScan_Hero_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability_ThreatScan_Hero_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n<div class=\"alignfull sticky wp-block-commvault-v2-page-navigation\">\n\t<div class=\"custom-container\">\n\t\t<div class=\"nav-wrapper\">\n\t\t\t<div class=\"left-nav\">\n\t\t\t\t<div class=\"tab-menu\">\n\t\t\t\t\t<span>Threat Scan<\/span>\n\t\t\t\t\t<button class=\"toggle\">\n\t\t\t\t\t\t<svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<path d=\"M11 1.5L6 6.5L1 1.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/>\n\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<ul class=\"wp-block-commvault-v2-page-navigation__ul\" aria-label=\"Page navigation\" =\"true\" role=\"navigation\">\n\t\t\t\t\t\t\t\t\t\t<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#video\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Demo Video<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#benefits\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Benefits<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#features\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Features<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#report\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Analyst Report<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#related-resources\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Resources<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#faqs\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>FAQs<\/span>\n\t<\/a>\n<\/li>\n\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"right-nav\">\n\t\t\t\t<a href=\"\/free-trial\" class=\"nav-cta\" target=\"_blank\">\n\t\t\t\t\t<span>Start a Free Trial<\/span>\n\t\t\t\t\t<svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M5 1.5L10 6.5M10 6.5L5 11.5M10 6.5H0\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n<div style=\"background-color: #fff;\" class=\"standard-media__container alignfull wp-block-commvault-v2-standard-video\" id=\"video\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-6 col-lg-6 video\">\n\t\t\t<div class=\"video-wrapper\">\n\t\t\t\t<div class=\"video-container\">\n\t\t\t\t\t\t\t\t\t\t\t<img\n\t\t\t\t\t\tclass=\"vidyard-player-embed\"\n\t\t\t\t\t\tsrc=\"https:\/\/play.vidyard.com\/AgZ9du1XZCLVW2SZhh7UpR.jpg\"\n\t\t\t\t\t\tdata-uuid=\"AgZ9du1XZCLVW2SZhh7UpR\"\n\t\t\t\t\t\tdata-v=\"4\"\n\t\t\t\t\t\tdata-type=\"inline\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-6 col-lg-6 info\">\n\t\t\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tDemo Video\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tCommvault&reg; Cloud Threat Scan\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tSee how Commvault Cloud Threat Scan automatically scans backup files for malware, detects data anomalies, and enables fast, clean recovery.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/demos\/commvault-cloud-threat-scan\"\n\t\t\taria-label=\"Watch now\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"block-aligncenter wp-block-commvault-v2-stats\" id=\"benefits\">\n\t<div class=\"grid-container no-gap\">\n\t\t\t\t<div class=\"col-12 col-md-10 infoBlock\">\n\t\t\t\t\t\t\t<span class=\"eyebrowStats text-eyebrow-m text-color-mode font-medium\">\n\t\t\t\t\tHow we do it&nbsp;\t\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t<h2 class=\"titleStats text-heading-l text-md-heading-xl text-lg-heading-xxxl text-color-mode\">\n\t\t\t\tContinuous scanning to detect and stop threats&nbsp;\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class='descriptionStats text-body-m text-md-body-l'>\n\t\t\t\tActive monitoring of backups, with automatic quarantining of infected or suspicious data, provides confidence that you can recover clean data quickly.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t<div class=\"stats__container__statistic col-12\">\n\t\t\t<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Personal-Health-Records_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tSmart quarantine\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tInfected files are automatically quarantined from the backup content and skipped during recovery.&nbsp;&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Analytics-Engine-2_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tMulti-layered file analysis&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tOur secure scanning uses a built-in signature-based malware engine, algorithms, and file comparisons to identify, label, and quarantine threats found within backups.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/AI-Technology_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tAdvanced AI built-in&nbsp;\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tLeverage more than 100 million threat intelligence indicators to quickly identify new threats.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/App_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tSIEM and SOAR integration\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tAlerts integrate with existing security operations tools like SIEM and SOAR platforms to jump-start investigations with added context.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Ransomware_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tUnknown threats, stopped\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tSpot next-generation polymorphic and shapeshifting malware.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Scope_Crocus_RGB.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tAccuracy like you&rsquo;ve never seen\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tFind threats with greater accuracy and reduce false positives.