Data Activate: How Trusted Data Unlocks New Opportunities for AI Innovation- image 1

Data Activate: How Trusted Data Unlocks New Opportunities for AI Innovation

The article is also available at:
Ukrainian, Russian

Artificial intelligence algorithms require arrays of high-quality information, yet the most valuable historical data of most organizations remain hidden deep in backups. According to recent industry surveys, about 68% of companies cite storage fragmentation as the main obstacle to innovation. At the same time, 75% of IT managers note that expanding analytics platforms’ access to corporate systems increases vulnerability to cyberattacks. This situation creates a paradox, where petabytes of reliable assets remain idle due to compliance and security concerns.

Data Activate: How Trusted Data Unlocks New Opportunities for AI Innovation - image 1
ISSUES

Risks of uncontrolled data movement

Attempts to activate accumulated information through traditional bulk exports require building complex and fragile transfer pipelines. These processes inevitably lead to asset duplication and loss of control over confidentiality, as most preparation tools operate mainly with the working, or ‘live,’ environment. Organizations find it increasingly difficult to keep AI platforms in sync with the most current and verified information without manual intervention. Consequently, valuable transaction history or behavioral patterns remain locked within storage devices.

SOLUTIONS

Secure space for corporate analytics

Commvault Company developed Data Activate (formerly known as Data Rooms) not as another standalone AI platform, but as a secure bridge between backup systems and data activation tools. The manufacturer implemented the concept of policy-driven isolated spaces directly within the Commvault Cloud environment. Authorized specialists can classify, cleanse, and disseminate data sets without moving them outside the established security perimeter. Instead of risky one-time operations, the system regularly publishes updated secure snapshots.

ARCHITECTURE

Format compatibility and Zero Trust principles

The foundation of the tool is a Zero Trust architecture, which involves role-based access control (RBAC) and deep encryption at all stages. The system automatically applies sensitivity tagging and mechanisms for editing sensitive assets (such as personal data), ensuring strict compliance. The solution has native integration with key cloud partners, including Microsoft Azure and Snowflake. Compatibility is ensured by using open standards, such as Apache Parquet and Apache Iceberg, guaranteeing high asset portability.

PRACTICE

Accelerating the creation of machine learning models

The effectiveness of this approach is well illustrated by the example of a financial institution deploying its own fraud detection model. A traditional workflow would require copying arrays of archival transactions to external test environments, taking weeks and violating strict financial regulations. Thanks to the new platform, the bank creates a controlled workspace directly over backups, where account numbers are anonymized automatically. The filtered data is exported directly to the analytics platform, significantly reducing the preparation and deployment phase of the model.

DEPLOYMENT

From control to facilitation of innovation

The implementation of the latest functionality does not require the construction of a separate infrastructure, as it is activated as an organic extension of a unified cybersecurity platform. Automation of continuous audits and access control prevents unauthorized use of information. Analysts transition to a secure self-service model, enabling them to work faster with the necessary datasets. Thus, cybersecurity teams cease to be a restraining factor and become reliable partners in the technological development of the organization.

Commvault Data Activate transforms backups from a passive means of disaster recovery into a generator of strategic advantages. This combination of protection, management, and activation allows businesses to implement responsible artificial intelligence without any compromises in corporate security.

The company iIT Distribution as a Value Added Distributor offers expert support at all stages of the deployment of Commvault solutions. iITD specialists help design a reliable architecture, configure integrations for the specific processes of the customer, and provide comprehensive consulting support for information security and data management projects.

News

Current news on your topic

All news
All news