Workflow
AI Threat Detection
icon
Search documents
Commvault Connects AI Threat Detection, Investigation, and Trusted Recovery with Microsoft Security
Prnewswire· 2026-03-23 12:30
Core Insights - Commvault has announced an expanded integration with Microsoft Security to enhance cyber resilience operations by connecting threat detection with trusted recovery [1][4] - The integration utilizes Microsoft Sentinel and Microsoft Security Copilot to streamline resilience operations and provide real-time data insights for faster threat validation and data restoration [1][2] Integration Details - The new integration allows for coordinated workflows between security and recovery teams, with security alerts from Commvault Cloud being ingested into Microsoft Sentinel for enhanced incident analysis [2] - Insights gained from this integration will enable automated, policy-based recovery workflows, thereby accelerating clean recovery processes [2][3] Strategic Importance - Commvault emphasizes that this integration is a blueprint for future resilience operations, addressing the need for unified and automated workflows in the face of evolving cyber threats [4] - The collaboration aims to reduce the time between threat detection and recovery, enhancing collaboration between IT and security teams [4] Product Features - The updated Microsoft Sentinel connector streams alerts related to malware detections and backup anomalies in real time, providing visibility into backup-related risks [7] - Commvault's Investigation Agent in Microsoft Security Copilot autonomously analyzes suspicious activities and correlates insights with broader Microsoft security signals to streamline recovery processes [7] Availability - The updated Microsoft Sentinel connector and Investigation Agent are currently in early access, with general availability expected in the summer of 2026 [4]