Palo Alto, CA, USA
Dec 7, 2021   |  By Kristina Avrionova
You run many of your business-critical applications on Nutanix AHV. Protecting your data from cyberattacks and being able to quickly restore your applications, so your business can continue as usual. This is why, at Rubrik, we continue to innovate and expand protection for virtual environments, and we are humbled and proud to be a trusted partner when it comes to protecting businesses.
Dec 7, 2021   |  By Justin Ruiz
Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.
Dec 7, 2021   |  By Justin Ruiz
SAP HANA is often a database of choice for large enterprises looking to drive more significant insights and quick decision-making through real-time or advanced analytics. As a result, SAP HANA has become key to driving day-to-day operations for many organizations and must be protected to guarantee maximum availability. However, managing this protection is no easy feat.
Dec 7, 2021   |  By Jeff Inouye
Since January 2020, Microsoft Azure SQL DB has grown nearly 3x in popularity. This rapid growth comes as no surprise as Platform-as-a-service (PaaS) offerings have many benefits in the migration strategy from traditional SQL Server database workloads. The Microsoft PaaS offering, Azure SQL Database, takes care of mundane tasks once performed by Infrastructure Engineers such as patching operating systems and applying SQL Server updates or critical security patches.
Dec 3, 2021   |  By Prudhvi Dharmana
Following up on our Simulating Filesystem Tree with Billions of Files series, let's imagine that we want to create a filesystem with 1 billion inodes in memory. At this scale, every single byte used to represent the inode will use 1GB of memory. Just with the inode numbers, each with 8 bytes, will use at least 8GB of memory. If we consider, conservatively, that each inode will use approximately 50 bytes of space, it will not be feasible to store this information in memory.
Nov 29, 2021   |  By Murthy Mathiprakasam
At our recent Data Security Summit, Bipul Sinha sat down with author and award-winning The New York Times cybersecurity journalist Nicole Perlroth to discuss learnings from her research and thousands of interviews with security leaders, government officials, hackers, spies, and more.
Nov 29, 2021   |  By Jeffrey Phelan
The real risk of business disruption, brand damage, and potential liabilities caused by ransomware attacks has elevated cybersecurity from a technical or operational issue normally handled by security teams, to a major Board level priority and discussion. Even the most sophisticated and mature organizations that once believed their cybersecurity defenses were robust are now rethinking their preparedness and response capabilities required to address the imminent threat of ransomware attacks.
Nov 17, 2021   |  By Adam Eckerle
The air gap, a cybersecurity countermeasure that isolates digital assets to put them out of reach of malicious actors, is the subject of many industry myths. Are you confused by all the myths around air gaps? Does it seem odd that logical air gaps are not considered air gaps in spite of their ability to defend against attacks? If you answered “yes” to these questions, you're likely not alone.
Nov 16, 2021   |  By Kim Lambert
When organizations are attacked by ransomware, only a little more than half are able to recover their data using a backup. This begs the question, “What about the rest? Why might they be unable to recover?” One reason may be that their backup data has been compromised. Backups are a hot target for hackers. If they can get to an organization’s backup data, they have far more leverage.
Nov 15, 2021   |  By Adam Gee
Hackathons vary in sizes and shapes, but ours has typically been a 24-hour sprint, with teams submitting a five-minute video presenting their project. This year was our biggest hackathon yet, with almost 90 teams registering across a multitude of departments including Support, Sales, Product, Technical Writing, and, of course, Engineering! We crowdsource the first-round judging by asking anyone at Rubrik to participate in evaluating projects.
Dec 8, 2021   |  By Rubrik
WED2B prevented disruption from a ransomware attack in November 2019, restoring critical SQL databases with Active Directory immediately. “With Rubrik, we experienced zero data loss, zero impact to our core business, we paid nothing in ransom fees and were up and running in 24 hours, which is fantastic” Rob Mole, Head of IT & Solutions.
