Home Platform Threat Scan Keep Backup Data Clean Recover and restore clean data quickly and avoid file reinfection by automatically quarantining suspicious or compromised data. Request demo Threat Scan Demo Video Benefits Features Analyst Report Resources FAQs Start a Free Trial Demo Video Commvault® Cloud Threat Scan See how Commvault Cloud Threat Scan automatically scans backup files for malware, detects data anomalies, and enables fast, clean recovery. Watch now How we do it Continuous scanning to detect and stop threats Active monitoring of backups, with automatic quarantining of infected or suspicious data, provides confidence that you can recover clean data quickly. Smart quarantine Infected files are automatically quarantined from the backup content and skipped during recovery. Multi-layered file analysis Our secure scanning uses a built-in signature-based malware engine, algorithms, and file comparisons to identify, label, and quarantine threats found within backups. Advanced AI built-in Leverage more than 100 million threat intelligence indicators to quickly identify new threats. SIEM and SOAR integration Alerts integrate with existing security operations tools like SIEM and SOAR platforms to jump-start investigations with added context. Unknown threats, stopped Spot next-generation polymorphic and shapeshifting malware. Accuracy like you’ve never seen Find threats with greater accuracy and reduce false positives. THREAT SCAN FEATURES Recover and restore clean data, automatically Pinpoint and isolate compromised backup content like encrypted files, malware-infected files, or those with significant changes. IDENTIFY BAD BACKUPS Discover threats that live in backed up files Pinpoint and isolate compromised backup content like encrypted files, malware-infected files, or those with significant changes. RECOVER CLEAN DATA Prevent reinfection during recovery processes Restore the last known good version of data, while retaining, isolating, and quarantining bad data for forensic investigation. FIGHT AI WITH AI Threat Scan predict Find zero-day and never-before-seen threats earlier with scanning technology designed to analyze file attributes and behaviors. Analyst Report Commvault leads the way to cyber resilience and continuous business For the 13th time in a row, Commvault has been named a Leader in the Gartner® Magic Quadrant™ for Enterprise Backup and Recovery Software Solutions. Read the report Read More Our Reach Supporting more than 100,000 companies “We used to manually engineer redundancy to avoid data loss. Commvault provides the needed flexibility and granularity for fast restores.” Greg Robinson Senior Systems Engineer, Allina Health “Commvault gives us confidence that our data is safe, and our important services can be up and running quickly.” Paul Vries IT Consultant, Bilthoven Biologicals “With a long retention strategy, our cloud storage costs were accelerating quickly. Commvault Cloud gave us a way to dramatically lower those costs and keep them predictable, while simultaneously providing us with the data resilience needed to keep our business running.” Jacob Gsoedl CIO, Power Integrations Datasheet Threat Scan datasheet Enable swift and clean data recovery by analyzing backup files to find corrupted and encrypted data. Learn more Read More Additional resources Explore more of our resources View all resources VIDEO Ransomware recovery demo Watch how Commvault performs a complete restore and recovers all files in the event of a ransomware attack. solution brief Cyberthreatprotection withresilienceand recovery Organizations need proven cyber resilient data protection solution that goes beyond traditional backup and recovery to secure, defend, and recover data – across the hybrid world. CUSTOMER VIDEO Customers speak on strengthen threat detection Discover how Commvault customers are using Commvault to strengthen their threat detection capabilities. Frequently Asked Questions How does Threat Scan prevent compromised files from being restored? Threat Scan analyzes files during the backup process, looking for malware signatures, encryption events/changes, or even suspicious changes over time (if the file has been backed up before). If a file exhibits any suspicious characteristics, it’s quarantined and prevented from being restored during a recovery process. Do you keep a copy of suspicious or compromised files? Yes. While we only restore clean, good data, we also keep a copy of the suspicious file so your incident response or forensics team can analyze it and determine its origin or the threat actor’s desired effects. How does Threat Scan integrate with security technologies? Threat Scan can send alerts to anomalies or malware detection directly to your SIEM or SOAR tools, like Splunk, Palo Alto Networks XSOAR, or Microsoft Sentinel, enabling SecOps teams to get warnings that something may be wrong. We can also deliver suspicious files directly to a Sandbox system for further analysis or detonation. Ready to get started? Experience Commvault® Cloud Threat Scan Request a demo today. Guided demo