CVTSP24 - Module 03 - Commvault Recovery and Backup
CVTSP24 - Module 03 - Commvault Recovery and Backup
commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Commvault, Commvault and logo, the "C hexagon” logo, Commvault Systems, Metallic, Metallic and logo,
the “Wave” logo, Commvault HyperScale X, HyperScale X, Recovery Reserve, and ThreatWise are
trademarks or registered trademarks of Commvault Systems, Inc. (“Commvault) The unauthorized use of
any Commvault trademark is strictly prohibited.
Other company and product names mentioned herein may be trademarks of their respective owners.
References to any third-party products, services, or websites should not be considered an endorsement
by Commvault. Some examples are for illustration only and are fictitious.
All right, title, and interest, including all intellectual property rights in and to this document and to any
related subject matter (collectively “Ownership Rights”) are owned and expressly reserved by Commvault.
No Ownership Rights are granted to you.
This document is intended for distribution to and personal reference use solely by Commvault customers;
all use of Commvault Solutions, including this document, is governed by Commvault’s Master Terms &
Conditions (currently available at https://www.commvault.com/legal/master-terms-and-conditions) which
are incorporated herein in their entirety.
This document is provided “as is.” Information in this document, including any specifications, URLs, or
other references, is subject to change without notice.
See www.commvault.com/IP for more information about our trademarks, patents, and other IP rights.
Confidentiality
This document contains information that is confidential and proprietary to Commvault. Without limiting
rights under copyright or otherwise, this information is provided with the express understanding that it will
be held in strict confidence and that no part of this document will be disclosed, used, reproduced, stored,
or transmitted, in whole or in part, for any purpose other than as expressly approved or provided by
Commvault in writing.
©1999-2023 Commvault
2
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Table of Contents
Commvault® Backup and Recovery ............................................................................................................ 4
FileSystem ............................................................................................................................................................11
Virtualization ..................................................................................................................................................... 14
Virtualization ..................................................................................................................................................... 15
Virtualization ...................................................................................................................................................... 17
Databases........................................................................................................................................................... 18
NAS........................................................................................................................................................................ 19
Endpoint ............................................................................................................................................................. 20
Multi-Tenancy ................................................................................................................................................. 24
3
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Commvault®
Backup and
Recovery
Commvault Technical Sales Professional
Module - 3
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
4
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Learning Objectives
Learning Objectives
1 2
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
After Completing this module, you will gain an understanding of Commvault® Backup and Recovery
functionality that addresses customers’ challenges.
This will enable you to convey the technical requirements, architecture and core components required for
Commvault Data Backup and Recovery.
5
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Business agility is critical to digital transformation, resulting in the need for the most comprehensive data
protection and migration capabilities for the widest variety of workloads, whether virtual, physical, cloud or
SaaS.
Customers are seeing Unrelenting growth of data and infrastructure, with new data and workload types.
This growth increases the Management complexity, making it difficult to use, maintain, test, and validate
recoverability.
Data needs to be mobile. Customers need to be able to protect and recover to/from on-prem, cloud, or hybrid
environments.
And Cyberthreats are increasing in frequency and sophistication and cannot be ignored.
6
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Ubiquitous recovery APIs simplify Data and workload With rapid recovery at
across the broadest set deployment and portability on-prem scale, Commvault
of hybrid workloads integration, while and across clouds, for reduces risk, improves
with unparalleled intuitive UI performance, lower resilience, and
recovery speed and streamlines day-to- TCO, and to avoid maintains business
scale day operation vendor lock-in continuity, while
reducing TCO
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Wherever your data resides, Commvault® Backup & Recovery helps ensure availability via a single interface.
With Commvault, you can say goodbye to costly data loss scenarios, segregated data silos, missed recovery
SLAs, and inefficient scaling. Key benefits include:
Intelligent, flexible protection of modern workloads: Any workload, anywhere, any time, and at any scale.
APIs simplify deployment, while the intuitive user interface streamlines ongoing operation.
An extensive API library simplifies connecting to your data, Pre-built workflows reduce complexity and
streamline day-to-day operation.
Automated discovery of outages with failover helps minimize operational disruptions and Automated
compliance reporting helps identify and prioritize risks, and increases the speed, accuracy, and efficiency of
the reporting process.
Data and workload portability across physical, virtual, and cloud platforms Increases performance and cost-
effectiveness while helping to avoid vendor lock-in.
