<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sanket Maheshwari</title>
    <description>The latest articles on DEV Community by Sanket Maheshwari (@smaheshwari).</description>
    <link>https://dev.to/smaheshwari</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1124176%2F771a8fac-b495-4077-90c7-1eded96218f1.jpeg</url>
      <title>DEV Community: Sanket Maheshwari</title>
      <link>https://dev.to/smaheshwari</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/smaheshwari"/>
    <language>en</language>
    <item>
      <title>The Top 10 Data Privacy and Protection Priorities for Organizations in 2023</title>
      <dc:creator>Sanket Maheshwari</dc:creator>
      <pubDate>Fri, 11 Aug 2023 17:25:48 +0000</pubDate>
      <link>https://dev.to/smaheshwari/the-top-10-data-privacy-and-protection-priorities-for-organizations-in-2023-3eji</link>
      <guid>https://dev.to/smaheshwari/the-top-10-data-privacy-and-protection-priorities-for-organizations-in-2023-3eji</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jfzmcvLM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/op4b5s0wzxn58ai3k4cc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jfzmcvLM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/op4b5s0wzxn58ai3k4cc.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Content Syndicated from: &lt;a href="https://www.commvault.com/blogs/top-10-data-privacy-and-protection-priorities"&gt;The Top 10 Data Privacy and Protection Priorities for Organizations in 2023&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;World Privacy Day, observed annually on January 28th, serves as a reminder of the importance of protecting personal data in today’s digital age. As technology advances and more personal information is shared online, individuals and organizations must take steps to safeguard their data.&lt;/p&gt;

&lt;p&gt;New regulations, such as DORA (Digital Operational Resiliency ACT), mandate that organizations create plans for risk management, incident reporting, and resilience testing. These regulations outline policies for data management, including encryption, data locality, and data lifecycles. &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2020-09-14-gartner-says-by-2023--65--of-the-world-s-population-w"&gt;Gartner projects&lt;/a&gt;, “by 2023, 65% of the world’s population will have its personal data covered under various privacy regulations, and companies need flexible solutions that can adapt to the multitude of legislation.” Navigating this complex environment can be challenging for both individuals and companies.&lt;/p&gt;

&lt;p&gt;Data Privacy is protecting personal information and giving individuals control over how their data is collected, used, and stored.  On the other hand, data protection refers to the technical and organizational measures put in place to protect data (including personal data) from unauthorized access, use, alteration, or destruction. Data protection encompasses Data Privacy and other areas, including backup &amp;amp; recovery, disaster recovery, data security, and a host of other areas.&lt;/p&gt;

&lt;p&gt;To help address that complexity, let’s spend some time reviewing the Top 10 topics to consider when managing Data Privacy and Data Protection.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Data Protection Strategy&lt;/li&gt;
&lt;li&gt;Encryption&lt;/li&gt;
&lt;li&gt;Multi-Person Authentication&lt;/li&gt;
&lt;li&gt;Immutable Storage&lt;/li&gt;
&lt;li&gt;Data Sovereignty&lt;/li&gt;
&lt;li&gt;Data Governance &amp;amp; Discovery&lt;/li&gt;
&lt;li&gt;Classification of data&lt;/li&gt;
&lt;li&gt;Data Retention&lt;/li&gt;
&lt;li&gt;Resilience plan testing &amp;amp; incident response&lt;/li&gt;
&lt;li&gt;Risk Assessment&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  1. Data Protection Strategy
&lt;/h2&gt;

&lt;p&gt;Organizations should start by creating or updating a Data Privacy, Backup &amp;amp; Recovery, and Disaster Recovery plan as part of an overall data protection strategy. There are many facets to a reliable data protection plan and how it specifically relates to protecting the private data your customers have shared with your organization.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Encryption
&lt;/h2&gt;

&lt;p&gt;Encryption is a crucial feature of data protection and protecting private data. Allowing for data encryption at rest and in transit helps prevent unauthorized access to personal information. This is especially important for organizations that handle large amounts of private data, such as healthcare providers and financial institutions. Data no longer resides just in our corporate data centers, as most organizations have one or multiple public clouds with workloads and data stored in them. Securing, with encryption, for the life of the data helps mitigate potential attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Multi-person authentication
&lt;/h2&gt;

