Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Cohesity & Red Hat Partnership for Cyber Resilience

Cohesity
03/20/2026
33
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cohesity and Red Hat have expanded their partnership to deliver integrated data protection and cyber resilience for hybrid cloud, virtualization, and container environments running on OpenShift.
  • Over 50% of Cohesity customers now leverage Red Hat technologies, with IBM exclusively OEMing Cohesity Data Protect as IBM Defender Data Protect and investing equity in Cohesity.
  • The joint solution combines zero-trust architecture with immutability, strict access controls, and cleanroom technology to protect against sophisticated cyberattacks across multi-cloud environments.
  • Following the Veritas acquisition, Cohesity now serves 13,000 customers including 85% of the Fortune 100 with 2x the R&D investment of competitors in the data security space.

Strategic Partnership for Hybrid Cloud Data Protection

Cohesity CEO Sanjay Poonen and Red Hat CEO Matt Hicks discuss their expanded partnership combining Cohesity's data security platform with Red Hat's virtualization and container technologies. The collaboration addresses the critical need for robust data protection as enterprises modernize their infrastructure with hybrid cloud, OpenShift virtualization, and AI workloads. Over 50% of Cohesity customers now run on Red Hat technologies including the core Linux platform, Red Hat Virtualization, OpenShift containers, Ansible playbooks, and Pacemaker clusters. IBM's exclusive OEM of Cohesity Data Protect as IBM Defender Data Protect, along with IBM's equity investment in Cohesity, strengthens the go-to-market alignment between the companies.

Zero-Trust Architecture and Cyber Resilience Capabilities

The joint solution delivers comprehensive cyber resilience through Cohesity's platform running on Red Hat with zero-trust principles at its core. Key security features include immutability to prevent data tampering, strict access controls to limit exposure, and cleanroom technology for secure recovery environments. This architecture provides enterprises with peace of mind that their critical data remains protected against sophisticated cyberattacks while simplifying data management operations. The partnership becomes increasingly strategic following Cohesity's acquisition of Veritas' enterprise data protection portfolio, creating a combined entity with over 5,000 employees, 13,000 customers including 85% of the Fortune 100, and double the R&D investment of competitors.

Chapters

0:00 - Introduction and Partnership Overview
0:54 - Red Hat's Hybrid Cloud Platform Approach
2:02 - Drivers for Virtualization and Container Growth
3:09 - Three Pillars of Partnership Integration
5:52 - Cohesity-Veritas Acquisition Impact
7:27 - Closing Remarks and 2025 Vision

Key Quotes

1:00 "We've been focused on the benefits of hybrid cloud for almost a decade at this point, but changes in virtualization and technology shifts in AI have made it really an imperative for enterprises across every industry."
2:56 "I would argue that AI data going forward will be even more critical. So I think your ability to span across their data needs, our ability to span across their operating environment and runtime needs, brings that value really clearly to customers."
4:11 "Over 50% of our customers, Matt, are actually now betting on what we're finding on Red Hat, whether it's the core Linux platform, whether it's Red Hat Virtualization, whether it's OpenShift containers, Ansible playbooks, or pacemaker clusters for physical virtual environments."
6:05 "We're now a over 5,000-employee base. We've got 2x the R&D of many of our competitors, over 13,000 customers with 85% of the Fortune 100, 70% of the Global 500, and a passion for innovation."

Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Cloud » Hybrid Cloud
  • » Cybersecurity » Zero Trust
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Zero Trust
  • Executive Briefing
  • Partnership Announcement
  • Cyber Resilience
  • Hybrid Cloud
  • OpenShift Virtualization
  • Zero Trust Security
  • Container Security
  • Enterprise Backup
  • Strategic Partnerships
  • Mergers & Acquisitions
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cohesity & Red Hat Partnership for Cyber Resilience

              Upcoming Webinar Calendar

              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Attacks Before They Escalate into Breaches with AI's Help
                https://www.truthinit.com/index.php/channel/1886/detecting-attacks-before-they-escalate-into-breaches-with-ais-help/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: What to Do Now That You Still Have Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-what-to-do-now-that-you-still-have-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Existing Passwords.
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Insights into Our New Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-our-new-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/

              Upcoming Events

              • May
                06

                Detecting Attacks Before They Escalate into Breaches with AI's Help

                05/06/202602:00 AM ET
                • May
                  06

                  World Password Day: What to Do Now That You Still Have Passwords

                  05/06/202610:00 PM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Passwords Effectively.

                    05/07/202605:00 AM ET
                    • May
                      07

                      World Password Day: Strategies for Managing Your Existing Passwords.

                      05/07/202601:00 PM ET
                      • May
                        12

                        Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                        05/12/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version