Customers can easily back up, recover, and move data and workloads to, from, within, and across multiple
clouds while optimizing on-prem/cloud storage of data and workloads: on-prem to on-prem; on-prem to the
cloud; cloud to cloud; and any combination.
A layered approach to ransomware protection and security across your entire data landscape allows
customers to Identify, assess and mitigate risks, Lock-down data, and harden against changes.
Built-in anomaly detection and reporting, End-to-end encryption of data at rest and in-flight and Periodic
security scans of backup data to help ensure data integrity and allow you to quickly restore from clean data.
7
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Commvault
Backup &
Recovery
Commvault® offers the
only data protection
platform that includes
active defense across
production & backup
data to secure, defend,
and recover data
across all workloads &
environments
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Commvault Backup and Recovery is designed to meet the needs of any size business covering workloads
across all locations: hybrid environments including on-premise and multiple cloud providers; physical servers;
virtual machines; applications and databases, endpoint devices; cloud applications and more.
Commvault automates and scales data protection and workload migration within a single
platform providing the flexibility to manage ongoing change.
It provides backup, verifiable recovery and cost-optimized cloud workload mobility, helping to ensure data
availability, even across multiple clouds. Our simplified backup and recovery solution allows customers to
manage all workloads – cloud, VMs, containers, applications, databases and endpoints – from the Commvault
Command Center while flexible copy data management allows users to use multi-purpose backed-up data for
DevOps, replication and more, across your entire infrastructure.
Proactive data defence detects intrusions earlier, reducing the risk of compromised data and blocked recovery
and with rapid recovery at scale, Commvault reduces risk, improves resilience, and maintains business
continuity, while reducing TCO.
8
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Commvault® Backup & Recovery can be purchased as a standalone package. It is also included as part of
the Complete Data Protection bundle, which is a combination of Commvault Backup & Recovery and
Commvault Auto Recovery products, bringing with it all the functionality of the two products combined in a
comprehensive backup and auto recovery solution. Please note there is a separate training module covering
the Commvault Auto Recovery product.
9
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Workload Protection
Workload Protection
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Through this next section we will look into the broad Workload coverage Commvault supports.
10
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
FileSystem
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
• File system backups provide the fundamental data protection strategy for any environment.
• File server backups are supported for all major operating systems within Commvault® Backup & Recovery
and include inherent file system capabilities based on the operating system being protected.
• In the event of a serious system outage, such as hardware failure, or software corruption, the Windows File
System Agent provides recovery of files from any specified recovery point.
• The system state is backed up and restored as part of Windows File System Agent backup and restore as it
contains many components and services that are critical to the recovery of the Windows operating system.
• Some additional features include IntelliSnap® which lets you utilize snapshot functionality across a wide
variety of hardware storage platforms to provide the lowest possible RPOs and rapid recovery.
• Restores can be in place, or out of place to any other machine in the environment, or you can even restore a
full backup of a physical machine to a new virtual machine. The flexibility to recover clients should not be
undersold, this can be extremely useful for cloud migration or if a customer is ever hit by a ransomware attack
or other disaster, they will very likely need to call upon these capabilities.
https://www.commvault.com/supported-technologies
11
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Applications and OS
and OS
Commvault ® provides
the broadest
Application, OS and
Workload support
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Commvault® Backup & Recovery includes the ability to protect all major enterprise applications. The
Command Center™ provides a simple web-based user interface for administration tasks, providing
streamlined backup and recovery for applications including Microsoft Exchange, SharePoint, Active Directory,
and Oracle EBS, as well as for cloud Apps including Salesforce, Amazon SQL, and Azure SQL.
Commvault® Backup & Recovery also includes support for many other mainstream applications available in
the market today. Each Commvault Server Agent supports several specific features and integration points,
depending on the application being protected.
12
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Customer environments are often distributed across multiple locations, including on-premises data centres,
the edge, public cloud, multiple clouds, or any number of combinations in between. There is also a wide
variety of traditional operating systems and applications to contend with, and the rapidly developing enterprise
IT methodology of application containerization, which utilize micro-services and distributed applications.
Every operating system and application have certain nuances and methodologies to ensure that the data
resident on the hosts is protected properly and can be efficiently recovered in a usable state. Discrepancies
between versions of applications can also introduce challenges to the protection of these applications. For
example, ensuring that applications are in a consistent state at the time of protection and that the various
components of an application such as logs and data are synchronized properly at the time of protection is not
always a simple process.
The expertise on how to effectively protect data across the diversity presented by today’s IT environments
does not come overnight. Commvault® software has evolved over more than two decades, to accommodate
the protection needs our customers demand for all major operating systems and applications in the market.
