Cohesity partners with Glean

Cohesity has announced a new partnership with Work AI leader Glean to become a fully integrated data source for the Glean platform. The partnership enables mutual customers to leverage high-quality backup data from Cohesity-protected workloads within Glean’s platform, further expanding enterprise knowledge and AI-driven insights.

  • Wednesday, 19th March 2025 Posted 1 year ago in by Phil Alsop

“Organisations struggle to manage and extract value from vast, diverse, and distributed data sources. Cohesity is breaking down the silos, helping them manage and secure data, wherever it lives, and providing new ways to use that data,” said Dr. Craig Martell, chief AI officer, Cohesity. “We’ve broadened the utility of our platform to bring Cohesity backup data to other widely used AI tools and services, like the Glean’s Work AI platform. Cohesity protects hundreds of exabytes of the world’s data and many of our customers leverage Glean on a massive scale. By joining forces, we can deliver significant value to our mutual customers.”

The integration of Cohesity-protected data into the Glean platform is expected to be available for customers later this year and will unlock multiple benefits, including:

Broader data source access – extending Glean’s connector capabilities to cover a wide variety of data sources protected by Cohesity, such as files stored on virtual machines, physical hosts, and NAS devices. The expanded reach will provide limitless search for users, based on permissions, across an entire data estate, unbound by system or storage architecture.

Search across historical data – enabling users to explore beyond the current state of data to access past versions of documents, including deleted files and other previously inaccessible data. Historical snapshots will offer a unique advantage, particularly in compliance, forensic investigations, and data recovery efforts.

No performance impact or increased costs – querying against backup copies of production application data allows production applications to remain in use without any performance degradation. Direct access to Cohesity backup data also eliminates the need for additional extraction, loading, and transformation tools.

File recovery and download – simplifying the search and download of current and historical backups directly from the Cohesity platform. If a document is inadvertently modified or deleted, users can pinpoint the precise version they need without relying on a manual retrieval process.

Granular access controls – allowing administrators to define who can search, access, and download data based on user role. Ensuring adherence to security policies and regulatory requirements will add another layer of security for protecting sensitive or confidential data. 

Cato Networks joins Westcon-Comstor's AWS Marketplace

Posted 2 days ago by Sophie Milburn
Westcon-Comstor has added Cato Networks to its AWS Marketplace programme, expanding cloud procurement options for partners.
Cynomi has enhanced its platform with AI Insights and co-worker Agents, aimed at supporting cybersecurity service delivery for MSPs and MSSPs.
WatchGuard Technologies has launched a new endpoint security portfolio that introduces changes to traditional EDR licensing models.

SonicWall reveals 2026 Cyber Protect Report

Posted 2 days ago by Sophie Milburn
SonicWall's latest report identifies the 'Seven Deadly Sins of Cybersecurity', focusing on protection outcomes crucial for small and medium-sized...
Hammer AI Works is an end-to-end ecosystem designed to support AI adoption across organisations.
Exabeam has updated its Agent Behaviour Analytics to improve visibility into AI activity and strengthen enterprise threat detection capabilities.
Kyndryl has introduced Agentic Service Management to support the transition from traditional IT operations to AI-driven workflows.

Adapting cybersecurity certification for AI integration

Posted 3 days ago by Sophie Milburn
ISC2 has updated its certification exam guidance to include AI security concepts, reflecting changes in cybersecurity roles and responsibilities.