Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Ransomware Resilience with Commvault HyperScale

commvault
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Commvault expanded its HyperScale portfolio into three purpose-built solutions—X for core enterprise, Edge for remote/branch offices, and Flex for massive scale-out workloads—all built on hardened VaultOS with immutable storage and zero-trust architecture to combat the 88% ransomware attack rate.
  • Fortune Brands deployed HyperScale X and Edge to consolidate multiple data protection solutions across brands like Moen and Master Lock, filling the gap between large enterprise and small remote sites while eliminating VMware dependencies and reducing costs.
  • New SaaS docking for HyperScale Edge centralizes deployment through Command Center, enabling guided setup, API-driven automation for multi-site rollouts, and real-time monitoring that dramatically accelerates time to value.
  • All HyperScale solutions incorporate layered security including VaultOS hardened OS, immutable and indelible data protection, zero-trust access controls, and SSH restrictions to prevent tampering during active ransomware attacks.
  • The portfolio addresses modern data protection challenges including distributed edge vulnerability, AI-driven data growth, data residency compliance requirements, and the need to process data closer to the source with reduced latency.

The Ransomware Challenge and Portfolio Expansion

This SHIFT 2025 session addresses the escalating ransomware threat facing enterprises, with 88% of organizations experiencing attempted attacks in the past year. Commvault positions its expanded HyperScale portfolio as the answer to modern data protection challenges including distributed data growth, AI-driven workload expansion, and edge vulnerability. The presentation introduces three purpose-built solutions: HyperScale X for core enterprise environments, HyperScale Edge for remote offices and branch locations, and HyperScale Flex for massive scale-out workloads. Each solution is built on VaultOS, Commvault's hardened Linux platform, and incorporates immutable storage, zero-trust architecture, and layered security designed to prevent tampering even during active attacks.

Customer Validation and Real-World Implementation

Fortune Brands Principal Infrastructure Architect Lee Lindstrom provides customer perspective on deploying HyperScale across a multi-brand enterprise environment. Lindstrom describes how Fortune Brands consolidated multiple data protection solutions across business units including Moen, Master Lock, Yale, and Thermotru. The company initially deployed HyperScale X for large enterprise workloads and remote appliances for small sites, but identified a significant gap for mid-sized locations. HyperScale Edge filled this gap by providing appropriately sized, cost-effective protection without dependencies on VMware or other external platforms. Lindstrom emphasizes the security benefits of SSH access controls and the operational simplicity of pre-configured ISO deployment with guided setup wizards.

SaaS Docking Innovation and Deployment Acceleration

The session introduces SaaS docking for HyperScale Edge, a new deployment model that centralizes configuration and management through Commvault's Command Center SaaS console. This approach addresses traditional deployment challenges including resource-intensive setup, physical access requirements, and time-consuming configuration steps that increase operational costs when scaling to multiple sites. The guided setup process walks administrators through system details, network configuration, and credential management while following built-in best practices for consistent policy-driven deployment. For larger environments, the Commvault API enables automated configuration at scale, applying predefined settings across global locations. Once devices are powered on and connected, they automatically link to Commvault SaaS, with Command Center providing real-time monitoring of installation progress, system health, and full lifecycle management across all locations.

Chapters

0:00 - Introduction and Agenda
1:06 - Ransomware Threat Landscape
3:03 - Data Management Challenges
3:20 - HyperScale Portfolio Overview
5:18 - Security Architecture Deep Dive
6:26 - Fortune Brands Customer Story
11:59 - SaaS Docking Introduction
14:26 - SaaS Docking Demonstration
17:20 - Portfolio Summary and Resources

Key Quotes

1:06 "... 88% of organizations experienced attempted ransomware attacks within the last 12 months. That's almost 9 out of 10."
2:51 "Traditional backup solutions weren't built for today's threats or tomorrow's workloads. You need a modern, cyber-resilient solution."
4:47 "Together, Edge, X, and Flex solutions, they create a full spectrum of protection that can satisfy the needs of any organization. No gaps, no compromises, just complete resilience everywhere your data lives."
8:51 "There was a big gap in between the Hyperscale X and the remote appliances. That's where we were looking for the Edge product to help fill that gap."
10:04 "We were deploying Commvault on virtual media agents attached to NAS storage to protect it, which worked well, but it was not a hardened system, and it depended on VMware and other outside forces to do its data protection."
11:29 "Not being able to access it via SSH unless you go into Commvault and allow and enable connectivity into it is a great security feature that we use to harden that data protection platform."
Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Backup & Recovery
  • Technical Deep Dive
  • Customer Story
  • Demo
  • Ransomware Protection
  • Data Backup and Recovery
  • Edge Computing
  • Immutable Storage
  • Zero Trust Architecture
  • Hybrid Cloud Data Protection
  • SaaS Management
  • Cyber Resilience
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Ransomware Resilience with Commvault HyperScale

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version