For a complete list of supported virtualization and cloud vendors, operating systems, and applications, please
visit documentation.commvault.com.
13
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Virtualization
Virtualization
• Scalable
• Data mobility
• Minimized Cost
• Automatic Tiering
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Commvault® Backup & Recovery (Click) provides a scalable, policy-based Virtualization solution that
streamlines the processes of backing up virtual machines, restoring virtual machine data, and monitoring
protection operations. Commvault® Backup & Recovery provides backup to, recovery from, and data mobility
between on-prem and the cloud, and within the cloud. Commvault is able to scale cloud usage on-demand,
minimizing costs, and also optimize cloud vs on-prem location of data and workloads through policy-driven
rules including automatic tiering.
Agentless data protection and recovery operations are supported for the following hypervisors… VMware
vCenter and VCloud Director, Microsoft Hyper-V, Microsoft Azure Stack, Nutanix Acropolis, OpenStack,
Oracle VM, Red Hat virtualization, and Red Hat OpenShift.
Commvault® also provides agentless data protection and recovery operations of virtual machines hosted
inside Public clouds, including, Amazon, Microsoft Azure, Google, Oracle, and Alibaba.
14
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Virtualization
Virtualization
Virtualization
Primary
PrimaryDatacenter
Datacenter Secondary
SecondaryDatacenter
Datacenter
Live
LiveRecovery
Recovery
•Recovery
•Recovery
•Validation
•Validation
Disaster
DisasterRecovery
Recovery
Backup
Backup
•Replication
Live•Replication
Mount
Live Mount
•Failover
•Failover
•Validation
•Validation
•Data
•DataAccess
Accesswithout
withoutrestore
restore
© Commvault 2023
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Users can restore full Virtual machines, Virtual machine files, and guest files, through the Commvault
Command Center, and it’s as simple as a restoring a regular file.,
The Live Recovery feature enables virtual machines to be recovered and powered on from a backup without
waiting for a full restore of the VM. This feature can be used to recover a VM that has failed and needs to be
placed back in production quickly or validate that a backup can be used in a disaster recovery scenario.
Live Mount enables you to run a virtual machine directly from a stored backup for that VM. Again, you can use
this feature for backup validation or to access data from the virtual machine directly instead of restoring guest
files.
Finally, with the addition of Commvault® Auto Recovery that will be discussed in more detail later, you can
configure Virtual Machine Replication to one or more secondary sites, including public clouds.
15
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Multi-cloud
migration to,
from, and
across
clouds
Commvault ® offers the
only data protection Native replication with failover and failback
platform that includes Native conversion and migration
active defense across
production & backup On-Premise Multi-Cloud Application Migration
data to secure, defend, Protect data wherever it lives, Proactive data defense detects With rapid recovery at scale,
and recover data with an extra layer of automated intrusions earlier, reducing the Commvault reduces risk, improves
across all workloads & detection, across all workloads risk of compromised data and resilience, and maintains business
blocked recovery continuity, while reducing TCO
environments
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
By leveraging Commvault’s broad hypervisor support, users can perform VM conversion for DR and migration
purposes, by performing a full VM restore and converting the source virtual machine to be used with a
different hypervisor or public cloud instance.
Commvault provides data mobility regardless of whether that data resides on-premises or in multiple cloud
locations - virtual machines and applications can be quickly and efficiently migrated between environments
and platforms.
16
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Virtualization
Containers
Protection, application
mobility, and disaster
recovery for
containerized
applications
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
As containers and Kubernetes adoption continue to accelerate and go mainstream, there is a growing need
for flexible solutions that protect all modern workloads and enable seamless data migration across physical,
virtual, and public cloud environments.
GigaOm evaluated fourteen Kubernetes Data Protection vendors and ranked Commvault as a leader and
outperformer over 3 consecutive years for broad support for VMs, containers, and cloud data services in a
single platform.
With Kubernetes, protection data is protected for on-premises and cloud-deployed systems. The goal is the
same as it is with virtualization protection where application consistency and storage consistency is
maintained for systems.
Given that most container-based systems are designed to be stateless, additional protection is needed to
protect the metadata and configuration information as well as persistent volume data.
Backups protect deployments, manifest files, kubeconfig files, secrets, and configuration maps, as well as
persistent volumes and persistent volume claims.
Restores can be performed back into the original container or to a new cluster, access, node, application
name or new storage class. Out-of-place restores can be used to migrate applications from on-premises
clusters to cloud clusters, cloud to cloud, and managed clusters to a cloud cluster.