\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\t<\/div>\n<\/div>\n<div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\" id=\"features\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-8 offset-lg-2 text-center heading__double__side__image\">\n\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\t\tTHREAT SCAN&nbsp;FEATURES\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<h2 class=\"text-heading-l text-md-heading-xl text-lg-heading-xxl section_title\">\n\t\t\t\t\t\t\tRecover and restore clean data, automatically&nbsp;\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<p class=\"description text-body-m text-lg-body-l\">\n\t\t\t\t\t\tPinpoint and isolate compromised backup content like encrypted files, malware-infected files, or those with significant changes.\t\t\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tIDENTIFY BAD BACKUPS&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tDiscover threats that live in backed up files&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tPinpoint and isolate compromised backup content like encrypted files, malware-infected files, or those with significant changes.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"787\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Discover-Threats_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Discover-Threats_1088x870.png 1208w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Discover-Threats_1088x870.png?resize=800,615 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Discover-Threats_1088x870.png?resize=768,591 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tRECOVER CLEAN DATA&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tPrevent reinfection during recovery processes&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tRestore the last known good version of data<s>,<\/s> while retaining, isolating, and quarantining bad data for forensic investigation.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"787\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Prevent-Reinfection_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Prevent-Reinfection_1088x870.png 1208w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Prevent-Reinfection_1088x870.png?resize=800,615 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Prevent-Reinfection_1088x870.png?resize=768,591 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\" show-second-cta wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tFIGHT AI WITH AI&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tThreat Scan predict&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tFind zero-day and never-before-seen threats earlier with scanning technology designed to analyze file attributes and behaviors.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"787\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Threat-Scan-Predict_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Threat-Scan-Predict_1088x870.png 1208w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Threat-Scan-Predict_1088x870.png?resize=800,615 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Capability-Threat-Scan_Threat-Scan-Predict_1088x870.png?resize=768,591 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\" id=\"report\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order2\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\" id=\"report\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tAnalyst Report&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tCommvault leads the way to cyber resilience and continuous business\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tFor the 13th time in a row, Commvault has been named a Leader in the Gartner&reg; Magic Quadrant&trade; for Enterprise Backup and Recovery Software Solutions.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/gc\/itleaders\"\n\t\t\taria-label=\"Read the report&nbsp;\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead the report&nbsp;\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#\"\n\t\t\taria-label=\"Read More\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order1 offset-md-1\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image-square.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image-square.png 1080w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image-square.png?resize=300,300 300w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image-square.png?resize=800,800 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/CVT_Gartner_MQ_Image-square.png?resize=768,768 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"wp-block-commvault-v2-content-carousel\" id=\"testimonials\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"header-cols col-12 col-xl-8 \">\n\t\t\t<div class=\"header-wrapper \">\n\t\t\t\t<div class=\"text-container\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__eyebrow text-eyebrow-s text-md-eyebrow-m m-0\">Our Reach<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"cmvlt-component-card__title text-heading-l text-md-heading-xl text-lg-heading-xxl text-xl-heading-xxxl m-0\">Supporting more than 100,000 companies<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\t\t<div class=\"gallery\">\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__adidas.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__sony.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"449\" height=\"235\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/astra-zeneca-case-study.png?w=449\" class=\"cmv-component-card__logos\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__merck.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?w=400\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png 400w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__randstad.png?resize=300,300 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"gallery__item\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"402\" height=\"400\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?w=402\" class=\"cmv-component-card__logos\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png 402w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/logo__panasonic.png?resize=300,300 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\n\t\t<div class=\"carousel-content\">\n\t\t<div class=\"carousel-content__inner indent\">\n\t\t\t<div class=\"glide carousel-wrapper\" data-perview-desktop=\"1.3\" data-perview-tablet=\"1.3\">\n\t\t\t\t<div class=\"glide__track\" data-glide-el=\"track\">\n\t\t\t\t\t<div class=\"glide__slides\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #E7D5EF\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"19\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Testimonial_AllinaHealth_1cBlack.