Breakout Session
Resilience Against Ransomware: How to Prepare with Commvault HyperScale
Ransomware threats continue to impact business operations around the world, requiring proactive preparation for a cyberattack. As more organizations deploy immutable backup systems to protect their data from the data center to the edge, selecting the best solution can be daunting. Commvault has expanded the family of HyperScale on-premises solutions to address the data protection needs of organizations across multiple industries and workloads
About This Session
Explore how organizations combat escalating ransomware risks, massive data growth, and new edge workloads through Commvault’s HyperScale portfolio—immutable, zero-trust, high-performance data protection engineered for modern hybrid environments where traditional backups no longer suffice.
Understand why 88% of organizations now face attempted ransomware attacks and how the shift toward distributed data, AI-accelerated workloads, and remote/branch locations creates new vulnerabilities that adversaries increasingly exploit.
Learn how HyperScale X, HyperScale Edge, and HyperScale Flex deliver hardened, scalable, cyber-resilient infrastructure across core data centers, edge sites, and performance-intensive environments. With VaultOS, immutable storage, layered security, and zero-trust architecture, the HyperScale family provides end-to-end resilience.
See how SaaS docking dramatically accelerates HyperScale deployment, enabling centralized SaaS-based orchestration, standardized configuration, automated updates, and minimal on-device setup—supporting global resilience across distributed sites.
Key Takeaways
- Ransomware resiliency demands immutable backups, hardened OS, and zero-trust architecture—not traditional backup alone.
- Edge locations are now high-value targets, requiring enterprise-grade protection where data is created.
- HyperScale X, Edge, and Flex ensure scalable, resilient protection across core data centers, distributed sites, and massive workloads.
- SaaS docking accelerates deployment, standardizes configuration, and simplifies management at global scale.
- Customer validation from Fortune Brands demonstrates real reductions in cost, risk, and operational complexity.
- Treating distributed, hybrid data as business-critical is essential for ransomware recovery and regulatory compliance.
HyperScale Flex
HyperScale Flex leverages a high-performance architecture with independent compute and external storage for dynamic, multi-PB enterprise workloads, such as AI and data-intensive applications.
HyperScale X
HyperScale X includes automatic load balancing and efficient data caching in a scalable multi-node platform with operational simplicity for mid-size to large enterprise sites.
HyperScale Edge
HyperScale Edge’s secure and economical solution simplifies operations and improves resilience for remote and edge locations as well as small and medium businesses with smaller datasets.
Frequently Asked Questions
What are the differences between HyperScale X, Edge, and Flex?
- HyperScale X: Petabyte-scale, hyperconverged enterprise platform.
- HyperScale Edge: Cost-optimized appliance for remote offices, retail, distribution centers, and ROBO sites.
- HyperScale Flex: Disaggregated compute/storage for massive, performance-intensive workloads.
Together, they deliver unified, end-to-end cyber resilience.
What is SaaS docking and how does it help?
SaaS docking enables fast, consistent HyperScale deployment through Commvault Command Center—automating configuration, minimizing manual tasks, enabling API-driven provisioning, and centralizing lifecycle management.
Does HyperScale support compliance and data residency requirements?
Yes. HyperScale supports on-site storage, policy-driven governance, consistent configuration standards, and distributed protection, helping meet global data residency and sovereignty requirements across 100+ countries.
Why is protecting edge locations becoming essential?
Edge and ROBO sites now generate significant data and are common ransomware targets due to limited IT staffing, inconsistent controls, and critical business functions. Moving protection closer to data reduces risk and accelerates recovery.
Transcript
View Transcript
Please view video here for a time-stamped transcript
00:07 – 00:09
Hello and welcome everyone.
00:09 – 00:12
Today we’ll be discussing about resilience against ransomware.
00:12 – 00:20
We’ll talk about the major data management challenges businesses are dealing with today and how Commvault’s HyperScale family of solutions prepare you to rise up to those
00:20 – 00:21
challenges.
00:25 – 00:29
My name is Ketan Bansaud, Senior Director of Product Management at Commvault.