17
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Databases
Databases
• Snap life cycle • Single unified interface for • Protect instances, complete
For full details of all management configuration, operation and region or multiple regions.
supported workloads, visit: • Snap and export-based management.
https://www.commvault.com/ • Restore to a different cloud,
backups.
cloud account or region
supported-technologies • Global de-dupe and
compression
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Commvault Backup & Recovery provides support for the vast majority of database vendors and big data
solutions available in the market today. Each Commvault® Server Agent supports specific features and
integration points, depending on the database type being protected.
Commvault protects databases regardless of their location, whether On-premises databases, Platform as a
service database running on cloud or cloud-native databases provided by different vendors.
Some additional features include IntelliSnap® which lets you utilize snapshot functionality across a wide
variety of hardware storage platforms to provide the lowest possible RPOs, and rapid recovery.
Flexible Restores can be in place or out of place between platform types, Instances, regions, and multiple
regions can be protected to different clouds, cloud accounts or regions.
18
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
NAS
NAS
For CIFS shares, use Network Share
the Windows file (CIFS/NFS)
system agent.
NDMP
For NFS exports, use
the UNIX file system
agent. NAS
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Backup of Network Attached Storage (NAS) is still one of the most common requests you will hear from
customers today and is a powerful differentiator for Commvault®. As NAS data sets continue to expand, the
need for both backup and restore performance is more critical than ever. NAS devices are dedicated file
servers that do not normally allow the hosting of applications such as backup software.
For NAS devices, Commvault Backup & Recovery supports both NDMP backups and Network share backups
of CIFS and NFS. Commvault also supports hardware-based Snapshot integration using our IntelliSnap®
feature for both backup methods. IntelliSnap further enhances the Commvault NAS protection solution,
providing the lowest RPOs and RTOs, and reducing the impact on production resources.
Having multiple protection methods for NAS available, which are easily configured from the Commvault
Command Center™, provides customers with the flexibility to deploy the optimum configuration based on the
individual requirements of each NAS deployment.
19
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Endpoint
Endpoint Data
Endpoint
Automated Backups
Seamless backups using
A complete endpoint automatic schedules
data management Resource Utilization
solution that increases
Protect distributed data with Protect
end user productivity optimized disk resources
by providing
unparalleled access to Network Optimized
protected content for LAN, WAN or VPN with dynamic
users to search, restore bandwidth throttling
and share without Anytime, Anywhere Storage
Targets
compromise to
Instant self-service access to data
security. Disk
Access Share
Integrated Security
Tape
Encryption, Data Loss Prevention,
For full details of all Periodic Document Encryption &
supported workloads, visit: Secure Erase Internal/
https://www.commvault.com/ Web console
External teams
supported-technologies Windows Explorer plug-in
Mobile Compliance
Search and Data Governance*
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
Quick & Automated Backups, providing seamless backups using automatic schedules based on network
connectivity.
Improved Resource Utilization, using deduplication technology, coupled with intelligent backup scheduling
dramatically improving the ability to protect distributed data with optimized disk resources.
Network Optimized Backups, providing backups over any network – LAN, WAN or VPN with dynamic
bandwidth throttling.
Anytime, Anywhere Access with Instant self-service access to data using any web browser or the mobile
Commvault® app.
Integrated Security Features including Full encryption at all stages and secured network access (HTTPS)
used together for data security.
Data Loss Prevention (or DLP) is a file-level security solution that prevents unauthorized access to data on
laptop clients. DLP includes the following features that can be used to secure sensitive data on laptops before
and after a device goes missing:
Periodic Document Encryption allows files or folders to be locked according to settings configured by an
administrator. If a laptop is ever lost or stolen, the device can be marked lost or stolen to require the correct
user-defined passkey to be entered before locked files can be opened and read. This prevents unauthorized
users from accessing data in locked files.
Additionally, the Secure Erase feature allows the administrator to configure certain files to be erased from a
laptop when the laptop is missing or goes offline for more than a set number of days.
20
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
File Archiving
il ile Archiving is
included as part of
i i Commvault Backup &
Recovery
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
The file archiving solution is also included with Commvault® Backup & Recovery and is part of the single
extensible platform. It allows for primary files on supported production file systems to be replaced with small
stub files that act as pointers to the original content.
This allows for larger and or infrequently used files to be relocated and stored efficiently, freeing up space on
more expensive primary storage.
An important differentiator for Commvault® is that most competitor archiving solutions do just that…archiving. -
They also require a separate backup product to protect the archive.
With Commvault, archive data is treated like any other, through a policy-driven approach and managed
through a single unified console that lets customers choose how long they retain that data, the number of
copies to retain, where those copies are stored, and what media they are stored on.
21
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Intellisnap Backup
t lli a at i a a ot
a Instant Creation o data is
actually moved at the point of
a snapshot creation.
Storage fficient Block level
changes tracked by the array
a ot a oi t i and only data that is different
tim i o t is held in the snapshot
o tio ata
Mount and o always in the
native format of production
data.
ot t
o ll tail o all
ot o loa i it
tt omm a lt om
ot t olo i
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
IntelliSnap is software built into the Commvault® suite that controls and manages snapshot functionality
across a wide variety of hardware storage platforms, allowing users to integrate and utilize snapshots as an
effective tool in a comprehensive data and information management solution.
IntelliSnap® integrates with a wide variety of hardware storage arrays and leverages the APIs for the arrays in
order to manage and control the snapshot process.
By combining Commvault's deep experience with application and data protection with the power of hardware
snapshots, customers are able to leverage snapshots in a much more effective manner.
Some of the key benefits derived when leveraging IntelliSnap functionality include centralized configuration
and reporting of all aspects of data protection across an environment, the capability to use a single policy for
the entire lifecycle of a data set, and the elimination of scripting and simplification of snapshot operations
through a single console.
Initial IntelliSnap® operations are performed after communicating with the Server agent to be protected, such
as a file system, application or virtual machine. The resource is automatically paused via its native tools or
APIs, a process known as quiescing. - Quiescing ensures consistency and recoverability of the protected
data.
IntelliSnap® then leverages the Commvault® media agent to interface with the storage array to control the
snapshot process and perform the required indexing operations.
Configuration and Scheduling are configured within the same console as a traditional backup; which allows
you to easily configure both snapshot and backup copies within the same plan.
22
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
t lli a
a
o y
a o i it
a ot ata i to
omm a lt ot t
to a
at i a a o y
A linked copy of the clone or snapshot is The data is indexed and linked back to the
created and mounted to the source or original source paths on the production
o ll tail o all proxy host. host.
ot o loa i it
The backup is performed by the ilesystem The linked copy is unmounted and
tt omm a lt om
or Application agent. destroyed
ot t olo i
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
With the standard method of generating backup copies, the basic process is as follows:
The client or proxy mounts the snapshot copy which has been designated as the source for the backup
operation. The data is indexed, and a client-side deduplication operation is performed to identify data that has
already been protected in previous backup operations in order to eliminate redundancy and minimize the
amount of data to be transmitted over the network.
The unique blocks are then sent over the network to a Media Agent, which then writes the backup data to the
appropriate tier of storage.
The entire process is orchestrated via a single console, without the need for third-party applications or
scripting.
Commvault also provides IntelliSnap snapshot replication functionality, with certain supported hardware array
vendors. As the depth of IntelliSnap integration varies across vendors it is always recommended to check the
latest supported platforms on the Commvault documentation website.
23
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Multi-Tenancy
lti
a y
m o ta o
a li atio a
a a Di ity
i to all
to a o t ii ma a m t Data o tability
Snap life cycle management Share access nodes Protect instances , complete
Snap and exportbased across regions accounts region or multiple regions .
backups.
lobal de dupe and Restore to a different cloud,
compression cloud account or region
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
Commvault® also lets customers or service providers configure their environments for multi-tenancy.
In a multi-tenant environment, an MSP administrator can mirror organizations by setting up logically separate
companies within a single instance of the Commvault® software. For each company, the MSP administrator
can assign separate Service Level Agreements (SLAs) so that the agreed-upon level of data protection is
offered to each tenant.
Defining a tenant, known as a Company, creates a single security object from which Commvault can derive
tenant users and user groups, in addition, it allows the system to track security through role-based access and
record tenant-specific metadata and customization choices.
Please note that Commvault provides an official pricing model for service providers. Partners should contact
their local Commvault account representative or visit the Commvault Partner Portal for more information.
24
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Built-In Security
lti o ity y a a m t
t o i atio
AWS CloudHSM
Business logic workflow Displays information on ortanixData Security
to provide additional security control Manager
approval steps for data anomalies HashiCorpVault
destructive tasks. security audit information IBM SKLM
Available on the Safenet
Commvault Store StorMagicSvKMS
ThalesCipherTrustManager
Vorm etric
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
Data protection is our highest priority. Security is built into every step of our data management services from
an end user's computer all the way to backup storage. Use our security features and administrative tools to
enhance your own data security plan to ensure that your data is kept private and safe from unauthorized
users.