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&ldquo;We used to manually engineer redundancy to avoid data loss. Commvault provides the needed flexibility and granularity for fast restores.&rdquo;&nbsp;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Greg Robinson&nbsp;<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">Senior Systems Engineer, Allina Health&nbsp;<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #F3F4FA\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"27\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Testimonial_BILTHOVEN-BIOLOGICALS-logo_1cBlack_9c00ce.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&ldquo;Commvault gives us confidence that our data is safe, and our important services can be up and running quickly.&rdquo;&nbsp;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Paul Vries&nbsp;<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">IT Consultant, Bilthoven Biologicals&nbsp;<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"glide__slide\">\n\t\t\t\t\t\t\t\t<div class=\"wp-block-commvault-v2-quote-card\">\n\t<div class=\"cmvlt-component-card cmvlt-component-card__quote \" style=\"background-color: #C5C7E3\">\n\t\n\t\t\t\t<div class=\"info__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__flex-wrapper\">\n\t\t\t\t\t\t<div class=\"cmvlt-component-card__image-wrapper\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"172\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/power-integrations-logo-1c-black.png\" class=\"cmvlt-component-card__image\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"cmvlt-component-card__title__container 1\">\n\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-body-s text-md-body-m text-lg-body-l text-xl-body-xl \">&#8220;With a long retention strategy, our cloud storage costs were accelerating quickly. Commvault Cloud gave us a way to dramatically lower those costs and keep them predictable, while simultaneously providing us with the data resilience needed to keep our business running.&rdquo;<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\n\t<div class=\"author\">\n\t\t\t\t\t<p class=\"author_name font-medium text-body-s text-md-body-m\">Jacob Gsoedl<\/p>\n\t\t\t\t\t\t\t<p class=\"author_role mb-0 text-body-s text-md-body-m text-lg-body-s\">CIO, Power Integrations<\/p>\n\t\t\t<\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"carousel-footer bullets\">\n\t\t\t\t\t<div data-glide-el=\"controls\" class=\"carousel-controls\">\n\t\t\t\t\t\t<button class=\"carousel-control prev\" data-glide-dir='<' aria-label=\"Previous\">\n\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M0.799999 20C0.799999 30.6039 9.39613 39.2 20 39.2C30.6039 39.2 39.2 30.6039 39.2 20C39.2 9.39613 30.6039 0.8 20 0.8C9.39613 0.8 0.799999 9.39613 0.799999 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<path d=\"M20.0002 14.168L14.1668 20.0013M14.1668 20.0013L20.0002 25.8346M14.1668 20.0013H25.8335\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"carousel-control next\" data-glide-dir=\"&gt;\" aria-label=\"Next\">\n\t\t\t\t\t\t\t\t<svg width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t\t<path d=\"M39.2 20C39.2 30.6039 30.6039 39.2 20 39.2C9.39613 39.2 0.8 30.6039 0.8 20C0.8 9.39613 9.39613 0.8 20 0.8C30.6039 0.8 39.2 9.39613 39.2 20Z\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t\t<path d=\"M19.9998 14.168L25.8332 20.0013M25.8332 20.0013L19.9998 25.8346M25.8332 20.0013H14.1665\" stroke=\"currentcolor\" stroke-width=\"1.6\"\/>\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/button>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"glide__bullets\" data-glide-el=\"controls[nav]\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=0\" aria-label=\"Slide-0\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=1\" aria-label=\"Slide-1\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<button class=\"glide__bullet\" data-glide-dir=\"=2\" aria-label=\"Slide-2\"><\/button>\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\n\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<div style=\"background-color: #000;\" class=\"alignfull dark-mode wp-block-commvault-v2-double-side-image\" id=\"datasheet\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\" id=\"datasheet\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\" id=\"report\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\tDatasheet&nbsp;\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tThreat Scan datasheet&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tEnable swift and clean data recovery by analyzing backup files to find corrupted and encrypted data.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/datasheet\/identify-malware-and-prevent-reinfection-with-commvault-threat-scan\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#\"\n\t\t\taria-label=\"Read More\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg?quality=80\" class=\"double-side__image\" alt=\"A woman wearing glasses studying financial data on a laptop.