Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Data Isolation & Recovery with Cohesity FortKnox

Cohesity
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cohesity FortKnox provides fully managed data isolation through cybervaulting, maintaining immutable backup copies in secure cloud vaults to protect against ransomware attacks targeting backup environments.
  • The Quorum authorization framework requires multiple approvers for sensitive operations, ensuring that critical changes like data recovery require sign-off from at least two authorized individuals.
  • Protection policies enable customizable configurations for how data is protected, replicated, and vaulted, with data lock features preventing unauthorized tampering or deletion.
  • The platform supports instant VM recovery from vault snapshots with configurable destination options, all managed through a centralized dashboard providing visibility across multiple cloud regions.

FortKnox Cybervaulting and Data Isolation

This demonstration introduces Cohesity FortKnox, a fully managed data isolation solution designed to protect against ransomware attacks through cybervaulting. The solution maintains immutable copies of data in secure cloud-based storage vaults across multiple regions, accessible through a centralized dashboard. Organizations use FortKnox for data retention, auditing, recovery, and enhancing resilience against ransomware attacks that increasingly target backup environments. The platform addresses the critical challenge that attackers rely on victims not having valid, complete backups, often forcing ransom payments.

Quorum Authorization and Recovery Workflow

FortKnox implements a Quorum authorization framework that requires multiple approvers to authorize sensitive operations, functioning like a bank safety deposit box requiring two keys. The system allows organizations to create approval groups with customizable permissions for different operations and platforms in multi-cloud environments. The demonstration walks through a complete VM recovery workflow, from selecting recovery points and configuring destination options to the quorum approval process. Protection policies define how objects are protected, replicated, and vaulted, with data lock features preventing unauthorized tampering or deletion of backups and vaulted data.

Chapters

0:00 - Introduction to FortKnox
0:49 - Cloud Vaults Dashboard
1:10 - Quorum Authorization Framework
2:43 - Protection View and Policies
3:34 - Adding Vault Protection
4:24 - VM Recovery Workflow

Key Quotes

0:38 "Ransomware can also target backup environments, as attackers rely on their victims not having a valid and complete backup, often leading them to pay the ransom."
1:27 "The Quorum system functions similarly to a bank's safety deposit Box, which requires both your key and a key from a bank to open."
1:37 "Any significant changes require authorization from at least two people to ensure the safety of your data."
3:53 "The data lock feature ensures the security of your backups and vaulted data by preventing any unauthorized tampering or deletion."
Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Backup & Recovery
  • Demo
  • Technical Deep Dive
  • Cybervaulting
  • Data Isolation
  • Ransomware Protection
  • Immutable Backups
  • Multi-Cloud Storage
  • Quorum Authorization
  • VM Recovery
  • Data Lock
  • Protection Policies
  • Backup Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Data Isolation & Recovery with Cohesity FortKnox

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version