Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Ransomware Resilience with Commvault HyperScale

Commvault
03/12/2026
32
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Commvault expanded its HyperScale portfolio into three purpose-built solutions—X for core enterprise, Edge for remote/branch offices, and Flex for massive scale-out workloads—all built on hardened VaultOS with immutable storage and zero-trust architecture to combat the 88% ransomware attack rate.
  • Fortune Brands deployed HyperScale X and Edge to consolidate multiple data protection solutions across brands like Moen and Master Lock, filling the gap between large enterprise and small remote sites while eliminating VMware dependencies and reducing costs.
  • New SaaS docking for HyperScale Edge centralizes deployment through Command Center, enabling guided setup, API-driven automation for multi-site rollouts, and real-time monitoring that dramatically accelerates time to value.
  • All HyperScale solutions incorporate layered security including VaultOS hardened OS, immutable and indelible data protection, zero-trust access controls, and SSH restrictions to prevent tampering during active ransomware attacks.
  • The portfolio addresses modern data protection challenges including distributed edge vulnerability, AI-driven data growth, data residency compliance requirements, and the need to process data closer to the source with reduced latency.

The Ransomware Challenge and Portfolio Expansion

This SHIFT 2025 session addresses the escalating ransomware threat facing enterprises, with 88% of organizations experiencing attempted attacks in the past year. Commvault positions its expanded HyperScale portfolio as the answer to modern data protection challenges including distributed data growth, AI-driven workload expansion, and edge vulnerability. The presentation introduces three purpose-built solutions: HyperScale X for core enterprise environments, HyperScale Edge for remote offices and branch locations, and HyperScale Flex for massive scale-out workloads. Each solution is built on VaultOS, Commvault's hardened Linux platform, and incorporates immutable storage, zero-trust architecture, and layered security designed to prevent tampering even during active attacks.

Customer Validation and Real-World Implementation

Fortune Brands Principal Infrastructure Architect Lee Lindstrom provides customer perspective on deploying HyperScale across a multi-brand enterprise environment. Lindstrom describes how Fortune Brands consolidated multiple data protection solutions across business units including Moen, Master Lock, Yale, and Thermotru. The company initially deployed HyperScale X for large enterprise workloads and remote appliances for small sites, but identified a significant gap for mid-sized locations. HyperScale Edge filled this gap by providing appropriately sized, cost-effective protection without dependencies on VMware or other external platforms. Lindstrom emphasizes the security benefits of SSH access controls and the operational simplicity of pre-configured ISO deployment with guided setup wizards.

SaaS Docking Innovation and Deployment Acceleration

The session introduces SaaS docking for HyperScale Edge, a new deployment model that centralizes configuration and management through Commvault's Command Center SaaS console. This approach addresses traditional deployment challenges including resource-intensive setup, physical access requirements, and time-consuming configuration steps that increase operational costs when scaling to multiple sites. The guided setup process walks administrators through system details, network configuration, and credential management while following built-in best practices for consistent policy-driven deployment. For larger environments, the Commvault API enables automated configuration at scale, applying predefined settings across global locations. Once devices are powered on and connected, they automatically link to Commvault SaaS, with Command Center providing real-time monitoring of installation progress, system health, and full lifecycle management across all locations.

Chapters

0:00 - Introduction and Agenda
1:06 - Ransomware Threat Landscape
3:03 - Data Management Challenges
3:20 - HyperScale Portfolio Overview
5:18 - Security Architecture Deep Dive
6:26 - Fortune Brands Customer Story
11:59 - SaaS Docking Introduction
14:26 - SaaS Docking Demonstration
17:20 - Portfolio Summary and Resources

Key Quotes

1:06 "... 88% of organizations experienced attempted ransomware attacks within the last 12 months. That's almost 9 out of 10."
2:51 "Traditional backup solutions weren't built for today's threats or tomorrow's workloads. You need a modern, cyber-resilient solution."
4:47 "Together, Edge, X, and Flex solutions, they create a full spectrum of protection that can satisfy the needs of any organization. No gaps, no compromises, just complete resilience everywhere your data lives."
8:51 "There was a big gap in between the Hyperscale X and the remote appliances. That's where we were looking for the Edge product to help fill that gap."
10:04 "We were deploying Commvault on virtual media agents attached to NAS storage to protect it, which worked well, but it was not a hardened system, and it depended on VMware and other outside forces to do its data protection."
11:29 "Not being able to access it via SSH unless you go into Commvault and allow and enable connectivity into it is a great security feature that we use to harden that data protection platform."
Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Zero Trust
  • » Cybersecurity » Cloud Security
  • » Data Protection
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Backup & Recovery
  • Technical Deep Dive
  • Customer Story
  • Demo
  • Ransomware Protection
  • Data Backup and Recovery
  • Edge Computing
  • Immutable Storage
  • Zero Trust Architecture
  • Hybrid Cloud Data Protection
  • SaaS Management
  • Cyber Resilience
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Ransomware Resilience with Commvault HyperScale

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version