\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_Risk-Pillar_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"wp-block-commvault-v3-section-header-v3\" id=\"related-resources\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      Additional resources    <\/h5>\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      Explore more of our resources&nbsp;    <\/h2>\n  \n  <\/div>\n\n<div class=\"commvault-v3-custom-buttons-component scalable-cta-button flex-shrink-0\">\n      <div class=\"commvault-v3-button flex-shrink-0 is-style-primary-alt \"\n            >\n\n              <a\n          class=\"cmvlt-2-custom-button btn-md text-body-l font-medium js-open-modal\"\n          href=\"\/resources\"\n          aria-label=\"View all resources\"\n          target=\"_blank\"\n        >\n\n                      <svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n              <path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n              <path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n            <\/svg>\n\n            <span class=\"font-medium\">\n              View all resources            <\/span>\n                  <\/a>\n          <\/div>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n<div class=\"wp-block-commvault-v3-masonry-grid\">\n\t<div class=\"spacing-none wp-block-commvault-v3-layout-grid\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container \">\n\t\t\t<div class=\"col-lg-5 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t<div class=\"wp-block-commvault-v2-customer-story\" id=\"related-resources\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"500\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_RansomwareProtectionBuyersGuide_888x500.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_RansomwareProtectionBuyersGuide_888x500.jpg 888w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_RansomwareProtectionBuyersGuide_888x500.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Resource_RansomwareProtectionBuyersGuide_888x500.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">VIDEO<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Ransomware recovery demo&nbsp;<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Watch how Commvault performs a complete restore and recovers all files in the event of a ransomware attack.&nbsp;<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/video\/ransomware-recovery-video\"\n\t\t\taria-label=\"Watch now\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<\/div>\n<div class=\"col-lg-7 col-md-12 col-12 wp-block-commvault-v3-layout-grid-column\">\n\t<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/cloud3.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/cloud3.jpg 1280w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/cloud3.jpg?resize=800,450 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/cloud3.jpg?resize=768,432 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">solution brief<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Cyberthreat<br>protection with<br>resilience<br>and recovery<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Organizations need proven cyber resilient data protection solution that goes beyond traditional backup and recovery to secure, defend, and recover data &ndash; across the hybrid world.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/solution-brief\/commvault-cyber-threat-protection-and-recovery\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<div class=\"wp-block-commvault-v2-customer-story\">\n\t\t\t\t\t<div class=\"cmvlt-component-card cmvlt-component-card__customer-story\" style=\"background-color: #FFF\">\n\t<div class=\"grid-container no-gap\">\n\t\t<div class=\"col-12 col-md-5\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Benefit-WebinarsEvents_CustomerHub_1088x870_f2a6ac.jpg?quality=80\" class=\"cmvlt-component-card__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Benefit-WebinarsEvents_CustomerHub_1088x870_f2a6ac.jpg 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Benefit-WebinarsEvents_CustomerHub_1088x870_f2a6ac.jpg?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Benefit-WebinarsEvents_CustomerHub_1088x870_f2a6ac.jpg?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n\t\t<div class=\"col-12 col-md-7 cmvlt-component-card__content \">\n\t\t\t<div class=\"header\">\n\t\t\t\t\t\t\t\t\t<p class=\"cmvlt-component-card__eyebrow eyebrow text-eyebrow-s text-md-eyebrow-m\">CUSTOMER VIDEO<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__title text-heading-s text-md-heading-m text-lg-heading-l text-xl-heading-xl\">Customers speak on strengthen threat detection<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"cmvlt-component-card__description text-body-s text-body-m\">Discover how Commvault customers are using Commvault to strengthen their threat detection capabilities.<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"cmvlt-component-card__footer\">\n\t\t\t\t<div class=\"cmvlt-component-card__cta scalable-cta-button\">\n\t\t\t\t\t\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/resources\/video\/customers-speak-on-strengthen-threat-detection\"\n\t\t\taria-label=\"Watch now\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\n<section class=\"wp-block-commvault-v2-accordion-block\" id=\"faqs\">\n\t<div class=\"accordion__header\">\n\t\t\t\t\t<h4 class=\"accordion__title text-center text-heading-m text-lg-heading-l text-xl-heading-xxl mb-0\">Frequently Asked Questions<\/h4>\n\t\t\t\t\t<\/div>\n\t<div class=\"accordion__rows\">\n\t\t\t\t\t\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"b794144e-39f8-430e-b362-b7a346134b9b\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow does Threat Scan prevent compromised files from being restored?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tThreat Scan analyzes files during the backup process, looking for malware signatures, encryption events\/changes, or even suspicious changes over time (if the file has been backed up before). If a file exhibits any suspicious characteristics, it&rsquo;s quarantined and prevented from being restored during a recovery process.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"a3babea4-2f3c-4864-a1c6-656d845db4c9\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tDo you keep a copy of suspicious or compromised files?