&lt;p&gt;Beyond protecting data with encryption, organizations must safeguard their systems from malicious attacks. Leveraging multi-person authentication (MPA) for your data protection systems ensures critical tasks require multiple approvals from pre-approved users. Often overlooked, this is one of the simplest ways to prevent tasks like data exfiltration or deletion.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Immutable Storage
&lt;/h2&gt;

&lt;p&gt;Immutable storage allows for data, private or otherwise, to be written and unable to be further modified or deleted. Data that cannot be tampered with or altered ensures data integrity is maintained. Immutable storage requirements are quickly becoming a standard part of data governance regulations like GDPR, HIPAA, and others. When paired with MPA, you can create highly secure data storage tiers that are a perfect fit for storing confidential and private data.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Data Sovereignty
&lt;/h2&gt;

&lt;p&gt;Organizations should consider regulations surrounding private data storage when developing a data protection strategy. This includes the location of data storage and compliance with regulations regarding data sovereignty. For example, a cloud-based workload on GCP in Europe or containing EU citizens’ data must comply with EU regulations. Anywhere that private data may reside, even if temporary, may be required to be in a specific region under regulatory requirements. Commvault helps to address this concern in its latest release, allowing customers to select which specific region they will leverage for snapshot &amp;amp; data protection storage vs. multiple regions that cost more and may have different regulatory requirements.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Data Governance &amp;amp; Discovery
&lt;/h2&gt;

&lt;p&gt;In a recent survey, &lt;a href="https://www.helpnetsecurity.com/2022/11/30/cisos-cloud-transformation/"&gt;57% of CISOs&lt;/a&gt; admit they don’t know where some or all their data is or how it is protected! As this amount of private data continues to grow, the sheer number of regulations expands exponentially, and we are confused about what and how we should protect our data.  As a result, organizations need to understand their data, where it is, and what is at risk.  Being able to prioritize data based on your organization’s policies, priorities, and applicable regulations is critical to protecting the data. You cannot protect what you don’t know about!&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Classification of data
&lt;/h2&gt;

&lt;p&gt;Knowing what data exists and where it resides is only part of the solution. Organizations must consider what data is private customer data, business-critical, etc., in terms of its importance to your business and your customers. Protecting only on-prem data may miss some critical customer data living in your SaaS-based CRM solution. Speaking of which, you must rely on something other than your SaaS vendor or even your IaaS cloud providers to provide data protection for your data. They may provide some SLAs and a level of redundancy, but that is not a replacement for a solid data protection plan. Managing data classification is no point in time operation, with data growing each year exponentially.&lt;/p&gt;

&lt;h2&gt;
  
  
  8. Retention
&lt;/h2&gt;

&lt;p&gt;It is paramount to know what data exists and how important it is, but how long does it stay relevant? This is a hard question to answer for most organizations and one that can be seen every year when buying ever-increasing storage systems to house corporate data. The ability to assign an expected lifespan to data can significantly impact your organization’s bottom line AND protect your customers’ private data. Having systems in place to automatically find, classify, and set retention will reduce the likelihood of data sprawl, reduce the amount of time to recover unused data, and reduce costs. If you are looking for a great place to start efficiently managing your governance, risk, and compliance, read through Commvault’s unique approach to &lt;a href="https://www.commvault.com/governance-risk-and-compliance"&gt;Unified Data Management&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  9. Resilience plan testing &amp;amp; incident response
&lt;/h2&gt;

&lt;p&gt;Resilience plan testing often referred to as a runbook, is an often-overlooked area of a data protection strategy. Creating or updating an outdated plan can take time and effort. Partnering with solution providers or strategic data protection companies with experience in creating a plan can significantly reduce the time it takes to get current. While it may be trivial to think runbooks are passe, I’ve found that when an actual DR event or ransomware attack hits, they are the GO-TO asset you want in your arsenal of tools. A regular cadence of updates creates an organizational posture that is ready to face data security threats head-on.&lt;/p&gt;

&lt;h2&gt;
  
  
  10.  Risk Assessment
&lt;/h2&gt;

&lt;p&gt;As mentioned with runbook, consider working with strategic vendors to perform a risk assessment semi-annually or annually. Scheduled reviews can help build the muscle memory for a solid data protection and data privacy mindset. The benefit of working with well establish data protection &amp;amp; data privacy vendors is they are up to date on the latest security threats and mitigation strategies.&lt;/p&gt;

