Commvault Activate Capabilities - Oct 2021
Commvault Activate Capabilities - Oct 2021
Core Capabilities
October 2021
1
Table of Contents
1 Introduction ............................................................................................................................................ 3
2.2.5 Subject Access Requests (e.g. GDPR Right to Access, Right to be Forgotten, etc.) ............................................................................................. 6
2.3 eDiscovery................................................................................................................................................................................... 6
4 Licensing ................................................................................................................................................. 9
In our experience for a personal data scenario we recommend consideration of the following Commvault Activate™
modules:
• eDiscovery – provides expanded content search capabilities and supports collection, preservation and review of
electronically stored information related to data breach incidents and process audits.
• Data Governance – profiling of email and file environments to determine presence of sensitive data across the
organization, the remediation of that data, and response to regulation-driven subject access requests. We have a
number of customers who have augmented their eDiscovery functions with the data profiling functions.
• File Storage Optimization – used to rationalize information stored for opportunities to dispose of
redundant/obsolete data and other data risks, and to tune access permissions to sensitive files. Supports smart
configuration of Commvault Complete™ data archiving, which support a defensible deletion strategy commonly
employed to reduce eDiscovery risk.
2.1.5 Customization
• Support advanced reporting by blending file data external data sources to add a business context.
External data sources include Active Directory, CRM database, SQL, CSV, etc... For example: show
department-based distribution of data on a share based on the externally defined ownership of the files;
chargeback reports for devices with externally defined device storage costs.
• Develop customized remediation workflows, notifications, actions and integrations using a robust
developer tools and APIs.
2.2.4 Remediations
• Support to delete one or more sensitive files (deep scrub, including deleting from backups)
• Quarantine one or more sensitive files (move data to a different primary location)
• Archive sensitive data (move from live to archive location)
• Set retention on one or more files based on data governance policies
• Support collaboration across departments with review and approval process for all actions.
o Reviewers should also accept/reject actions on an object, with contextual comments.
o Updates only performed when approver is satisfied that appropriate review has taken place.
• Support for auditing and reporting of all the actions taken.
• Support to update permissions to address security vulnerabilities.
• Ability to mark files that can be ignored in reporting although they have sensitive data. Example: if a file is
properly protected, the administrator will want to hide the file after reviewing the data for the first time.
2.2.5 Subject Access Requests (e.g. GDPR Right to Access, Right to be Forgotten, etc.)
• Support to create a Subject Access Request task and select the list of data sources that it is applicable to.
• Integration of SAR with an external ticketing system using Commvault rest API
• Support to assign reviewers and approvers to streamline the process with appropriate decision making
and accountability
• Support for Right to be Forgotten where the end user can request to delete all the PII data that belong to
one or more personnel.
• Support for Right to Access where the end user can request review/export the for information that meets
a criterion
• Ability to share the exported PDF in a secure and authenticated fashion
• Ability to redact sensitive data in exported PDFs.
2.2.6 Customization
• Support advanced reporting by blending file data external data sources to add a business context.
External data sources include Active Directory, CRM database, SQL, CSV, etc... For example: show
department-based distribution of data on a share based on the externally defined ownership of the files.
• Develop customized remediation workflows, notifications, actions and integrations using a robust
developer tools and APIs.
2.3 eDiscovery
Objective of eDiscovery is to collect, preserve, analyze and review electronically stored information to support the
needs of legal matters, investigations, FOIA requests, etc.
2.3.1 Managing case folders
• Proactively preserve and manage high-risk, high-value data custodians and data sources.
• Prevent content deletion or modification between the time a preservation order is issued and the
timeframe of the event/investigation.
• Analysis of backup and archive data sources to provide time-based recall of emails, files and other
content.
• Creation & deletion/release/closure of case folders & legal holds
• Multi-tenancy
• Multi-language, multi-character-set
• APIs support to support development and integration
4 Licensing
Commvault Activate is licensed with the following model:
• Each of the 3 use cases (DG, FSO, eDiscovery) can be licensed separately with a subset of enterprise
data.
• For file-system based data, Activate use cases are licensed by the size of the assets on the live data
sources, measured in TB (we refer to this as front-end-TB since it is based on the equivalent of a live
data source, not a compressed Commvault backup).
• For email and collaboration tools (such as Exchange, SharePoint, Office365, Gmail, Google Apps),
Activate is licensed by User, which would equate to mailboxes.
• Virtual machines are licensed by VM, Endpoints by User.
File Storage
✓ VM ✓ TB ✓ USER
Optimization
Data
✓ VM ✓ TB ✓ USER ✓ USER
Governance
eDiscovery & ✓ VM ✓ TB ✓ USER ✓ USER
Compliance