Commvault has introduced an innovative solution called Commvault Geo Shield, aimed at helping organizations protect and recover critical data while maintaining control over data location, operations, and encryption keys. This solution is designed to meet the evolving data sovereignty requirements of businesses in the face of increasing cloud adoption. By leveraging Commvault’s adaptive fabric architecture, Geo Shield allows customers to have authority over data storage locations, protection methods, and access control in both customer and partner-managed environments.
Commvault Geo Shield: Safeguarding Data Sovereignty
As the demand for data sovereignty grows alongside the adoption of cloud technologies, Commvault has unveiled Commvault Geo Shield to address the critical need for safeguarding and recovering data while maintaining control over its location, operations, and encryption keys. This solution is designed to meet the evolving requirements of businesses and organizations that are navigating the complexities of data residency and regulatory compliance.
The Core of Geo Shield: Adaptive Fabric Architecture
At the heart of Commvault Geo Shield lies its adaptive fabric architecture, which separates the control and data planes to give customers the authority over data storage locations, protection methods, and access control. Whether data is stored within customer-managed environments or partner-operated setups, Geo Shield offers a range of cloud sovereignty options to meet diverse customer needs:
- Local Hyperscaler Regions: Utilizing Commvault Cloud SaaS for data residency requirements.
- Sovereign Hyperscaler Regions: Supporting environments like AWS European Sovereign Cloud and planning for additional regional support.
- Partner-Operated Sovereign Offerings: Enabling local providers to deliver sovereign cloud services with Commvault software and air-gapped protection.
- Private Sovereign Cloud Deployments: Managed by customers or partners in exclusive environments.
Intended Capabilities of Commvault Geo Shield
- Enhancing cyber resilience while empowering data sovereignty through deployment patterns that ensure recoverability and operational resilience.
- Enabling customer-controlled encryption keys, supporting models like BYOK and HYOK, and integrating with hardware security modules.
- Ensuring operations within defined boundaries, in alignment with “no call home” requirements and managed by screened partners.
Commvault’s commitment to compliance extends to a wide range of federal, industry, and global regulatory demands, including frameworks like FedRAMP High, FIPS 140-3, GovRAMP, SEC Rule 17a, HIPAA, PCI DSS v4.0, DORA, and NIS2. The company also aligns with international standards and holds IRAP PROTECTED status for the Australian Government and certified Cloud Service Provider status with the Dubai Electronic Security Center.