&lt;p&gt;By implementing this list of considerations and routinely refreshing your resilience plan, you can be confident that personal information is secure and compliant with the latest privacy regulations. If you aren’t sure where to start but need help from a company that can answer all these questions.&lt;/p&gt;

&lt;p&gt;Commvault is here to help! We continually add new capabilities, including our latest enhancements to regional data sovereignty for backup snapshots, industry certifications, immutable storage capabilities, and more.&lt;/p&gt;

&lt;p&gt;Head over to our community to &lt;a href="https://community.commvault.com/commvault-platform-release-updates-47/commvault-platform-release-2023-is-now-available-in-tech-preview-4681"&gt;learn more&lt;/a&gt; or take a test drive today &lt;a href="https://www.commvault.com/request-demo"&gt;https://www.commvault.com/request-demo&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
      <category>database</category>
    </item>
    <item>
      <title>5 Essential Data Privacy Regulations for Businesses to Know in 2023</title>
      <dc:creator>Sanket Maheshwari</dc:creator>
      <pubDate>Fri, 04 Aug 2023 15:58:30 +0000</pubDate>
      <link>https://dev.to/smaheshwari/5-essential-data-privacy-regulations-for-businesses-to-know-in-2023-20pb</link>
      <guid>https://dev.to/smaheshwari/5-essential-data-privacy-regulations-for-businesses-to-know-in-2023-20pb</guid>
      <description>&lt;p&gt;Just as everyone started to get more or less cozy with the regulatory landscape in data privacy/protection and individuals and businesses learned to navigate the shallow waters of data subject requests, risk management, and impact assessments – BOOM 💥 – another tidal wave of regulatory requirements and new challenges rushed in!&lt;/p&gt;

&lt;p&gt;2023 is the perfect moment to start internalizing new acronyms (get ready for &lt;strong&gt;#NIS2, #DORA, #DPDPB, #CPRA, #CCPA, #CPA, #CDPA, #UCPA, #VCDPA, #ADPPA, #PrivacyPenaltyBill&lt;/strong&gt;) and legislative acts they stand for.&lt;/p&gt;

&lt;p&gt;The underlying motive of the upcoming changes is to boost and enhance the cybersecurity postures of various organizations and manage evolving cyber risks more effectively.&lt;/p&gt;

&lt;p&gt;Here is a helicopter view of selected legal developments around the world:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EU – Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2)&lt;/li&gt;
&lt;li&gt;EU – Regulation on digital operational resilience for the financial sector (DORA)&lt;/li&gt;
&lt;li&gt;US – State &amp;amp; Federal privacy laws&lt;/li&gt;
&lt;li&gt;India – Digital Personal Data Protection Bill (DPDPB)&lt;/li&gt;
&lt;li&gt;Australia – Privacy Penalty Bill &amp;amp; overhaul of the Privacy Act 1988&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  NIS2
&lt;/h2&gt;

&lt;p&gt;According to ENISA, the general spending on cybersecurity is 41 % lower by organisations in the EU than by their US counterparts. With the arrival of NIS2, this ratio is expected to shift to cover this enormous gap at least partially. Conservative estimates are that NIS2 entry in force will translate into a ~22% increase in ICT spending over a 3–4-year period.&lt;/p&gt;

&lt;p&gt;NIS2 was published just before year-end, and EU Member States now have 21 months to transpose requirements and mechanisms described into national laws. The 2016 NIS Directive – despite shortcomings – served as a cornerstone for increasing Member States’ cybersecurity capabilities. Now, NIS2 will expand the scope and the list of impacted organizations. It is expected that as many as 160 000 organizations will be subject to this new legislation, including digital services providers (platforms and data centre services), electronic communications networks and services providers, manufacturing, food, and the public sector.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Like the SEC’s incoming Cybersecurity Disclosure requirements and Caremark decisions from the last few years, the NIS2 Directive emphasizes senior management’s role in providing oversight of a company’s cybersecurity program. The NIS2 Directive ups the ante of its predecessor, the NIS1 Directive, by holding senior management directly responsible for implementing the Directive’s requirements, where failure to do so can hold personal liability for the parties involved. While the pressure may seem to shift from the CISO to senior management more broadly, it continues to be critical for CISOs, like Commvault’s very own Javier Dominguez, to have a seat at the table with Directors and Officers. CISOs must be empowered to create and successfully execute robust cybersecurity risk management strategies through proper resourcing and support.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Leah Flynne&lt;br&gt;
Director Compliance @ Commvault&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4AqjlurY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n2y3pfz0a5hwjk7sxjjv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4AqjlurY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/n2y3pfz0a5hwjk7sxjjv.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NIS2 aims to strengthen cybersecurity postures by, amongst other: improving cybersecurity governance, addressing the security of supply chains, streamlining reporting obligations (early warnings/shortened notification periods), and introducing more stringent supervisory measures and stricter enforcement requirements.&lt;/p&gt;

