

Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware re...
source link: https://www.csoonline.com/article/3687179/cohesity-data-cloud-70-enhances-privileged-access-authentication-ransomware-recovery.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery
Vendor announces the 7.0 software release of its Cohesity Data Cloud platform with a focus on “data-centric” cyber resilience.
Data security and management vendor has announced the 7.0 software release of its Cohesity Data Cloud platform. The release provides customers with enhanced cyber resiliency capabilities to help protect and secure data against cyberattacks, the firm stated in its announcement. Expanded features include privileged access hardening, accelerated ransomware recovery for files and objects, and attack surface reduction via AWS GovCloud support, Cohesity added.
Cohesity 7.0 focuses on a “data-centric” approach to cyber resilience
In a press release, Cohesity explained that the 7.0 software release helps businesses take a more data-centric approach to cyber resilience including data immutability, data isolation (or cyber vaulting), and recovery at scale. “Organizations are facing significant challenges with managing and securing their data estate across cloud and on-premises, with ransomware and data theft as their number one concern,” commented Chris Kent, VP product and solutions marketing, Cohesity. “Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organizations’ most critical data.”
Cohesity 7.0 offers hardened access controls, data lifecycle features, AWS GovCloud support
Hardened access controls for Cohesity Data Cloud enable tighter control and management of privileged administrative accounts and protection of access credentials, Cohesity said. “These controls further increase the difficulty of threat actors tampering with backup data. New innovative differentiators, like split key capabilities, require multiple people to authenticate for some privileged access to administrative controls.” No single administrator can unilaterally issue privileged commands, thereby helping to protect data from malicious threat actors, the firm added.
Cohesity has also advanced ransomware recovery for files and objects with Cohesity SmartFiles, the vendor stated. “New powerful data lifecycle features are designed to reduce the attack surface for data exfiltration by ensuring data is not retained for longer than necessary, and custom security policies help further secure unstructured data from unauthorized access and attacks.” The new release also introduces new capabilities for analyzing and visualizing data utilization on third party NAS systems to help organizations move data to SmartFiles for long-term retention and data immutability, it added.
Lastly, Cohesity Data Cloud 7.0 adds support for AWS GovCloud for target data and metadata protection to help organizations reduce their attack surface by consolidating multiple point products, Cohesity claimed. “Additional storage targets for long-term retention, and support for local backup on third-party platforms including Lenovo SR645, HPE DL360 and DL380, Cisco UCS C220M6 AFC and C240 M6, and Dell 740XD for private cloud deployments.”
Commenting on the release, Randy Kerns, senior strategist and analyst at Evaluator Group, noted Cohesity Data Cloud 7.0’s split key and KMS auto-failover capabilities as a means to help support customers and partners to protect data against cyberattacks.
Michael Hill is the UK editor of CSO Online. He has spent the past five-plus years covering various aspects of the cybersecurity industry, with particular interest in the ever-evolving role of the human-related elements of information security.
Copyright © 2023 IDG Communications, Inc.
Recommend
-
8
What is Privileged Access Management (PAM) and Why It’s Important to Your Organization Data Security...
-
8
Summary Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within, because of the access they provide. A Privileged Access Management (PAM) s...
-
8
ARE U BEING SERVED? — SolarWinds 0-day gave Chinese hackers privileged access to customer servers Hackers IDed as DEV-0322 have a fondness for defense contractors and software-makers....
-
12
Restrict su access to Privileged Accounts in LinuxHow can I limit the use of su command on Linux to only Privileged Accounts such as Admin user group?. The su utility requests appropriate user credentials via PAM and switches to that user ID...
-
11
Not FoundYou just hit a route that doesn't exist... the sadness.LoginRadius empowers businesses to deliver a delightful customer experience and win customer trust. Using the LoginRadius Identity...
-
6
Feature 7 top privileged access management tools Good management of privi...
-
5
Access management, identity governance and privileged access features converge in new Okta cloud tools
-
6
Cohesity’s CEO pays close attention to CIO priorities as cloud continues to disrupt enterprise software ...
-
5
Guest Why privileged access management should be critical to your security strategy
-
6
Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK