Skip to content

Explore Commvault

Explore deep learning topics and access cutting-edge resources—all aimed at expanding your knowledge and strengthening your defense against cyber threats.

Backup & Recovery


Active Directory

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks.

Learn more about Active Directory

Agent

An agent is a software program that runs on a client system to execute specific tasks, such as data backup, monitoring, or security checks.

Learn more about Agent

Air Gap Backup

Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a “gap” between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system.

Learn more about Air Gap Backup

All-Flash vs Traditional Backup Storage

Compare the performance, cost, and scalability of flash vs. hybrid storage for modern data protection.

Learn more about All-Flash vs Traditional Backup Storage

Autonomous

Autonomous systems in data protection and management are those that can operate independently, making decisions and performing tasks with minimal human intervention.

Learn more about Autonomous

Bare Metal Recovery

Learn about bare metal recovery, how it enables rapid system restores, and best practices for backup and recovery in cloud and on-premises environments.

Learn more about Bare Metal Recovery

Cyberattack

A cyberattack is a deliberate and malicious attempt to exploit or damage computer systems, networks, or personal devices, often with the intent to steal, alter, or destroy data.

Learn more about Cyberattack

Digital transformation

Digital transformation is the process of using digital technologies to fundamentally change how a business operates and delivers value to its customers. It involves using digital technologies to automate processes, improve efficiency, and create new business models, products, and services.

Learn more about Digital transformation

Honeypot

A honeypot is a decoy system or data set designed to attract and deceive cyber attackers, helping organizations detect, study, and mitigate threats.

Learn more about Honeypot

Minimum Viability

Minimum viability refers to the minimum level of functionality and capability required for an organization to be operational following a disaster, cyberattack or outage.

Learn more about Minimum Viability

Cleanroom Recovery


What Is Cleanroom Recovery?

Cleanroom Recovery is a specialized data recovery process that ensures the secure and reliable retrieval of critical information from damaged storage devices in environments where data contamination poses a significant risk.

Learn more about What Is Cleanroom Recovery?

Cyber Resilience for Cloud


AWS Cost Optimization

Discover proven AWS cost optimization best practices and strategies to reduce your AWS bill, optimize cloud usage, and improve financial efficiency.

Learn more about AWS Cost Optimization

Cyber Resilience

Cyber resilience is an organization's ability to anticipate, prepare for, and recover from cyberattacks. This includes protecting data, detecting, and responding to threats, and recovering quickly from disruptions.

Learn more about Cyber Resilience