&lt;p&gt;What can you do right now?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;First, try to understand which obligations will apply to your organization and in which compliance bucket your organization will fall into: “Essential Entity,” “Important Entity,” or maybe “other.”&lt;/li&gt;
&lt;li&gt;Next, see if you can create synergies and leverage existing technical and organizational measures implemented during preceding compliance efforts (e.g., GDPR, NIS1, etc.)&lt;/li&gt;
&lt;li&gt;Start looking for the right partners that can adequately support your compliance efforts. Engage your vendors in discussing the approach that best fits your organization.&lt;/li&gt;
&lt;li&gt;Last but not least, initiate planning for increased spending to address any remaining gaps. In compliance could result in administrative fines of up to 10 million euros or up to 2% of the total annual worldwide turnover of the organization.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;“Commvault team is closely monitoring the progress of the implementation of the requirements. With today’s guidance, the Commvault team is actively reviewing the contents of NIS2 and assessing how we are best aligned with them by preparing appropriate responses, both internal and external, through maturing the existing NIST governance framework (internationally recognized) set of controls and applying it to our Data Governance and Cybersecurity positions currently.”&lt;br&gt;
&lt;em&gt;Anthony Calabretta&lt;br&gt;
Manager IT Compliance @ Commvault&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  DORA
&lt;/h2&gt;

&lt;p&gt;DORA aims to achieve “a high common level of digital operational resilience,” mitigating cyber threats and ensuring resilient operations across the EU financial sector. It will become directly applicable from Jan 17th, 2025. It will impact the financial sector (banks, insurance companies, investment firms) and its ICT providers (i.e., cloud platforms) – roughly around 22 000 organizations.&lt;/p&gt;

&lt;p&gt;New requirements imposed by DORA will effectively boil down to reviewing and updating risk management practices. Financial sector customers will need to transfer as many regulatory risks as possible to ICT providers or apply different risk-mitigating strategies. In any case, ICT providers will need to be able to assure adherence to DORA’s requirements. The whole industry will also need to reassess contractual relations with vendors. DORA will incorporate requirements for contracts between financial companies and their critical ICT providers, including the location where data is processed, service level agreement descriptions, reporting requirements, rights of access, and circumstances that would lead to terminating the contract.&lt;/p&gt;

&lt;p&gt;In a separate post – Commvault’s Product Team will perform a more technical deep-dive into DORA’s requirements related to detection (art. 10), response and recovery (art. 11), and backup (art. 12).&lt;/p&gt;

&lt;h2&gt;
  
  
  US data privacy laws – CPRA/CCPA, CPA, CDPA, UCPA, VCDPA, ADPPA
&lt;/h2&gt;

&lt;p&gt;As of January 1st, 2023, California Privacy Rights Act (CPRA) amendments to the California Consumer Privacy Act 2018 went into effect. Many temporary exemptions in place expire, imposing additional obligations on companies dealing with California residents’ personal information, e.g., regarding employment-related personal data, opt-out from selling personal information.&lt;/p&gt;

&lt;p&gt;2023 is also the year when the Colorado Privacy Act (CPA), The Connecticut Data Privacy Act (CDPA), The Utah Consumer Privacy Act (UCPA), and The Virginia Consumer Data Privacy Act (VCDPA) will become effective. Legislative fragmentation risk is imminent and substantial, and this is the kind of risk that caused the European Union to harmonize the regulatory approach. Let us see whether the same will be true in 2023 in the case of the American Data Privacy and Protection Act (‘ADPPA’) – a proposal for a federal and general data privacy law.&lt;/p&gt;

&lt;h2&gt;
  
  
  India – DPDPB
&lt;/h2&gt;

&lt;p&gt;Indian legislators plan to introduce a very ambitious Digital Personal Data Protection Bill (DPDPB) this year. When enacted, long-awaited legislation will undoubtedly impact all kinds of organizations due to India’s role as a tech powerhouse and a global outsourcing hub.&lt;/p&gt;

