STOCK TITAN

Commvault Expands Threat Scan with Layered Threat Detection to Advance Verified Clean Recoveries

Rhea-AI Impact
(Moderate)
Rhea-AI Sentiment
(Negative)
Tags

Commvault (NASDAQ: CVLT) expanded Commvault Cloud Threat Scan on March 18, 2026, adding layered threat hunting and file-level inspection to enable verified clean recoveries. Hyper Threat Hunting (hashes, YARA) and Deep Inspection (ML, signatures, heuristic, AI encryption detection) integrate with Synthetic Recovery. The new capabilities are generally available globally and provided at no additional cost to existing Threat Scan customers; offerings also appear at RSA Conference March 23-26.

Loading...
Loading translation...

Positive

  • None.

Negative

  • None.

Key Figures

Median dwell time: 24 days
1 metrics
Median dwell time 24 days Median dwell time for non-actor disclosed breach

Market Reality Check

Price: $80.55 Vol: Volume 1,297,717 is 1.22x...
normal vol
$80.55 Last Close
Volume Volume 1,297,717 is 1.22x the 20-day average of 1,060,684, indicating moderately elevated interest ahead of RSAC. normal
Technical Trading below the 200-day MA at $146.78 with price at $80.13, sitting close to the 52-week low of $77.79 and far from the 52-week high of $200.6846.

Peers on Argus

Price change of 0.11% contrasts with mixed peers: NICE +0.97%, OTEX +3.36%, SRAD...

Price change of 0.11% contrasts with mixed peers: NICE +0.97%, OTEX +3.36%, SRAD +0.61%, while PEGA -0.86% and IDCC -1.04%. With no peers in the momentum scanner, this action appears company-specific rather than a clear sector rotation.

Historical Context

5 past events · Latest: Mar 17 (Positive)
Pattern 5 events
Date Event Sentiment Move Catalyst
Mar 17 Conference promotion Positive +0.1% RSAC 2026 presence and ResOps showcase at Booth #S-0634.
Mar 05 Security integration Positive +0.5% CloudSEK integration to surface Dark Web credential intelligence.
Mar 05 Product expansion Positive +0.5% Extension of Identity Resilience to Okta for automated recovery.
Feb 26 Partnership deal Positive +2.3% Partnership with STACKIT’s sovereign cloud in EU markets.
Feb 25 Security integration Positive -2.2% Bi-directional integration with CrowdStrike Falcon Next-Gen SIEM.
Pattern Detected

Recent news has mostly been followed by modest positive price moves, with one negative reaction to an integration announcement.

Recent Company History

Over the past month, Commvault has repeatedly highlighted its cyber resilience strategy. On Feb 25, a CrowdStrike SIEM integration was followed by a -2.18% move, while a STACKIT sovereign-cloud partnership on Feb 26 saw a 2.33% gain. Early March brought identity-focused news and RSAC 2026 plans, each linked to roughly 0.54% gains. Yesterday’s RSAC-focused announcement coincided with a 0.11% move. Today’s expanded Threat Scan capabilities continue this ResOps and cyber-recovery narrative.

Market Pulse Summary

This announcement expands Threat Scan with hyper-targeted hunting and deep inspection to improve ver...
Analysis

This announcement expands Threat Scan with hyper-targeted hunting and deep inspection to improve verified clean recoveries, addressing risks like the 24-day median dwell time for undetected breaches. It extends Commvault’s recent ResOps and identity resilience messaging ahead of RSAC 2026. Investors may watch how these capabilities, offered at no additional cost to existing Threat Scan customers, contribute to adoption trends alongside ongoing integrations and partnerships highlighted in recent months.