00:29 – 00:39
Joining me today are my colleague, Justin Wolf, Senior Product Manager, and our customer, Lee Lindstrom, Principal Infrastructure Architect at Fortune Brands.
00:39 – 00:41
A quick overview of the agenda today.
00:42 – 00:47
I’ll be starting by covering key industry challenges and what enterprises expect out of cyber resilient solutions.
00:47 – 00:52
Then I’ll walk you through the enhancements and innovations we have made across our HyperScale portfolio.
00:53 – 00:57
And I’ll invite Lee to share his first-hand experience with HyperScale in action.
00:57 – 01:04
Next, Justin will introduce HyperScale Edge talking for SaaS and showcase it through a demonstration.
01:04 – 01:06
Finally, we’ll wrap up with a Q &A.
01:06 – 01:07
Let’s get started.
01:09 – 01:15
88 % of organizations experienced attempted ransomware attacks within the last 12 months.
01:15 – 01:17
That’s almost nine out of 10.
01:17 – 01:21
And when you are hit, every minute of your downtime is costly.
01:21 – 01:25
Ransomware spreads quickly, stalling operations and locking you out.
01:25 – 01:29
And in that moment, the only thing that matters is how well you’re prepared.
01:30 – 01:37
Building your backup infrastructure with a hardened operating system and immutable storage and zero trust architecture
01:37 – 01:39
is a critical defensive mechanism.
01:39 – 01:48
Remote offices and branch locations are producing more data than ever, and attackers know these sites are often softer targets.
01:48 – 01:56
With so much enterprise data being created outside of these traditional data centers, protection has to move closer to where the data lives.
01:57 – 02:02
And finally, workloads are already massive, and AI is driving that explosion growth.
02:02 – 02:04
It’s not just about storing data.
02:04 – 02:06
It’s about securing it
02:06 – 02:09
and making it available at unprecedented speeds.
02:10 – 02:18
Managing risks across enterprises is key concern, but equally important is the need to process data closer to the source.
02:19 – 02:21
Real-time applications cannot wait.
02:21 – 02:25
The closer data is processed to where it’s created, the faster the results.
02:25 – 02:30
Reducing latency means better performance, better overall user experience.
02:30 – 02:34
Many organizations need to keep data within their own perimeter
02:34 – 02:36
for security and compliance reasons.
02:36 – 02:41
Processing data locally helps maintain control while staying agile and efficient.
02:41 – 02:48
More than 100 countries have enforced data residency laws on how it is managed and protected.
02:48 – 02:49
Let’s be very clear.
02:49 – 02:54
Traditional backup solutions weren’t built for today’s threats or tomorrow’s workloads.
02:54 – 02:57
You need a modern, cyber resilient solution.
02:58 – 03:03
We have offered our HyperScale X solution, the appliance for many years now.
03:03 – 03:10
It’s our immutable, hardened, and resilient storage solution that is trusted by thousands of customers worldwide.
03:10 – 03:18
But the realities around distributed data, massive growth, and data close to the source are redefining how resilience must be delivered.
03:18 – 03:29
And that’s why we have expanded our HyperScale portfolio into two purpose-built approaches, one designed for the edge and the other built for scale.
03:30 – 03:32
At the heart of
03:32 – 03:33
our portfolio is HyperScale X.
03:33 – 03:43
It’s a hyperconverged scale-out platform that starts with three nodes and scales to 12 nodes, protecting petabytes of data in a single pool.
03:43 – 03:45
It remains the foundation.
03:45 – 03:50
And as our customers need diversified, we expanded our HyperScale family.
03:51 – 04:00
On my left here, on one side, we have HyperScale Edge, which is built for retail stores, distribution centers, branch offices, and smaller organizations.
04:00 – 04:05
These are locations with limited IT resources, yet growing data volumes.
04:05 – 04:17
These sites are prime targets for attacks and Edge provides the same trusted resilience in a simple, cost-optimized single load form, quick to deploy and easy to manage.
04:17 – 04:22
It ensures that the Edge data is protected as strongly as the core data.
04:22 – 04:26
And on my right, on the other side of the spectrum, we have HyperScale Flex.
04:26 – 04:30
It is designed for massive data-intensive workload.