&lt;h2&gt;
  
  
  Australia – Privacy Penalty Bill &amp;amp; overhaul of the Privacy Act
&lt;/h2&gt;

&lt;p&gt;Australian authorities announced yet another complete overhaul of the Privacy Act dated 1988. The current legislation was summarized as “out of date and not fit for purpose in the digital age.”&lt;/p&gt;

&lt;p&gt;In the meantime, still in 2022, Australia passed the Privacy Penalty Bill that increased privacy-related sanctions to levels comparable with trends introduced by GDPR (up to 50m AUD) and expanded regulatory powers of the Office of the Australian Information Commissioner (OAIC) and the Australian Communications and Media Authority (ACMA).&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;The relentless compliance clock just started ticking again. Cross-functional teams consisting of IT, compliance, privacy, legal professionals, and business analysts will spend considerable amounts of time analysing the impact of the cloudburst of legislative developments that emerged at the end of last year and will materialize throughout 2023.&lt;/p&gt;

&lt;p&gt;Be aware that the legislative developments presented here could be more comprehensive. You can be sure, however, that they will become standard talking points not only in 2023 but also for the years to come.&lt;/p&gt;

&lt;p&gt;Content Syndicated from: &lt;a href="https://www.commvault.com/blogs/5-essential-data-privacy-regulations"&gt;5 Essential Data Privacy Regulations for Businesses to Know in 2023&lt;/a&gt;&lt;/p&gt;

</description>
      <category>data</category>
      <category>privacy</category>
      <category>security</category>
    </item>
    <item>
      <title>Simplifying Cloud Database Protection for Hybrid and Multi-Cloud</title>
      <dc:creator>Sanket Maheshwari</dc:creator>
      <pubDate>Fri, 28 Jul 2023 17:10:11 +0000</pubDate>
      <link>https://dev.to/smaheshwari/simplifying-cloud-database-protection-for-hybrid-and-multi-cloud-1fb7</link>
      <guid>https://dev.to/smaheshwari/simplifying-cloud-database-protection-for-hybrid-and-multi-cloud-1fb7</guid>
      <description>&lt;p&gt;The rise of cloud computing has revolutionized the way organizations manage their data and has quickly become the preferred method for storing and accessing critical information. Pre-pandemic – cloud adoption for databases was growing at an exponential rate, with more and more organizations making the switch to single cloud vendors. Post-pandemic – Cloud database adoption continues to grow but as customers become more cloud-savvy most enterprises are embracing a multi-cloud and/or hybrid cloud approach to get the best of both/multiple worlds for their database workloads.&lt;/p&gt;

&lt;p&gt;According to a Flexera report, 89% of all enterprises use multi-cloud while 80% of enterprises have a hybrid cloud strategy with single or multiple clouds.&lt;/p&gt;

&lt;p&gt;A hybrid or multi-cloud database strategy comes with its own challenges –&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Complexity - Keeping track of multiple tools for multiple clouds and multiple database types.&lt;/li&gt;
&lt;li&gt;Cost – Redundant costs increase as teams across an organization employ their own tools, sometimes doubling up on capabilities and infrastructure.&lt;/li&gt;
&lt;li&gt;Security – Security teams must defend against new threats while managing cloud database services and tools that are different from one cloud provider to the next. Security becomes more challenging with an ever-growing attack surface.
&lt;strong&gt;Here is how Commvault helps mitigate these challenges for cloud database protection&lt;/strong&gt; –&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Management made simple&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TvXP53UW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tpdsldw74q65zp9x83ey.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TvXP53UW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tpdsldw74q65zp9x83ey.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Single UI and API-first support that gives simplified &amp;amp; unified control with cloud-native integration to automatically discover, protect and manage database copy lifecycle. Ability to define RPO policies that are uniform across hybrid cloud &amp;amp; multi-cloud with a blend of snap and backup. Ability to protect instances, complete regions, or multiple regions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Broad workload, cloud, and multi-cloud portability support&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Commvault has the largest cloud, database workload, and multi-cloud portability support as compared to any backup vendor in the market today thus meeting the customer’s data protection needs no matter where they are in their multi-cloud journey.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost Savings&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most backup vendors use snap as a backup strategy for their cloud databases. They provide snap orchestration which, while easing management overhead does not reduce the snap storage costs. Commvault on the other hand provides customers with a unique way to blend snap and export-based backups which leads to significant reduction in cloud database protection costs as compared to other solutions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Secure access to the Commvault environment with RBAC-based control and multi-factor authentication. Ensure that backups are tamper-proof with encryption and air-gapped immutability. &lt;br&gt;
In conclusion, Commvault helps to manage databases on-premises and across multiple clouds using a single platform. We continue to innovate and bring new products and solutions to the ever-changing database eco system to provide simple, comprehensive, secure and cost-effective data protection and recovery capabilities where customers needed it the most.&lt;/p&gt;