Key Terms

indicators of compromise, indicators of attack, ransomware
3 terms
indicators of compromise technical
"intelligence tied to specific indicators of compromise (IOCs) or indicators of attack"
Indicators of compromise are observable signs that a computer system or network has been breached or is under attack—unusual files, strange network traffic, unexpected account activity or other anomalies that act like footprints or fingerprints left by intruders. They matter to investors because these signs can reveal past or ongoing cyberattacks that may disrupt operations, harm reputation, trigger regulatory penalties, and reduce a company’s value, so detecting them affects risk assessment and portfolio decisions.
indicators of attack technical
"indicators of compromise (IOCs) or indicators of attack (IOAs)"
Indicators of attack are observable signs that someone is actively trying to break into or sabotage a computer system—examples include unusual login patterns, unexpected data transfers, or commands that don’t match normal use. For investors they matter because these signs are early warnings of a possible cyber breach that can lead to lost revenue, costly investigations, regulatory fines and damage to a company’s reputation, much like a smoke alarm signaling a potential fire before it spreads.
ransomware technical
"to uncover known threats, suspicious variants, and ransomware related activity that may evade exact-match indicators"
Ransomware is malicious software that locks or encrypts a company’s computer files and systems, then demands payment for their release — like a thief changing the locks on a business and asking for a ransom. It matters to investors because attacks can halt operations, trigger large cleanup costs, damage customer trust, lead to regulatory fines or legal claims, and reduce future revenue, all of which can hurt a company’s financial value.

AI-generated analysis. Not financial advice.

Delivers 'defense-in-depth' with rapid IOC-based hunting and advanced file level inspection; integrates threat hunting with Synthetic Recovery to unify resilience workflows

TINTON FALLS, N.J., March 18, 2026 /PRNewswire/ -- Commvault (NASDAQ: CVLT), a leader in unified resilience at enterprise scale, today announced expanded threat hunting capabilities within Commvault Cloud Threat Scan. The enhancements help organizations rapidly identify risks within backup environments and recover validated clean data, reducing reinfection risks and prolonged downtime.

According to recent reports, the median dwell time for a non-actor disclosed breach is 24 days1, giving attackers ample opportunity to silently embed malicious code across systems. While security operations teams often possess intelligence tied to specific indicators of compromise (IOCs) or indicators of attack (IOAs), that intelligence must also be applied across backup data before restoration begins. Without clear visibility into backup integrity, organizations risk reintroducing threats, extending outages, and compounding business disruption.

Intelligence-Driven Threat Hunting at Enterprise Scale
To address this challenge, Commvault now delivers two complementary scanning modes within Commvault Cloud Threat Scan:

  • Hyper Threat Hunting enables targeted searches across backup data using threat hunting artifacts such as hashes and YARA rules to identify known indicators of compromise at scale. Hash-based hunting provides fast, index-based detection, while YARA-based analysis supports more targeted pattern matching for deeper investigation.
  • Deep Inspection provides layered file-level analysis using malware signatures, machine learning, heuristic analysis, and AI-enabled encryption detection to uncover known threats, suspicious variants, and ransomware related activity that may evade exact-match indicators alone.

Together, these detection modes allow close collaboration across incident response and recovery teams to isolate affected data and make informed recovery decisions. They can schedule recurring scans for continuous monitoring or conduct targeted searches during active incident response scenarios, providing flexibility for both ongoing protection and time-sensitive response.

"In an era where attacks adapt faster than defenses, our priority is to get ahead of every threat," said Dr. Erika Voss, Chief Security Officer at Blue Yonder. "Being able to validate recovery data against current threat indicators is one way to stay ahead of it — ensuring we have more control in an unpredictable landscape."

From Detection to Verified Recovery
Commvault integrates these threat detection capabilities with its patent-pending Synthetic Recovery technology – unifying detection and recovery workflows. Once risks are identified, Commvault's AI-enabled Synthetic Recovery offering can help surgically remove compromised datasets during recovery while restoring clean data to production systems. With Synthetic Recovery, organizations can maximize data preservation while simultaneously achieving data cleanliness.

"We're seeing a fundamental shift in how organizations approach recovery operations. The market is demanding integrated solutions that combine threat detection with recovery workflows, and Commvault's layered approach to verified clean recoveries represents where the industry is heading," said Fernando Montenegro, VP and Practice Lead Cybersecurity at The Futurum Group.

This announcement continues to demonstrate how Commvault is advancing the ResOps operating model. Instead of operating in silos across IT and security, ResOps connects people, processes, and technology, so organizations can manage resilience as a continuous enterprise-wide discipline.