04:30 – 04:35
Flex offers the agility to scale compute and storage independently.
04:35 – 04:44
It supports multi petabyte capacity and delivers high speed recovery, all while keeping the operations simple and resilient.
04:44 – 04:53
Together, Edge, X, and Flex solutions, they create a full spectrum of protection that can satisfy the needs of any organizations.
04:53 – 05:00
No gaps, no compromises, just complete resilience everywhere your data lives.
05:00 – 05:06
And that’s made possible because security is central to the architecture of the HyperScale family.
05:06 – 05:13
Whether it is X, Flex or Edge, each solution is engineered with resilience and trust in mind.
05:13 – 05:18
Let’s take a quick look at how we have embedded security in everything that we deliver.
05:18 – 05:24
Every HyperScale appliance we built is built on VaultOS, our optimized Linux platform.
05:24 – 05:27
It is secured and hardened by design.
05:27 – 05:31
It provides regular security updates and has built-in firewall protection.
05:31 – 05:36
You also need mechanisms to make data immutable and indelible.
05:36 – 05:37
For two reasons.
05:37 – 05:41
One, the majority of ransomware has means to tamper with backups.
05:41 – 05:44
Number two, insider threats are real.
05:44 – 05:52
On all the HyperScale solutions, data remains safe from tampering or deletion at different levels of the stack, even during an attack.
05:53 – 05:56
All HyperScale models, they follow a zero trust design,
05:56 – 06:02
which means that no user, no device, and no process is trusted by default.
06:02 – 06:08
Access is continuously verified to block unauthorized activity and preserve data integrity.
06:08 – 06:21
These are the principles that make HyperScale X, Flex, and Edge resilient by design, ready for any environment, and trusted even in the most regulated industries.
06:22 – 06:31
To talk about how that translates into day-to-day operations, I’m thrilled to be joined here today by Lee Lindstrom, one of our HyperScale customers.
06:32 – 06:43
Lee is the principal architect at Fortune Brands, and he’s tasked with building cost-effective data management and cyber-resilience solutions across the data centers in
06:43 – 06:44
his organization.
06:44 – 06:51
Lee has been part of our journey with HyperScale Edge, and he’s here to share some first-hand experiences, learnings,
06:51 – 06:52
and insights.
06:53 – 06:54
Lee, welcome.
06:54 – 06:55
It’s great to have you with us.
06:55 – 07:05
uh Lee, can you give us a quick background of your organization and share what specific challenges you saw in your environment that led you to explore HyperScale and in
07:05 – 07:07
particular HyperScale Edge?
07:07 – 07:08
Yes.
07:08 – 07:20
At Fortune Brands Innovation, we are a leading home security and digital products company with three main divisions, water innovations, outdoor products, and security.
07:21 – 07:30
um We have several different brands including Moen, Master Lock, Yale, Therma-Tru, Larson, Fiberon, and more.
07:30 – 07:39
um Basically with a collection of business units, we were running multiple data protection software solutions.
07:39 – 07:50
um And even within a business unit itself, there could have been um multiple solutions and overlap in our data protection.
07:50 – 07:57
So we chose Commvault as a solution to protect our overall business.
07:57 – 08:10
um One of the main hurdles that we saw initially is we did have a large uh disparity between our business units and their size and architecture.
08:10 – 08:19
um Moen, which was our largest enterprise, we chose HyperScale X in our initial deployment.
08:19 – 08:29
HyperScale X was a great scalable solution that allowed us to grow by adding nodes to our data protection.
08:29 – 08:32
And it was very high performance.
08:33 – 08:41
We also had remote sites where the remote appliance fit well with its 15 terabyte size.
08:41 – 08:49
These sites had, you know, was a small office or a small distribution center.
08:50 – 08:52
That protection worked well.
08:52 – 08:58
But there was a big gap in between the HyperScale X and the remote appliances.
08:58 – 09:04
ah That’s where we were looking for the Edge product to help fill that gap.
09:05 – 09:06
Awesome.
09:06 – 09:08
That’s wonderful.
09:08 – 09:15
So essentially, you saw a gap between your bigger core data and your remote cases.
09:15 – 09:19
And the remote cases were not really fulfilling your requirements.