Encryption adds a necessary layer of protection by rendering valuable business information unreadable
unless unlocked with a proper encryption key. Without access to this unique encryption key, unauthorized
parties who gain access to data have no way of deciphering or exploiting your data.
Protecting your data from ransomware attacks is critically important. Commvault proactively monitors the
client’s computer for any unexpected activity and alerts the user with the type of activity.
In addition, you can secure the mount path from being accessed by external processes thereby protecting the
backed-up data. Commvault provides different methods to protect your data. we recommend that you store a
copy of data in a secondary storage like Hyperscale appliance, tape or on cloud storage. These media can
help in storing data in ransomware protection mode, which is not easily accessible to Ransomware attacks.
You can use two-factor authentication - which is a form of multi-factor authentication - to add an extra level of
security to the CommCell login requirements. Passwords alone might not provide enough security to protect
your CommCell environment from unauthorized access. When two-factor authentication is enabled, users
must provide a 6-digit PIN (personal identification number) along with their passwords or use a web
authenticator - such as Yubikey from Yubico - that uses the Fast Identity Online (FIDO2) authentication
protocol in order to access the CommCell environment.
To prevent a user from maliciously or accidentally causing data loss, you can enforce standard operating
procedures by using a business logic workflow to require all or selected clients, groups, or users to have
administrator or additional approval for any action that may cause data loss. This “dual authorization” can
prevent both honest mistakes by single users and malicious insiders from harming your organization.
The Security IQ Dashboard displays information about security control, data anomalies, and security audit
information. This dashboard helps the user to identify the existing security features that are already deployed
and new features that provide further protection to the backup data. The user can use this dashboard to apply
new security controls, monitor anomaly activities, and track user behaviour within
the Commvault environment.
25
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
You can protect the Commvault software encryption keys with a third-party key management server before
storing the keys in the CommServe database. The software encryption keys are required to perform restore
and auxiliary copy operations.
26
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
t lli a
a
o y
a o i it
a ot ata i to
omm a lt ot t
to a
at i a a o y
A linked copy of the clone or snapshot is The data is indexed and linked back to the
created and mounted to the source or original source paths on the production
o ll tail o all proxy host. host.
ot o loa i it
The backup is performed by the ilesystem The linked copy is unmounted and
tt omm a lt om
or Application agent. destroyed
ot t olo i
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
In this final section, we will look at how Commvault’s unified management experience helps customers using
Commvault for their backup and recovery solution.
27
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Unified Management
ii a a m t
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
In this final section, we will look at how Commvault’s unified management experience helps customers using
Commvault for their backup and recovery solution.
28
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
a a m t i
Manage, Control, Monitor & Alert
i l a o la to monitor and
manage your environment and SLAs
a o atio al i i y and
agility with advanced reporting
ol a o t ol for
administrative flexibility and self service
lti t a t ready enabling service
providers for Data protection as a service
offerings
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
Notes:
Commvault delivers A unified experience for managing your entire data environment.
A single multi-tenant ready interface to view and manage your on-prem, hybrid, and cloud resources
allows for enhanced operational efficiency and agility, while Role-Based Access Control provides
administrative flexibility (including self-service and multi-tenant deployments)
Various pre-defined Dashboards display a preview of the most critical information gathered from all the
Commvault components in your organization, such as SLA percentage, capacity usage, and backup strikes.
You can view more detailed information, by clicking on the information displayed in the dashboard.
Many reports are available by default with the Commvault® installation and you can view them in the
Command Center™ and the Web Console. Additional Reports are available for download from The
Commvault Store.
You can use reports to monitor the performance of your environment with information about backup and
restore operations, user operations, and disaster recovery statistics.
Reports expose data that indicate errors and failures so that you can react quickly to solve problems. Reports
can be shared with other users in the organization based on their security role or exported for offline use.
Regardless of the Commvault data protection solution deployed, You can also monitor activity in the
Command Center by viewing alerts, creating alert definitions, viewing reports, events, and viewing and
controlling jobs.
29
COMMVAULT PROPRIETARY/CONFIDENTIAL – FOR COMMVAULT PARTNERS UNDER NDA USE – NOT TO BE FURTHER DISTRIBUTED
a o
Commvault
Commvault Proprietary and Confidential Information Internal and Partner Under DA Use Only
Do ot Distribute.
commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.