Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Cohesity & Red Hat Partnership for Cyber Resilience

Cohesity
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cohesity and Red Hat have expanded their partnership to deliver integrated data protection and cyber resilience for hybrid cloud, virtualization, and container environments running on OpenShift.
  • Over 50% of Cohesity customers now leverage Red Hat technologies, with IBM exclusively OEMing Cohesity Data Protect as IBM Defender Data Protect and investing equity in Cohesity.
  • The joint solution combines zero-trust architecture with immutability, strict access controls, and cleanroom technology to protect against sophisticated cyberattacks across multi-cloud environments.
  • Following the Veritas acquisition, Cohesity now serves 13,000 customers including 85% of the Fortune 100 with 2x the R&D investment of competitors in the data security space.

Strategic Partnership for Hybrid Cloud Data Protection

Cohesity CEO Sanjay Poonen and Red Hat CEO Matt Hicks discuss their expanded partnership combining Cohesity's data security platform with Red Hat's virtualization and container technologies. The collaboration addresses the critical need for robust data protection as enterprises modernize their infrastructure with hybrid cloud, OpenShift virtualization, and AI workloads. Over 50% of Cohesity customers now run on Red Hat technologies including the core Linux platform, Red Hat Virtualization, OpenShift containers, Ansible playbooks, and Pacemaker clusters. IBM's exclusive OEM of Cohesity Data Protect as IBM Defender Data Protect, along with IBM's equity investment in Cohesity, strengthens the go-to-market alignment between the companies.

Zero-Trust Architecture and Cyber Resilience Capabilities

The joint solution delivers comprehensive cyber resilience through Cohesity's platform running on Red Hat with zero-trust principles at its core. Key security features include immutability to prevent data tampering, strict access controls to limit exposure, and cleanroom technology for secure recovery environments. This architecture provides enterprises with peace of mind that their critical data remains protected against sophisticated cyberattacks while simplifying data management operations. The partnership becomes increasingly strategic following Cohesity's acquisition of Veritas' enterprise data protection portfolio, creating a combined entity with over 5,000 employees, 13,000 customers including 85% of the Fortune 100, and double the R&D investment of competitors.

Chapters

0:00 - Introduction and Partnership Overview
0:54 - Red Hat's Hybrid Cloud Platform Approach
2:02 - Drivers for Virtualization and Container Growth
3:09 - Three Pillars of Partnership Integration
5:52 - Cohesity-Veritas Acquisition Impact
7:27 - Closing Remarks and 2025 Vision

Key Quotes

1:00 "We've been focused on the benefits of hybrid cloud for almost a decade at this point, but changes in virtualization and technology shifts in AI have made it really an imperative for enterprises across every industry."
2:56 "I would argue that AI data going forward will be even more critical. So I think your ability to span across their data needs, our ability to span across their operating environment and runtime needs, brings that value really clearly to customers."
4:11 "Over 50% of our customers, Matt, are actually now betting on what we're finding on Red Hat, whether it's the core Linux platform, whether it's Red Hat Virtualization, whether it's OpenShift containers, Ansible playbooks, or pacemaker clusters for physical virtual environments."
6:05 "We're now a over 5,000-employee base. We've got 2x the R&D of many of our competitors, over 13,000 customers with 85% of the Fortune 100, 70% of the Global 500, and a passion for innovation."

Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Cloud » Hybrid Cloud
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Zero Trust
  • Executive Briefing
  • Partnership Announcement
  • Cyber Resilience
  • Hybrid Cloud
  • OpenShift Virtualization
  • Zero Trust Security
  • Container Security
  • Enterprise Backup
  • Strategic Partnerships
  • Mergers & Acquisitions
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cohesity & Red Hat Partnership for Cyber Resilience

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version