{"version":"1.0","provider_name":"Commvault - English - United States","provider_url":"https:\/\/www.commvault.com","author_name":"unguyen","author_url":"https:\/\/www.commvault.com\/blogs\/author\/unguyen","title":"ESG Technical Review: A Roadmap to Future-proof Cyber Resilience with Commvault Cloud","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"FIhXSDtEv0\"><a href=\"https:\/\/www.commvault.com\/resources\/analyst-report\/future-proof-cyber-resilience-with-commvault-cloud\">ESG Technical Review: A Roadmap to Future-proof Cyber Resilience with Commvault Cloud<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.commvault.com\/resources\/analyst-report\/future-proof-cyber-resilience-with-commvault-cloud\/embed#?secret=FIhXSDtEv0\" width=\"600\" height=\"338\" title=\"&#8220;ESG Technical Review: A Roadmap to Future-proof Cyber Resilience with Commvault Cloud&#8221; &#8212; Commvault - English - United States\" data-secret=\"FIhXSDtEv0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"This Technical Summary of the Technical Review by TechTarget\u2019s Enterprise Strategy Group summarizes the areas organizations should consider when redefining their approach to cyber resilience, with an end goal of future-proofing their strategy and improving their ability to detect, prevent, and rapidly recover from cyberthreats and attacks","thumbnail_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","thumbnail_width":1200,"thumbnail_height":628}