&lt;p&gt;To learn more:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.commvault.com/backup-solutions/application-backup"&gt;https://www.commvault.com/backup-solutions/application-backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.commvault.com/supported-technologies#databases"&gt;https://www.commvault.com/supported-technologies#databases&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;References&lt;/p&gt;

&lt;p&gt;1- Source: &lt;a href="https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/"&gt;https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/&lt;/a&gt;&lt;br&gt;
2 - Content Syndication: &lt;a href="https://www.commvault.com/blogs/simplifying-cloud-database-protection"&gt;https://www.commvault.com/blogs/simplifying-cloud-database-protection&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>database</category>
      <category>security</category>
    </item>
    <item>
      <title>Data Security through Zero Trust and a Ransomware Strategy</title>
      <dc:creator>Sanket Maheshwari</dc:creator>
      <pubDate>Fri, 21 Jul 2023 14:31:29 +0000</pubDate>
      <link>https://dev.to/smaheshwari/data-security-through-zero-trust-and-a-ransomware-strategy-159h</link>
      <guid>https://dev.to/smaheshwari/data-security-through-zero-trust-and-a-ransomware-strategy-159h</guid>
      <description>&lt;p&gt;Zero trust architecture is central to an organization’s security posture to mitigate cyberattacks, and the Defense Department recently released its Zero Trust Strategy and Roadmap on its plan to get the DOD to a Zero Trust architecture by 2027.&lt;/p&gt;

&lt;p&gt;A zero-trust architecture provides the foundations for micro-segmentation of the IT landscape, access limited with the Least Privilege principle, and all communication to and between the micro-segments being authenticated, audited, and verified3. The underlying philosophy for zero trust is never assume trust, but continuously validate trust, so bad actors don’t get in. Companies, organizations and government agencies need to make sure that even users inside a network can’t do serious damage.&lt;/p&gt;

&lt;p&gt;Conent Syndicated from &lt;a href="https://www.commvault.com/blogs/data-security-through-zero-trust"&gt;Data Security through Zero Trust and a Ransomware Strategy&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Flag Unusual Behavior&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Zero trust principles ensure user access is continuously validated and monitored for Authentication and Authorization while constantly Auditing. Commvault leverages security controls such as multi-factor authentication for everyday administrative tasks, privacy locks, and data encryption. User access can be compartmentalized, explicitly denying CommCell level access, while applying roles to micro-segmented groups of resources through multi-tenant configurations. Zero trust controls help limit internal lateral movement to prevent data loss and unauthorized access to data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sblDgWWm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/uml1m06e4ffp6idv3fri.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sblDgWWm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/uml1m06e4ffp6idv3fri.png" alt="Image description" width="800" height="139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Apply Zero Trust Controls&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--H1PKFUIe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/juwy6ala0ahng8oames3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--H1PKFUIe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/juwy6ala0ahng8oames3.png" alt="Image description" width="388" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Commvault makes it simple to apply zero trust AAA controls by using the Security Health Assessment Dashboard. The dashboard provides a single pane of glass for identifying controls, highlighting potential risks within the backup environment, and recommending interactive actions to apply controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Add Layers of Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To help strengthen the resilience of your data infrastructure, the NIST Cybersecurity Framework focuses on five primary pillars for a successful and holistic cybersecurity program. Attention to these pillars can help your organization in developing a comprehensive risk management strategy. Commvault has built these security pillars into our data protection software and policies without the incremental management overhead. The Commvault data protection and management platform include five security layers:&lt;/p&gt;

