Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Automated Threat Hunting in Cohesity Alta View

Cohesity
03/26/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cohesity Alta View automates threat hunting in backups using hash-based detection integrated with CISA and Malware Bazaar feeds, plus AI-powered entropy analysis to identify unknown ransomware variants
  • The Cyber Resiliency Dashboard provides risk scoring and malware impact visualization showing infected servers and connected systems to help security teams reduce blast radius during active attacks
  • Real-time entropy detection triggers automatic malware scans when anomalies are found, submitting indicators of compromise across the enterprise to prevent reinfection during restoration
  • Custom file hash uploads enable tracking of organization-specific threats while creating compliance audit trails for incident handling and security policy refinement

Automated Threat Detection in Backup Images

Cohesity Alta View introduces enhanced threat hunting capabilities that automate malware detection within backup images using hash-based detection and real-time entropy analysis. The platform integrates daily threat intelligence feeds from CISA and Malware Bazaar to identify known malicious file hashes, while AI-powered entropy detection identifies unknown ransomware variants based on behavioral patterns. When anomalies are detected during backup operations, the system automatically triggers malware scans and submits indicators of compromise across the enterprise to limit blast radius. This dual-layer approach combines proactive detection of new threats with reactive blocking of known malware, preventing reinfection during restoration processes and strengthening cyber recovery posture.

Cyber Resiliency Dashboard and Impact Analysis

The Cyber Resiliency Dashboard provides centralized visibility into security threats across Cohesity Alta environments through risk scoring, misconfiguration tracking, and malware impact visualization. Security teams can monitor risk scores at data center or asset levels, with higher scores indicating potential security events requiring investigation. The Malware Impact Analysis feature displays infected servers and their connected systems in a visual web, enabling rapid identification of affected assets and containment of spreading ransomware. The platform correlates suspicious activities, data anomalies detected during backups, and encryption events to track security event progression. Custom file hash uploads create audit trails for compliance purposes, while the recovery points interface allows teams to identify clean backup snapshots for restoration after gathering forensic evidence.

Chapters

0:00 - Introduction to Threat Hunting Enhancements
0:47 - Cyber Resiliency Dashboard Overview
1:46 - Malware Impact Analysis and Blast Radius
3:26 - File Hash Detection and Custom Uploads
4:55 - Anomaly Detection and Entropy Analysis
5:58 - Indicators of Compromise and IOC Scanning

Key Quotes

0:18 "This feature automates threat hunting in backups and enhances cyber recovery by preventing malware reinfection during restoration."
0:39 "We'll also explore a new automated capability that enables you to search daily feeds for malicious file hashes published by reputable third parties such as CISA and Malware Bazaar."
2:01 "Once ransomware infiltrates an infrastructure, it spreads rapidly and intentionally expands the attack's reach."
5:27 "Together these features provide proactive and reactive defense, ensuring early detection of anomalies and rapid containment, even when confronted with new threats."
Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Security Operations
  • Threat Intelligence
  • Backup & Recovery
  • Technical Deep Dive
  • Demo
  • Threat Hunting
  • Malware Detection
  • Ransomware Protection
  • Cyber Recovery
  • Backup Security
  • Hash-Based Detection
  • Entropy Analysis
  • Threat Intelligence Integration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Automated Threat Hunting in Cohesity Alta View

              Upcoming Webinar Calendar

              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Apr
                  15

                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                  04/15/202601:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    More events
                    Truth in IT
                    • Sponsor
                    • About Us
                    • Terms of Service
                    • Privacy Policy
                    • Contact Us
                    • Preference Management
                    Desktop version
                    Standard version