Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Granular S3 Restore with Clumio Prefix Filtering

commvault
02/22/2026
2
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Clumio enables granular S3 restore operations at the prefix and file-type level, allowing selective recovery without restoring entire buckets.
  • The demo shows a ransomware recovery scenario where compromised Excel files are overwritten with clean copies from a previous backup point using object key filtering.
  • Organizations can achieve faster recovery times and reduced business disruption by targeting specific data subsets rather than performing full bucket restores.

Summary

This demonstration showcases Clumio's granular S3 restore capabilities, focusing on prefix-level and file-type filtering for targeted recovery operations. The walkthrough illustrates a practical ransomware recovery scenario where an operations team's Excel files within a specific S3 bucket prefix need to be restored to a clean state from a previous backup point. The demo emphasizes the efficiency of restoring only specific file types rather than entire buckets, highlighting how organizations can achieve faster recovery times and minimize business disruption. The workflow demonstrates calendar-based restore point selection, object key filtering, preview verification, and overwrite capabilities. By enabling file-level granularity within S3 prefixes, Clumio positions its solution as a precision tool for managing complex cloud storage environments where selective recovery is critical for operational continuity and cost optimization.

Chapters

0:00 - Introduction to Prefix Restore
0:44 - Navigating to S3 Restore
1:06 - Filtering and Previewing Files
1:30 - Executing the Restore Operation
1:54 - Verifying Recovery in AWS

Key Quotes

0:04 "In this demo, we will be showing you how to restore specific file types from an S3 bucket prefix to a previous point in time."
0:10 "This is particularly useful when you need to overwrite potentially compromised files with clean copies from a healthy backup."
2:20 "This targeted approach means faster recovery times and less disruption of your business operations."
Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Demo
  • How-To
  • Backup & Recovery
  • S3 backup and recovery
  • Prefix-level data protection
  • Ransomware recovery
  • File-type filtering
  • Cloud object storage
  • Granular restore operations
  • AWS S3 management
  • Data corruption remediation
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Granular S3 Restore with Clumio Prefix Filtering

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version