CommVault unveils next generation

November 2015 Infrastructure, Products & Solutions

CommVault has announced the next generation of its solutions portfolio, delivering a broad spectrum of innovation designed to help customers address the increasing challenges of managing data and information in highly disrupted, fast-paced global business environments.

Commvault’s new offerings redefine the data protection, archive and cloud data markets where everything is application aware, authentication and encryption data security is essential, backup windows are significantly reduced, instant recovery is the standard, data is accessible natively from all live and versioned locations, disaster recovery is automated, and resources are optimised and orchestrated (storage, compute, and network).

The new solutions portfolio includes a broad range of products, all designed to drive additional business insight and value for customers that redefine the market in these key areas:

• An open, standards-based approach: Runs natively in traditional on premise, hyper and converged environments, and across hybrid, private and public clouds, for protection, retention, access and compliance

• Enabling disruption: Single, unified data management approach takes the risk out of adopting new technology, and helps companies deal with the uncertainties arising from marketplace disruption

• The end of lock-in: Traditional data software format lock-in is eliminated and sets the new standard in hardware and infrastructure options for customers

• Move to the cloud: Provides the bridge from legacy to transitional hybrid to true exploitation of the public cloud; simplifies native moves to and from the cloud to enable DR; and fully migrate business critical workloads (compliance, data governance and backup) into the cloud; assures data security to, from, and in the cloud through advanced authentication and encryption protocols

• Redefines archive: Transform inaccessible digital landfills into directly accessible active data sets through familiar user experiences (file explorer, Outlook, mobile, etc.)

• Governance throughout the data lifecycle: Apply active governance from when data is created based on content and context, rather than applying methodologies only after the data is created

• End-to-end data security built in: Security is fully integrated for data in all locations, with management, audit and compliance monitoring and reporting throughout

• Shift and reduce traditional IT spend through smarter IT: Speeds time to value, consolidates point solutions, shift resources from low to high value through faster business process execution and increased automation

• Total Search: Search across all data (live and versioned), in all locations, across structured and unstructured data

CommVault has transformed its solutions and platform with a core focus on openness to be a powerful IT management platform with a full range to tools and technologies designed to streamline data management operations. The new software will be seamlessly consumed by existing CommVault customers upgrading from earlier versions, and available to new customers across a wide range of use cases across a broad choice of hardware and cloud platforms.

For more information contact CommVault, +1 971 4 375 3491, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...