09:20 – 09:31
You want to tap into how Edge helped fill those gaps and what were the advantages on top of the remote appliances that you saw with respect to the broader data protection setup
09:31 – 09:33
that you had along with HSX.
09:34 – 09:51
So the biggest item was sizing, uh to size a solution that was cost effective for our business in that in-between range, where deploying a three-node HyperScale X system was
09:51 – 09:54
not cost effective for those in-between sizes.
09:54 – 10:04
uh We were deploying Commvault on virtual media agents attached to NAS storage to protect it, which worked well,
10:04 – 10:15
but it was not a hardened system and it depended on VMware and other outside forces to do its data protection.
10:15 – 10:26
With the HyperScale Edge appliance, the reference architecture, we were able to size this storage appropriately for the workload it was protecting.
10:27 – 10:28
Got it.
10:28 – 10:28
Got it.
10:28 – 10:33
So sizing was definitely one of the biggest requirements that
10:33 – 10:36
that was there and the gap that it had closed.
10:36 – 10:41
And the other one was dependencies on uh other softwares like VMware.
10:41 – 10:55
uh What kind of benefits you would say you would have observed in terms of cost savings, operational efficiencies, scalability, and performance overall the HyperScale portfolio,
10:55 – 10:58
including both X as well as Edge?
10:58 – 11:01
It is a pre-built
11:01 – 11:14
system, you know, even with the edge, it’s a deploy an ISO image, um run the setup wizard, and basically join the CommCell environment and start protecting data.
11:14 – 11:17
It’s quick, it’s easy, it’s reliable.
11:17 – 11:24
um And the security on top of it, you know, puts the whole solution together.
11:24 – 11:29
um Not being able to access it via SSH unless you
11:30 – 11:43
go into Commvault and allow and enable connectivity into it uh is a great security feature that we use to harden that data protection platform.
11:45 – 11:47
Absolutely, I think that is awesome.
11:47 – 11:59
think I’m so glad to hear that from you firsthand about the benefits that you are seeing across our portfolio and the security features that we built in.
11:59 – 12:08
My final question to you, is how has your experience uh been as our early adopter member?
12:08 – 12:14
You have really helped us shape and build and give direction to HyperScale Edge.
12:14 – 12:19
Which features have stood out the most for you within our portfolio?
12:19 – 12:22
Maybe you can expand beyond HyperScale as well.
12:23 – 12:29
Yeah, so the overall Commvault environment, we’ve been extremely happy with its flexibility.
12:29 – 12:41
You know, one of the big selling points when we first purchased Commvault was the ability to write anywhere, to write your storage to um like we were, you know, a virtual, virtual
12:41 – 12:43
media agent or a NAS device.
12:43 – 12:49
A lot of your competitors do not allow that and have to write to their own appliance.
12:49 – 12:52
um Then with the adoption of Edge,
12:52 – 12:56
and all the HyperScale products, it just makes that process easier.
12:56 – 13:08
You don’t have to do it, but it makes it easier to implement a data protection solution that is robust, secure, and flexible for your needs.
13:09 – 13:10
Got it.
13:10 – 13:11
Got it.
13:11 – 13:15
Thank you, Lee, for joining us today and sharing your valuable insights.
13:15 – 13:18
We really appreciate your time and your perspective.
13:18 – 13:20
With that, let’s move on to the next part of our session.
13:20 – 13:27
I’m thrilled to hand it over to Justin, who will walk us through some of the new and exciting features we have built into the HyperScale platform.
13:27 – 13:28
Justin, all yours.
13:29 – 13:33
Thanks, Ketan My name is Justin Wolf, Senior Product Manager here at Commvault.
13:33 – 13:39
Today I’m going to talk a little bit about what’s coming in the future for HyperScale and specifically HyperScale Edge today.
13:40 – 13:44
Organizations deploying HyperScale often encounter challenges that slow down time to value.
13:44 – 13:50
The current setup process can be resource intensive, requiring physical access and time consuming configuration steps.
13:50 – 13:55
Not only does this extend deployment timelines, but it also increases operational costs when scaling to multiple sites.
