HyTrust CloudAdvisor

Download the 30-day Trial!

Extending Visibility and Manageability of Veeam Backup Repositories
HyTrust CloudAdvisor for Availability

The customer credit card data, employee social security numbers, and company intellectual property (IP) files that reside within your live production IT environment can quickly proliferate across multiple workloads, user accounts, and uncontrolled collaboration shares. That uncontrolled, unstructured data is then archived and stored in backup repositories - until that data is needed to recover from an IT incident or security breach.

Backup and archive solutions are built with limited functionality to replicate and restore files stored across virtual workloads with the minimum loss of data. Very few solutions have native search and indexing capabilities that combine other factors such as file content, metadata, or are version aware. In addition, many backup solutions offer few capabilities to search entire archives and datasets, allowing for the recovery of specific files and file content should a targeted, surgical restoration be required.

Does your IT organization know…

  • - How to quickly recover high-value files based on file tags, content, and security classification?
  • - Whether archived files in uncontrolled workloads contain credit card information, social security numbers, or other PII data?
  • - If their backup solution automatically discovers and classifies sensitive data based on policy?
  • - If backup and system administrators can quickly visualize and search their Veeam repositories to accelerate the restoration, management, and security of mission critical data?
Learn More

Extends the backup capabilities delivered by Veeam, providing Administrators with:

  • - Graphical visualization of backup data repositories
  • - Enhanced file recovery and restoration capabilities
  • - Granular, federated search capabilities
  • - Sensitive data detection and classification
  • - File demographics, analytics, and content management
Learn More

Enables You To Define Policies To Automatically Discover The Data That’s Valuable
HyTrust CloudAdvisor for Data

Lets face it: We live in a data-driven world. Your data is your most valuable corporate asset. Yet, four out of five organizations don’t know where their sensitive data is located or how to secure it.

It should be no surprise that without a comprehensive understanding of your data it’s impossible to completely secure it against a multitude of cyberhacks, insider threats, general misuse, obscurity, or a wide variety of other risks.

Does your IT organization know…

  • - Where your sensitive data is located?
  • - Who is accessing or modifying it?
  • - What files are being changed?
  • - When your data activity is happening?
  • - Why your sensitive data is exposed?
Learn More

Search, Visualize, and Discover Quickly and Easily

  • - CloudAdvisor for Data allows you to find the data you need, when you need it. With keyword search, data visualizations, and click-and-drill explorations, you can easily navigate and analyze content and user activity to support data management, security, and compliance workflows.
  • -Search and filter by keyword, tags, file characteristics, access timeframes, owners, and users to define and refine data subsets of interests.
  • - View People, Content, and Activities Over Time
  • - CloudAdvisor for Data is designed to provide compete visibility into data stored within each virtual machine and associate this information with whoever is interacting with it and when.
  • - Content across more than 600 file types are keyword-indexed and pattern-matched against pre-customer-defined content tags.
  • - Proactively Monitor and Protect Your Most Sensitive Data
  • - CloudAdvisor for Data automatically identifies, monitors, and alerts you about sensitive and confidential files found within your virtual machines. A robust set of rules helps protect sensitive data and provides the ability to build custom rules specific to your data. For compliance and forensic analysis, audit-quality logs are maintained for all files and users.
  • - Recover from Malicious or Unintentional Disruptive Activities
  • - CloudAdvisor for Data provides built-in, behavior-based analytics that track and analyze user access and notify you of potentially suspicious and anomalous activities.
Learn More