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tYes. While we only restore clean, good data, we also keep a copy of the suspicious file so your incident response or forensics team can analyze it and determine its origin or the threat actor&rsquo;s desired effects.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v2-accordion-item\" id=\"8466623d-fd52-4dc8-a80c-6ca6fbe17eb3\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow does Threat Scan integrate with security technologies?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"#0A0A0A\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"paragraph hidden\">\n\t\t\t<p class=\"text-body-xs text-md-body-s text-lg-body-m text-xl-body-l mb-0\">\n\t\t\t\tThreat Scan can send alerts to anomalies or malware detection directly to your SIEM or SOAR tools, like Splunk, Palo Alto Networks XSOAR, or Microsoft Sentinel, enabling SecOps teams to get warnings that something may be wrong. We can also deliver suspicious files directly to a Sandbox system for further analysis or detonation.&nbsp;\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/section>\t\t\t<\/div>\n<\/section>\n\n<div class=\"alignfull wp-block-commvault-v2-newsletter-block\" id=\"Free-Trial\">\n\t\t<div class=\"newsletter-container container\">\n\t\t\t\t\t\t\t<div class=\"newsletter-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"421\" height=\"525\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FooterPromoImagesTech-Gal-2.png\" class=\"cmv-component-card__image\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"newsletter__text-wrapper\">\n\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-eyebrow-m text-md-eyebrow-default\">Ready to get started?&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<div class=\"newsletter__text-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"newsletter-block__title text-heading-l text-lg-heading-xxl mb-0\">Experience Commvault&reg; Cloud Threat Scan<br><a href=\"https:\/\/commvault-new-preprod.go-vip.net\/free-trial\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-body-m text-lg-body-l\">Request a demo today.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Guided demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGuided demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":85,"featured_media":497598,"parent":73554,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"See it in action","subtitle":"","cta_text":"REQUEST A DEMO","cta_link":"https:\/\/commvault-new-preprod.go-vip.net\/\/\/request-demo","background":{"id":73630,"url":"https:\/\/commvault-new-preprod.go-vip.net\/\/\/wp-content\/uploads\/2023\/06\/GradientSectionBackground-04.jpg?quality=80"}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-73633","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Scan | Commvault<\/title>\n<meta name=\"description\" content=\"Commvault Threat Scan allows organizations to monitor backups to respond to incidents faster, avoid file reinfection, and restore data quickly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/platform\/threat-scan\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Scan\" \/>\n<meta property=\"og:description\" content=\"Commvault Threat Scan allows organizations to monitor backups to respond to incidents faster, avoid file reinfection, and restore data quickly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/platform\/threat-scan\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T11:27:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/06\/commvault-logo-background.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Scan | Commvault","description":"Commvault Threat Scan allows organizations to monitor backups to respond to incidents faster, avoid file reinfection, and restore data quickly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/platform\/threat-scan","og_locale":"en_US","og_type":"article","og_title":"Threat Scan","og_description":"Commvault Threat Scan allows organizations to monitor backups to respond to incidents faster, avoid file reinfection, and restore data quickly.","og_url":"https:\/\/www.commvault.com\/platform\/threat-scan","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-10-08T11:27:42+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/06\/commvault-logo-background.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/platform\/threat-scan","url":"https:\/\/www.commvault.com\/platform\/threat-scan","name":"Threat Scan | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/platform\/threat-scan#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/platform\/threat-scan#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","datePublished":"2023-06-07T11:00:00+00:00","dateModified":"2024-10-08T11:27:42+00:00","description":"Commvault Threat Scan allows organizations to monitor backups to respond to incidents faster, avoid file reinfection, and restore data quickly.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/platform\/threat-scan#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/platform\/threat-scan"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/platform\/threat-scan#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/SiteDisplay_Resources_1200x628-1.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/platform\/threat-scan#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.commvault.com\/platform"},{"@type":"ListItem","position":3,"name":"Threat Scan"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=73633"}],"version-history":[{"count":52,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73633\/revisions"}],"predecessor-version":[{"id":527592,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73633\/revisions\/527592"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/73554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/497598"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=73633"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=73633"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=73633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}