&lt;p&gt;-Identify&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Protect&lt;/li&gt;
&lt;li&gt;Monitor&lt;/li&gt;
&lt;li&gt;Respond&lt;/li&gt;
&lt;li&gt;Recover&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our multi-layered security consists of feature sets, guidelines, and best practices to manage cybersecurity risk and ensure data is readily available. We help protect and isolate your data, provide proactive monitoring and alerts, and enable fast restores. Advanced technologies powered by artificial intelligence and machine learning, including honeypots, make it possible to detect and provide alerts on potential attacks as they happen so you can respond quickly. By keeping your backups out of danger and making it possible to restore them within your Service Level Agreements, you can minimize the impact of a ransomware attack so you can get back to business right away (and avoid paying expensive ransoms).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Immutability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Protecting and isolating your backup copies is critical for data integrity and security. Therefore, we have taken an agnostic approach to immutability. With Commvault, you do not need special hardware or cloud storage accounts to lock backup data against ransomware threats. If you happen to have Write-Once, Read Many (WORM)-, object lock- or snapshot-supported hardware (which Commvault fully supports), you can still use Commvault’s built-in locking capabilities to complement and layer on top of existing security controls. Commvault’s ability to support layered defenses for securing data sets against ransomware ensures that your organization benefits from a sound cyber recovery-ready architecture. Here are some elements to include in your immutability architecture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access locks to isolate copy store against ransomware&lt;/li&gt;
&lt;li&gt;Immutability with lifecycle locks to reduce risks, balanced with consumption impact&lt;/li&gt;
&lt;li&gt;Air-gap isolation network and controls&lt;/li&gt;
&lt;li&gt;Configuration governance to protect against intentional or accidental changes&lt;/li&gt;
&lt;li&gt;Concurrent Recovery performance – reduce latency with due importance to speed and cost impact&lt;/li&gt;
&lt;li&gt;Automatic patching to stay current, simplifying management and maintenance of data protection infrastructure&lt;/li&gt;
&lt;li&gt;Alignment with the 3-2-1 data protection philosophy (3 copies of data, 2 different media, 1 vaulted copy)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more about Commvault’s immutable infrastructure architecture &lt;a href="https://cloud.kapostcontent.net/pub/6ca15136-2ef2-480d-a0b3-40880bd364f8/commvaults-immutable-infrastructure-architecture?kui=53TOsG8j3h3pz4vQ-ZDi4w&amp;amp;_gl=1*kbqoal*_gcl_au*MzI5NjQxMjEzLjE2ODkxNzg5MTk."&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber Deception Technology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NCgYAlTB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mu5u1lti59830fue920o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NCgYAlTB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mu5u1lti59830fue920o.png" alt="Image description" width="450" height="153"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While delivering business continuity is a critical element of any multi-layered strategy, a strong security posture also includes proactive defense technology that actively surfaces and engages unknown and zero-day threats. &lt;a href="https://metallic.io/threatwise-cyber-deception"&gt;Metallic® ThreatWise&lt;/a&gt; changes the game in ransomware protection, combining sophisticated early warning and early action with comprehensive data protection. It enables businesses of every size to neutralize silent attacks before they cause harm, detecting and diverting the stealthiest of zero-day attacks, which evade conventional detection technology and circumvent security controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Ransomware Strategy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WpP2j9gR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lcy4pdhmwslr3sbwezqi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WpP2j9gR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lcy4pdhmwslr3sbwezqi.png" alt="Image description" width="454" height="234"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You need a plan to remain steadfast against ransomware. Beyond simply adhering to zero trust principles and hoping for the best, the ultimate solution can manage and substantially reduce the impact of a ransomware attack. It can reduce costs for your organization by utilizing one centralized management platform, so security teams don’t have multiple product points to log in and out of. It can increase the visibility of your data through a single landscape to minimize complexity for your teams. And finally, it can protect what matters most by providing the broadest workload coverage and rapid recovery capabilities through a unified approach. For all of this to happen, a solution must embrace Zero Loss Strategy. Learn more &lt;a href="https://www.commvault.com/resources/a-new-approach-to-ransomware-protection"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Become Less Vulnerable&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The reality is your organization needs to be prepared and take proactive steps to protect your data and work with a provider who offers ransomware protection and recovery solutions. How prepared are you? Take our &lt;a href="https://www.commvault.com/ransomware/risk-assessment"&gt;free risk assessment&lt;/a&gt; to find out. &lt;/p&gt;

</description>
      <category>cloud</category>
      <category>community</category>
      <category>security</category>
    </item>
  </channel>
</rss>
