SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Cohesity Data Cloud 7.0 software release expands data security and management capabilities to combat ransomware attacks and data breaches

9 Feb 2023

Cohesity Data Cloud 7.0 software release expands data security and management capabilities to combat ransomware attacks and data breaches
Contact company
Contact Cohesity
icon Add as a preferred source Download PDF version

Cohesity, a pioneer in data security and management, announces the 7.0 software release of Cohesity Data Cloud. The release provides customers with enhanced cyber resiliency capabilities to help protect and secure data against cyberattacks.

Cohesity is announcing its 7.0 software release as cyberattacks continue to become more sophisticated in nature and customers require a comprehensive cyber resilience strategy to ensure their business stays up and running.

Data-centric approach

Organisations are seeking to improve their data security and management posture by focusing on a data-centric approach to cyber resilience, including data immutability, data isolation (or cyber vaulting), and near-instant recovery at scale. Cohesity addresses the challenges of today’s threat landscape and the need to recover rapidly and confidently.

With Cohesity 7.0, organisations can strengthen cyber resilience by:

No single administrator has the ability to unilaterally issue privileged commands

Hardening privileged access: Hardened access controls for Cohesity Data Cloud enables even tighter control and management of privileged administrative accounts and protection of access credentials. These controls further increase the difficulty of threat actors tampering with backup data.

New innovative differentiators, like split key capabilities, require multiple people to authenticate for some privileged access to administrative controls. No single administrator has the ability to unilaterally issue privileged commands, thereby helping to protect data from malicious threat actors.

Privileged administrative accounts

Accelerating ransomware recovery for files and objects: Cohesity, which provides unified file and object services on its platform, is also advancing cyber resilience capabilities with Cohesity SmartFiles. New powerful data lifecycle features are designed to reduce the attack surface for data exfiltration by ensuring data is not retained for longer than necessary, and custom security policies help further secure unstructured data from unauthorised access and attacks.

This new release will also introduce new capabilities for analysing and visualising data utilisation on third party NAS systems. These data insights will help enterprise organisations move data to SmartFiles for secure long-term retention and data immutability, while optimising costs, scale, and performance for their most critical applications.

Consolidating multiple point

7.0 adds support for AWS GovCloud for target data and metadata protection

Reducing attack surface through expanded platform and workload support: To help organisations further reduce their attack surface by consolidating multiple point products, 7.0 adds support for AWS GovCloud for target data and metadata protection.

Additional storage targets for long-term retention, and support for local backup on third-party platforms including Lenovo SR645, HPE DL360 and DL380, Cisco UCS C220M6 AFC and C240 M6, and Dell 740XD for private cloud deployments.

“Organisations are facing significant challenges with managing and securing their data estate across cloud and on-premises, with ransomware and data theft as their number one concern. Protecting and securing data starts before an attack and provides organisations with the ability to mitigate damage from an attack and quickly recover, with minimal impact to the business,” said Chris Kent, Vice President, Product and Solutions Marketing, Cohesity.

Diverse heterogeneous environments

Chris Kent adds, “Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organisations’ most critical data. We are seeing continual threats facing our customers from external and internal malicious actors, and with these latest enhancements, customers can face these challenges from the start.”

Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organisations’ most critical data"

As data volumes rapidly grow, simplicity and efficiency in managing, protecting, and recovering unstructured and disparate data can help enable faster recovery from outages and malicious attacks. Extended coverage allows organisations to simplify data resiliency with a platform that scales to support their diverse heterogeneous environments.

“As the threat of cyber attack persists, one of our top priorities at Path Forward IT is upleveling our cyber resilience and assurance to ensure our data and systems are well-guarded against threats like ransomware,” said Adam Brock, Senior Director, Backup and Recovery at Path Forward IT.

Improving data security

Adam Brock adds, “Cohesity 7.0 will help us bridge end-to-end protection with capabilities that allow for rapid recovery and business continuity so our customers can resume business as usual in the event of cyber attack.”

“Companies are looking for simple and effective ways to improve data security and support cyber resilience goals. Given the rapid increase in the number of crippling ransomware attacks, it’s imperative that enterprises not only have strong protection against external threats, but also prioritise internal vulnerabilities as well,” said Senior Strategist and Analyst, Randy Kerns, Evaluator Group.

He adds, “With Cohesity’s 7.0 software release, Cohesity’s split key and KMS auto-failover capabilities are some of the many cyber resilience solutions Cohesity is adding to its portfolio to provide its customers and partners with a comprehensive strategy to protect data against cyberattacks.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Security management
  • Security policy
  • Security devices
  • Security access systems
  • Radio frequency Identification
  • Facial recognition systems
  • Electronic access control
  • Identity management
  • Fingerprint reader
  • Wireless security
  • Door access control
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Integration software
  • Cyber security
  • Home Security Systems
  • Data Security
  • Incident Management
  • Cloud security
  • Mobile access
  • Mergers & Acquisitions
  • Touchless Security
  • Related links
  • HID Access control software
  • Access Control Software Access control software
  • Biometric Access control software
  • Card Access control software
  • Mifare Access control software
  • Centrally managed access solution Access control software
  • Face Recognition Software Access control software
  • Issuance and identification system Access control software
  • Keypad Commands/Intrusion Zones Access control software
  • Management Systems Upgrade Access control software
  • Redundant System Software Access control software
  • Server software for MSDE Access control software
  • User tool for control panel Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec