Loading

Data Security Alliance

This collective of security and cyber recovery companies helps enterprises strengthen their resilience against cyberattacks.

Data Security Alliance Hero

Discover integrations

Strengthen your cyber resilience with workflows that connect your most critical security and IT investments.

Reduce cyber recovery risks

Uncover vulnerabilities, improve your security posture, and get actionable recommendations to remediate threats.

Boost the efficiency of your Security Operations Center

Integrate anomaly detection and data protection into your detection, response, and recovery workflows.

Get more from your current security and IT investments

Protect more of your data estate with the security systems you already have in place.

Use cases our security integrations enable

Enhance threat hunting and response

Use threat feeds in Cohesity Data Cloud to scan for known indicators of compromise in your backups.

 

Partners: CrowdStrike

Understand risk exposure using backup data

Scan backup data with the Cohesity CyberScan app powered by Tenable—any time, including during incident recovery—to avoid reinjecting known vulnerabilities back into production.

 

Partner: Tenable

Secure access to Cohesity clusters

Secure and control access to your Cohesity clusters through integrations with identity and access management (IAM) solutions to minimize risk.

 

Partners: CyberArk, Cisco, Okta, Ping Identity, Microsoft

Prioritize sensitive data protection

Identify gaps in protecting sensitive workloads and accelerate their protection to reduce cyber recovery and compliance risks.

 

Partners: Wiz, Normalyze, Cyera, Dasera

Prevent exfiltration of sensitive data

Identify sensitive data in your backups and prevent data loss.

 

Partner: Zscaler

Respond to and recover from a ransomware attack

Automatically protect data in response to a ransomware attack detected by Cisco XDR. Ingest data protection telemetry and execute automated recovery playbooks from your SOC tool.

 

Partners: Cisco, Palo Alto Networks, CrowdStrike, Microsoft, ServiceNow

Cohesity Security Advisory Council

The Cohesity Security Advisory Council is made up of independent experts who advise on emerging cybersecurity threats.
Dave de walt

Dave de walt

Cohesity Security Advisory Council Chair

Dave de walt

Dave de walt

Cohesity Security Advisory Council Chair

Dave DeWalt is Chair of the Cohesity Security Advisory Council and a veteran CEO, advisor, and investor who has led companies, from startups to the Fortune 500, on a transformational journey of success. Focused on technology and cybersecurity, Dave helped create more than $20 billion of shareholder value during his 15-plus years as President and CEO of three major companies. That includes driving the largest cybersecurity IPO to date as of 2013, and leading the largest all-cash deal in technology history as of 2010. Today, he serves as Managing Director of Allegis Cyber as well as investor and board member in the world’s most innovative companies such as Delta Airlines, Five9, Forescout, Phantom Cyber, Claroty, Team8, DataTribe, Illusive Networks, and Optiv.

Kevin mandia

Kevin mandia

Independent Board Member

Kevin mandia

Kevin mandia

Independent Board Member

Kevin is the founder of Mandiant at Google Cloud. He has served as the company’s Chief Executive Officer since June 2016, including as Chief Executive Officer of FireEye, Inc. until its corporate name change to Mandiant, Inc. in October 2021. Kevin served as a member of the company’s Board of Directors from February 2016 until September 2022, when Mandiant became a part of Google Cloud.

Kevin joined the company as Senior Vice President and Chief Operating Officer in December 2013, when FireEye acquired Mandiant Corporation, which he founded in 2004. Mandiant Corporation was widely recognized as the leading provider of cyber security incident management products and services prior to the acquisition by FireEye and went on to become the core of FireEye’s highly successful consulting business.

Kevin began his cyber security career in the United States Air Force, serving as a computer security officer in the 7th Communications Group at the Pentagon and later as a special agent and cyber crime investigator in the Air Force Office of Special Investigations. In the private sector, Kevin held senior positions in the security consulting divisions of Sytex, acquired by Lockheed Martin, and Foundstone, acquired by McAfee.

Kevin’s insight, gained from his work on the front lines of major cyber threats, is routinely requested by corporate directors, executives, and government officials who face serious cyber security challenges. He regularly provides commentary and analysis on cyber security issues for major news media and has testified in hearings before the U.S. House and Senate committees. Kevin has served as a member of the Cybersecurity Advisory Committee for the Cybersecurity and Infrastructure Security Agency since December 2021.

Kevin holds a B.S. in computer science from Lafayette College and a M.S. in forensic science from The George Washington University. He is also a graduate of the Harvard Business School’s Owner/President Management Program.

Marianne bailey

Marianne bailey

Marianne bailey

Marianne bailey

As a former NSA Executive and DOD CIO/CISO, Marianne brings over 35 years of experience across the Department of Defense (DoD), Intelligence community, and civil government sectors. She served as Deputy National Manager for National Security Systems (NSS) and Senior Cybersecurity Executive for the National Security Agency where she was directly responsible for systems across the government containing classified and/or sensitive information.  She also served as both Principal Deputy for Cybersecurity and Deputy Chief Information Security Officer (DCISO), Department of Defense, CIO. She received the Distinguished Executive Presidential Rank Award, the highest government civilian recognition, for her contributions to national security. Marianne Bailey currently leads Guidehouse’s Advanced Solutions Cybersecurity practice. Ms. Bailey earned a Bachelor’s degree in Engineering from the University of Maryland, College Park, and a Master’s degree from Industrial College of the Armed Forces, National Defense University.

Alex stamos

Alex stamos

Alex stamos

Alex stamos

Alex Stamos is working to improve the security and safety of the Internet through teaching and research as the Director of the Stanford Internet Observatory, a cross-disciplinary program studying the abuse of the internet. He also helps companies secure themselves as a Partner in the Krebs Stamos Group. He has served as Chief Security Officer at Facebook and Yahoo and was a co-founder of iSEC Partners. Alex has investigated and responded to several historical events and has been called the “Forrest Gump of InfoSec” by friends. He is a member of the Aspen Cybersecurity and Information Disorder Commissions, Annan Commission on Elections and Democracy and advises NATO’s Cybersecurity Center of Excellence. He has spoken on six continents, testified in Congress, served as an expert witness for the wrongly accused, earned a BSEE from UC Berkeley and holds five patents. 

Kelly bissell

Kelly bissell

Kelly bissell

Kelly bissell

Kelly Bissell leads Microsoft’s Services group globally. He has more than 28 years of cybersecurity experience.

Kelly has been working with hundreds of clients for 30+ years to help them be compliant and secure. At Microsoft, the goal is to work with clients and Security Engineering to transform the cybersecurity market to make the world safer and more secure. Doing so will drive more product adoption and enhance the Microsoft brand. Work with clients, regulators, and law enforcement to reduce cyber-crime.

Before Microsoft, Kelly led Accenture Security, before that, he built and led Deloitte Cyber Risk Services and held various leadership positions with Arthur Andersen, AT&T, and others. Kelly has held the role of CIO and CTO of two different companies and CISO for a global bank.

Kelly is involved in several industry and technology groups recently authoring various articles and by-lines in the Wall Street Journal, Financial Executive, USA Today, and many others.

Currently, Kelly is working with national security for several counties in the Five Eyes and NATO.

Kelly is tightly aligned with several cyber and law enforcement agencies around the world. He is working to secure the nations of Ukraine, Albania, and a few others.

Laura mather

Laura mather

Laura mather

Laura mather

Laura is Group Chief Operating Officer and a member of the Group Executive Committee at Societe Generale.

Laura has an experience of close to 30 years within Credit Suisse, she joined in 1994. She held several senior positions in IT.  In 2012, she was appointed Head of Information Technology for the EMEA zone and then Global Head of Production and Testing Group in 2013. In 2014, she became Chief Technology Officer, in charge of IT infrastructures and Chief Information Security Officer of Credit Suisse. Laura was previously Global Chief Information Officer at Credit Suisse from 2019.

Laura Mather holds a Bachelor of Commerce degree from the University of Witwatersrand in South Africa.

Jason chan

Jason chan

Jason chan

Jason chan

Jason Chan has spent over twenty years in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices.

Most recently, Jason built and led the information security team at Netflix for over a decade before retiring in July 2021. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting. Since retiring from Netflix, Jason has been advising a variety of companies on security products and strategy and is also an Operating Advisor at Bessemer Venture Partners.

Jason enjoys coaching, mentoring, and helping folks from underrepresented groups enter and advance in the cybersecurity industry. Outside of work, he enjoys reading, running ultramarathons, and volunteering in habitat restoration, trail maintenance, and wildfire management. He received a BS from the College of Charleston and his MS from Boston University.

Modernize your data security and management platform today

Loading