Loading
Plateforme
Solutions
Ressources
Partenaires
Entreprise
Login
MyCohesity
Helios
Alta
Assistance
Documentation produit
Academy
Cercle Cohesity
Partenaires
English
Deutsch
Français
日本語
Essai gratuit
MyCohesity
Helios
Alta
Assistance
Documentation produit
Academy
Cercle Cohesity
Partenaires
English
Deutsch
Français
日本語
Plateforme
Plateforme
Solutions
Solutions
Ressources
Ressources
Partenaires
Partenaires
Entreprise
Entreprise
Essai gratuit
Contactez-nous
Glossaire
Glossaire
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
#
A
AES Encryption
AWS EC2 backup
Anti Ransomware solutions
Artificial Intelligence
Autonomous Data Management
AIOps
AI data security
Air Gapping
B
Business continuity
Backup solutions
Backup and recovery
Backup as a service
C
Cyber Threats
Cognitive AI
Cyber insurance
Cloud data migration
Cyber Awareness
Containerization
Cloud Backup Solutions
Cloud tiering
Cyber resilience
CSIRT
Cyber vault
Cybersecurity Analytics
Cybercrime
Cloud data protection
Continuous data protection
Cloud disaster recovery
Cloud data management
Cloud Management Solutions
Cloud backup
Cyber Incident Recovery
D
Data insights
Data Sovereignty
Data Vault
Data fragmentation
Defense-in-depth
Data Deduplication
Data management
Data exfiltration
Data Synchronization
Data classification
Data management as a service
Data management security
Data isolation
Data Center Migration: A Complete Guide
Distributed file system
Disaster Recovery as a Service DRaaS
Data Breach
Data Protection
Double extortion ransomware
Database backup
Data masking
Data replication
Data mobility
Disaster recovery
Data security posture management (DSPM)
Data resilience
E
Edge Computing
Enterprise Cloud Storage
Enterprise backup solution
Enterprise data security
Enterprise Data Protection
F
File Encryption
File Services
FedRAMP Compliance Explained: A Comprehensive Overview
Failover
G
Generative AI
H
Hybrid Cloud Architecture
Hybrid cloud
I
Identity and Access Management
IaaS PaaS SaaS
Information Security
Intelligent data management
Immutable backup
M
Malware
Management Information System
Microsoft SQL backup
Mass data fragmentation
M365 backup
Multicloud
N
Next gen data management
O
Oracle backup
P
Purpose Built Backup Appliance
Privacy by Design
R
Ransomware removal
Ransomware recovery
Ransomware Prevention
Retrieval-Augmented Generation (RAG)
Ransomware Detection
RSA Encryption
Ransomware Attack
Recovery Point Objective (RPO)
Recovery time objective (RTO)
Ransomware
S
Snapshot backup
Security Posture
Security operations center (SOC)
SaaS backup
T
Threat intelligence
Threat monitoring
Threat Hunting
U
Unstructured data
V
VMware Data Recovery
VMware backup
W
What is DORA? The Digital Operational Resilience Act
Z
Zero trust data security
#
3-2-1 backup rule
Loading