Cohesity, a pioneer in data security and management, announces the 7.0 software release of Cohesity Data Cloud. The release provides customers with enhanced cyber resiliency capabilities to help protect and secure data against cyberattacks.

Cohesity is announcing its 7.0 software release as cyberattacks continue to become more sophisticated in nature and customers require a comprehensive cyber resilience strategy to ensure their business stays up and running.

Data-centric approach

Organisations are seeking to improve their data security and management posture by focusing on a data-centric approach to cyber resilience, including data immutability, data isolation (or cyber vaulting), and near-instant recovery at scale. Cohesity addresses the challenges of today’s threat landscape and the need to recover rapidly and confidently.

With Cohesity 7.0, organisations can strengthen cyber resilience by:

No single administrator has the ability to unilaterally issue privileged commands

Hardening privileged access: Hardened access controls for Cohesity Data Cloud enables even tighter control and management of privileged administrative accounts and protection of access credentials. These controls further increase the difficulty of threat actors tampering with backup data.

New innovative differentiators, like split key capabilities, require multiple people to authenticate for some privileged access to administrative controls. No single administrator has the ability to unilaterally issue privileged commands, thereby helping to protect data from malicious threat actors.

Privileged administrative accounts

Accelerating ransomware recovery for files and objects: Cohesity, which provides unified file and object services on its platform, is also advancing cyber resilience capabilities with Cohesity SmartFiles. New powerful data lifecycle features are designed to reduce the attack surface for data exfiltration by ensuring data is not retained for longer than necessary, and custom security policies help further secure unstructured data from unauthorised access and attacks.

This new release will also introduce new capabilities for analysing and visualising data utilisation on third party NAS systems. These data insights will help enterprise organisations move data to SmartFiles for secure long-term retention and data immutability, while optimising costs, scale, and performance for their most critical applications.

Consolidating multiple point

7.0 adds support for AWS GovCloud for target data and metadata protection

Reducing attack surface through expanded platform and workload support: To help organisations further reduce their attack surface by consolidating multiple point products, 7.0 adds support for AWS GovCloud for target data and metadata protection.

Additional storage targets for long-term retention, and support for local backup on third-party platforms including Lenovo SR645, HPE DL360 and DL380, Cisco UCS C220M6 AFC and C240 M6, and Dell 740XD for private cloud deployments.

Organisations are facing significant challenges with managing and securing their data estate across cloud and on-premises, with ransomware and data theft as their number one concern. Protecting and securing data starts before an attack and provides organisations with the ability to mitigate damage from an attack and quickly recover, with minimal impact to the business,” said Chris Kent, Vice President, Product and Solutions Marketing, Cohesity.

Diverse heterogeneous environments

Chris Kent adds, “Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organisations’ most critical data. We are seeing continual threats facing our customers from external and internal malicious actors, and with these latest enhancements, customers can face these challenges from the start.”

Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organisations’ most critical data"

As data volumes rapidly grow, simplicity and efficiency in managing, protecting, and recovering unstructured and disparate data can help enable faster recovery from outages and malicious attacks. Extended coverage allows organisations to simplify data resiliency with a platform that scales to support their diverse heterogeneous environments.

As the threat of cyber attack persists, one of our top priorities at Path Forward IT is upleveling our cyber resilience and assurance to ensure our data and systems are well-guarded against threats like ransomware,” said Adam Brock, Senior Director, Backup and Recovery at Path Forward IT.

Improving data security

Adam Brock adds, “Cohesity 7.0 will help us bridge end-to-end protection with capabilities that allow for rapid recovery and business continuity so our customers can resume business as usual in the event of cyber attack.”

Companies are looking for simple and effective ways to improve data security and support cyber resilience goals. Given the rapid increase in the number of crippling ransomware attacks, it’s imperative that enterprises not only have strong protection against external threats, but also prioritise internal vulnerabilities as well,” said Senior Strategist and Analyst, Randy Kerns, Evaluator Group.

He adds, “With Cohesity’s 7.0 software release, Cohesity’s split key and KMS auto-failover capabilities are some of the many cyber resilience solutions Cohesity is adding to its portfolio to provide its customers and partners with a comprehensive strategy to protect data against cyberattacks.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?