"Security and IT teams need to operate from the same playbook during an incident. Threat intelligence at scale is increasingly table stakes — what sets us apart is what happens next," said Pranay Ahlawat, Chief Technology and AI Officer at Commvault. "By layering our proprietary signal correlation and AI-enabled algorithms on top of targeted threat hunting, and connecting that directly to verified recovery, we give organizations something powerful: not just the ability to find threats fast, but the confidence that what they restore is clean."

Availability
Threat Scan is available globally and is sold as a standalone offering as well as part of Commvault's cyber resilience bundle. The new threat hunting capabilities are generally available and will be provided at no additional cost to existing Threat Scan customers.

Join Commvault at RSAC 2026
Commvault's latest Threat Scan offerings take center stage at this year's RSA Conference (Booth #S-0634) from March 23-26 in San Francisco. Show attendees can grab a ringside seat for the ResOps Rumble where resilience and operations join forces to deliver unified cyber recovery, identity resilience, and data security. Register today for ransomware recovery demos and sessions, expert insights on identity resilience and clean recovery, and the ultimate prize – unified resilience for your organization.

About Commvault
Commvault (NASDAQ: CVLT) is a leader in unified resilience at enterprise scale. In a constantly evolving threat landscape, Commvault keeps customers ready by unifying data security, identity resilience, and cyber recovery, on one cloud-native, AI-enabled platform. Customers trust Commvault to conduct the fastest, most complete recoveries – not just their data, but their entire business. Purpose-built for the agentic enterprise, Commvault also enables organizations to safely embrace AI while protecting against AI-driven threats.

1 Verizon. (2025). 2025 Data Breach Investigations Report. https://www.verizon.com/business/resources/T16f/reports/2025-dbir-data-breach-investigations-report.pdf

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/commvault-expands-threat-scan-with-layered-threat-detection-to-advance-verified-clean-recoveries-302716567.html

SOURCE COMMVAULT

FAQ

What new threat hunting features did Commvault (CVLT) announce on March 18, 2026?

Commvault announced Hyper Threat Hunting and Deep Inspection to scan backup data for IOCs and advanced threats. According to Commvault, these modes use hashes, YARA, ML, signatures, heuristics, and AI encryption detection to find hidden compromise before recovery.

How does Commvault's Synthetic Recovery work with the expanded Threat Scan for CVLT?

Synthetic Recovery links detection to recovery to restore validated clean data while excluding compromised datasets. According to Commvault, its AI-enabled Synthetic Recovery surgically removes affected data during restore to reduce reinfection risk and preserve recoverable data.

Is the March 2026 Threat Scan update for Commvault (CVLT) available to existing customers?

Yes, the new threat hunting capabilities are generally available and provided at no additional cost to existing Threat Scan customers. According to Commvault, Threat Scan is sold standalone and as part of its cyber resilience bundle globally.

What detection techniques does Commvault (CVLT) use in Deep Inspection?

Deep Inspection combines malware signatures, machine learning, heuristic analysis, and AI-enabled encryption detection for layered file-level analysis. According to Commvault, this helps uncover known threats, suspicious variants, and ransomware-related activity that may evade exact-match IOCs.

How can organizations use Commvault's new Threat Scan during an incident response?

Organizations can run targeted searches or schedule recurring scans to hunt IOCs across backups and inform recovery decisions. According to Commvault, this supports collaborative incident response and ResOps workflows for validated, cleaner restores.

Will Commvault (CVLT) showcase the Threat Scan enhancements at RSA Conference 2026?

Yes, Commvault will present Threat Scan updates and demos at RSA Conference March 23-26 at Booth #S-0634. According to Commvault, attendees can see ransomware recovery demos, ResOps sessions, and verified clean recovery showcases.
Commvault Sys Inc

NASDAQ:CVLT

View CVLT Stock Overview

CVLT Rankings

CVLT Latest News

CVLT Latest SEC Filings

CVLT Stock Data

3.52B
43.65M
Software - Application
Services-prepackaged Software
Link
United States
TINTON FALLS