Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Data Isolation & Recovery with Cohesity FortKnox

Cohesity
03/12/2026
6
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cohesity FortKnox provides fully managed data isolation through cybervaulting, maintaining immutable backup copies in secure cloud vaults to protect against ransomware attacks targeting backup environments.
  • The Quorum authorization framework requires multiple approvers for sensitive operations, ensuring that critical changes like data recovery require sign-off from at least two authorized individuals.
  • Protection policies enable customizable configurations for how data is protected, replicated, and vaulted, with data lock features preventing unauthorized tampering or deletion.
  • The platform supports instant VM recovery from vault snapshots with configurable destination options, all managed through a centralized dashboard providing visibility across multiple cloud regions.

FortKnox Cybervaulting and Data Isolation

This demonstration introduces Cohesity FortKnox, a fully managed data isolation solution designed to protect against ransomware attacks through cybervaulting. The solution maintains immutable copies of data in secure cloud-based storage vaults across multiple regions, accessible through a centralized dashboard. Organizations use FortKnox for data retention, auditing, recovery, and enhancing resilience against ransomware attacks that increasingly target backup environments. The platform addresses the critical challenge that attackers rely on victims not having valid, complete backups, often forcing ransom payments.

Quorum Authorization and Recovery Workflow

FortKnox implements a Quorum authorization framework that requires multiple approvers to authorize sensitive operations, functioning like a bank safety deposit box requiring two keys. The system allows organizations to create approval groups with customizable permissions for different operations and platforms in multi-cloud environments. The demonstration walks through a complete VM recovery workflow, from selecting recovery points and configuring destination options to the quorum approval process. Protection policies define how objects are protected, replicated, and vaulted, with data lock features preventing unauthorized tampering or deletion of backups and vaulted data.

Chapters

0:00 - Introduction to FortKnox
0:49 - Cloud Vaults Dashboard
1:10 - Quorum Authorization Framework
2:43 - Protection View and Policies
3:34 - Adding Vault Protection
4:24 - VM Recovery Workflow

Key Quotes

0:38 "Ransomware can also target backup environments, as attackers rely on their victims not having a valid and complete backup, often leading them to pay the ransom."
1:27 "The Quorum system functions similarly to a bank's safety deposit Box, which requires both your key and a key from a bank to open."
1:37 "Any significant changes require authorization from at least two people to ensure the safety of your data."
3:53 "The data lock feature ensures the security of your backups and vaulted data by preventing any unauthorized tampering or deletion."
Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Backup & Recovery
  • Demo
  • Technical Deep Dive
  • Cybervaulting
  • Data Isolation
  • Ransomware Protection
  • Immutable Backups
  • Multi-Cloud Storage
  • Quorum Authorization
  • VM Recovery
  • Data Lock
  • Protection Policies
  • Backup Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Data Isolation & Recovery with Cohesity FortKnox

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version