13:56 – 14:00
This results in avoidable delays in realizing value and greater complexity in managing your environments.
14:01 – 14:06
With SaaS for docking for HyperScale, you can deploy faster by managing the setup through Command Center.
14:06 – 14:13
Step-by-step guided configuration process enables consistency and cuts down on guesswork while reducing on-device tasks to only what’s essential.
14:13 – 14:19
Mainline workflows then enable configuration and deployment to run in parallel, cutting overall deployment time,
14:19 – 14:22
and delivering smoother, more predictable experience for your teams.
14:22 – 14:24
Let’s take a look at this in action.
14:24 – 14:29
Hybrid data protection should be simple, fast, and built for the modern enterprise.
14:30 – 14:37
Fast docking for HyperScale combines cloud speed with enterprise reliability to streamline deployment and management across your hybrid world.
14:37 – 14:44
At the center is Global Command Center, your single pane of glass for hybrid and cloud native data protection.
14:44 – 14:49
From one SaaS console, can configure, monitor, and manage every site, device,
14:49 – 14:53
and workload on-premises, in the cloud, or at the edge.
14:53 – 14:57
Creating a new HyperScale edge configuration begins in Command Center.
14:57 – 15:02
The guided setup walks you through each step, making configuration quick, reliable, and secure.
15:14 – 15:23
Start by defining your system details, providing essential system configurations, including system name, serial number, and time zone information.
15:30 – 15:34
Next, configure network information to establish connectivity to Commvault Cloud.
15:34 – 15:43
This provides the options to deploy both a standard configuration for simpler deployments and advanced configurations when deploying in complex networking environments.
15:44 – 15:50
Finally, configure your local system credentials for maintaining and managing your HyperScale Edge systems locally on the device.
15:55 – 15:59
Each step follows built-in best practices, ensuring consistent, policy-driven configuration every time.
15:59 – 16:04
Whether you’re preparing a single system or several, is completed in just a few clicks.
16:04 – 16:09
For larger environments, configuration can be automated at scale using the Commvault API.
16:09 – 16:17
IT teams can add multiple Edge systems across sites, automatically applying predefined configurations, including storage, network, and security settings.
16:17 – 16:21
This eliminates manual setup and accelerates deployment across global locations.
16:22 – 16:24
Once the device configuration is complete,
16:24 – 16:27
power on each HyperScale Edge system, and connect it to your network.
16:27 – 16:35
The device automatically links to Commvault SaaS, establishing a secure connection, and enter the provided authorization code in Command Center to complete activation.
16:35 – 16:41
The system will verify connectivity, registers with the platform, and begins installation automatically.
16:43 – 16:47
As installation begins, Command Center provides centralized monitoring for every deployment.
16:47 – 16:53
Real-time dashboards show installation progress, system health, and status across all locations.
16:53 – 16:59
IT teams can track each system from a single console, ensuring average deployment stays on schedule and on target.
17:02 – 17:11
Once systems are alive, Command Center provides full lifecycle management, monitor performance, supply updates, and optimize capacity all through continuous connection from
17:11 – 17:12
Commvault SaaS.
17:13 – 17:19
With SaaS docking for HyperScale, you can deploy faster, manage smarter, and protect everything from the edge to cloud native.
17:19 – 17:27
Accelerate and simplify cyber resilience with Commvault HyperScale, complete family of backup and recovery solutions that delivers simple, flexible data protection with built-in
17:27 – 17:32
ransomware protection for all workloads, including AI containers, virtual databases.
17:33 – 17:41
Also include support for faster backup and recovery with on-site data storage, which can help meet compliance requirements, optimize capacity and cost to meet the needs of your
17:41 – 17:43
organization of all sizes.
17:43 – 17:50
And with three HyperScale solutions to choose from, you can select the configuration, capacity, and architecture best made to your cost and capacity targets.
17:50 – 17:58
Thank you for joining us today in this introduction and overview of the HyperScale portfolio and the new features coming in the new future.
17:59 – 18:10
For more information on HyperScale or how to become more cyber resilient, be our solution brief or join us for our cyber resilience workshop or take the cyber readiness assessment
18:10 – 18:12
to see how your organization stacks up.