Commvault Expands Threat Scan with Layered Threat Detection to Advance Verified Clean Recoveries
Commvault Expands Threat Scan with Layered Threat Detection to Advance Verified Clean Recoveries |
| [18-March-2026] |
Delivers 'defense-in-depth' with rapid IOC-based hunting and advanced file level inspection; integrates threat hunting with Synthetic Recovery to unify resilience workflows TINTON FALLS, N.J., March 18, 2026 /PRNewswire/ -- Commvault (NASDAQ: CVLT), a leader in unified resilience at enterprise scale, today announced expanded threat hunting capabilities within Commvault Cloud Threat Scan. The enhancements help organizations rapidly identify risks within backup environments and recover validated clean data, reducing reinfection risks and prolonged downtime. According to recent reports, the median dwell time for a non-actor disclosed breach is 24 days1, giving attackers ample opportunity to silently embed malicious code across systems. While security operations teams often possess intelligence tied to specific indicators of compromise (IOCs) or indicators of attack (IOAs), that intelligence must also be applied across backup data before restoration begins. Without clear visibility into backup integrity, organizations risk reintroducing threats, extending outages, and compounding business disruption. Intelligence-Driven Threat Hunting at Enterprise Scale
Together, these detection modes allow close collaboration across incident response and recovery teams to isolate affected data and make informed recovery decisions. They can schedule recurring scans for continuous monitoring or conduct targeted searches during active incident response scenarios, providing flexibility for both ongoing protection and time-sensitive response. "In an era where attacks adapt faster than defenses, our priority is to get ahead of every threat," said Dr. Erika Voss, Chief Security Officer at Blue Yonder. "Being able to validate recovery data against current threat indicators is one way to stay ahead of it — ensuring we have more control in an unpredictable landscape." From Detection to Verified Recovery "We're seeing a fundamental shift in how organizations approach recovery operations. The market is demanding integrated solutions that combine threat detection with recovery workflows, and Commvault's layered approach to verified clean recoveries represents where the industry is heading," said Fernando Montenegro, VP and Practice Lead Cybersecurity at The Futurum Group. This announcement continues to demonstrate how Commvault is advancing the ResOps operating model. Instead of operating in silos across IT and security, ResOps connects people, processes, and technology, so organizations can manage resilience as a continuous enterprise-wide discipline. "Security and IT teams need to operate from the same playbook during an incident. Threat intelligence at scale is increasingly table stakes — what sets us apart is what happens next," said Pranay Ahlawat, Chief Technology and AI Officer at Commvault. "By layering our proprietary signal correlation and AI-enabled algorithms on top of targeted threat hunting, and connecting that directly to verified recovery, we give organizations something powerful: not just the ability to find threats fast, but the confidence that what they restore is clean." Availability Join Commvault at RSAC 2026 About Commvault 1 Verizon. (2025). 2025 Data Breach Investigations Report. https://www.verizon.com/business/resources/T16f/reports/2025-dbir-data-breach-investigations-report.pdf
SOURCE COMMVAULT | ||
Company Codes: NASDAQ-NMS:CVLT,NASDAQ-GS:CVLT |












