Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery


Data security and management vendor has announced the 7.0 software release of its Cohesity Data Cloud platform. The release provides customers with enhanced cyber resiliency capabilities to help protect and secure data against cyberattacks, the firm stated in its announcement. Expanded features include privileged access hardening, accelerated ransomware recovery for files and objects, and attack surface reduction via AWS GovCloud support, Cohesity added.

Cohesity 7.0 focuses on a “data-centric” approach to cyber resilience

In a press release, Cohesity explained that the 7.0 software release helps businesses take a more data-centric approach to cyber resilience including data immutability, data isolation (or cyber vaulting), and recovery at scale. “Organizations are facing significant challenges with managing and securing their data estate across cloud and on-premises, with ransomware and data theft as their number one concern,” commented Chris Kent, VP product and solutions marketing, Cohesity. “Cohesity Data Cloud 7.0 adds a new layer of protection and recovery to organizations’ most critical data.”

Cohesity 7.0 offers hardened access controls, data lifecycle features, AWS GovCloud support

Hardened access controls for Cohesity Data Cloud enable tighter control and management of privileged administrative accounts and protection of access credentials, Cohesity said. “These controls further increase the difficulty of threat actors tampering with backup data. New innovative differentiators, like split key capabilities, require multiple people to authenticate for some privileged access to administrative controls.” No single administrator can unilaterally issue privileged commands, thereby helping to protect data from malicious threat actors, the firm added.

Cohesity has also advanced ransomware recovery for files and objects with Cohesity SmartFiles, the vendor stated. “New powerful data lifecycle features are designed to reduce the attack surface for data exfiltration by ensuring data is not retained for longer than necessary, and custom security policies help further secure unstructured data from unauthorized access and attacks.” The…

Source…