Sep 23, 2021   |  By Rubrik
Hear from Former Director of the Cybersecurity and Infrastructure Security Agency (CISA), Chris Krebs, about his experiences and insights into the priorities companies should be focusing on to combat the growing threat of Ransomware.
Sep 23, 2021   |  By Rubrik
Join Nicole Perlroth, acclaimed reporter at The New York Times cybersecurity and author of “This is How They Tell Me the World Ends” and Bipul Sinha, Rubrik CEO, for a captivating fireside chat on emerging cybercrime and what you need to prioritize in order to fight back.
Sep 23, 2021   |  By Rubrik
The first 24 hours after a major security incident are critical to keeping your business up and running. What can you do to protect your organization’s valuable data and critical IT assets in the event of a ransomware attack? Come listen to Kevin Mandia, Mandiant CEO and security expert to learn best practices that IT leaders can put into practice today. Hear about the successes (and failures) of other organizations, and how your team can avoid being a victim.
Sep 16, 2021   |  By Rubrik
Is your data safe from ransomware attacks? Hear from security leaders from both the private and public sectors to learn why network, perimeter, and application security isn’t enough. Learn about new cyber/ransomware threats, how ransomware impacts every layer of your organization from board decisions to shareholder value, and how you can survive an attack without paying the ransom.
Aug 24, 2021   |  By Rubrik
With Zero Trust Data Management™, you can now turn major attacks into recoverable events. Zero Trust Data Management is the idea that no one is trustworthy - not users, endpoints, or applications.
Aug 4, 2021   |  By Rubrik
Langs Building Supplies was hit with #ransomware. Hear from their CIO, Matthew Day, and IT Systems Analyst, Aaron Pritchard, as they share their gritty, authentic perspective on what it’s like to be hit, and how to respond when everything feels like it’s in disarray.
Jul 14, 2021   |  By Rubrik
Deploying a Rubrik Cloud Cluster on AWS has never been easier! Watch this video to learn how you can utilize the AWS Marketplace to easily deploy a fully configured 4 node Rubrik cluster in the cloud. Running Rubrik data management software in the cloud enables many features such as backup of Cloud Native NAS filesystems, VMC on AWS protection, point-in-time recovery of SQL, Oracle or SAP Hana and much more...
Jul 6, 2021   |  By Rubrik
Managing a large distributed environment can get busy. Rubrik has created a comprehensive API that can be integrated with any other system or workflow to ensure consistency and save you time. This allows you the flexibility to leverage pre-made integrations or custom-build your own. APIs can be used to avoid long wait times and ticket overflow, and empower users to assign SLAs, perform restores or monitor backups.
Jul 6, 2021   |  By Rubrik
Ransomware is still on the rise with attacks expected to occur every 11 seconds by the end of 2021. Learn how Rubrik can help you recover fast without disrupting your business.
Nov 3, 2021   |  By Rubrik
Rubrik is the world's first Cloud Data Management platform that delivers data protection, search, analytics, and copy data management to hybrid cloud enterprises.
Nov 3, 2021   |  By Rubrik
Ransomware Recovery For Dummies introduces a sensible approach to recovering quickly from ransomware attacks that you can't avoid. After exploring the ransomware basics, we'll cover the important role backup solutions play in protecting your data, as well as what features you need to recover from ransomware. By the end of this ebook, you will learn how to build a recovery plan that makes sense and keeps your organization safe. We also include the top ten tips for building the most effective ransomware recovery plan.
Oct 1, 2021   |  By Rubrik
We understand that a ransomware attack is one of the worst-case recovery scenarios that you can face. In the event of an attack, you'll likely be dealing with widespread business and logistics issues.
Oct 1, 2021   |  By Rubrik
Backups are one of the most, if not the most, important defenses against ransomware. If compromised, however, attackers can use them against you, forcing you to choose between losing your data and paying the ransom. Businesses should be able to recover quickly and reliably with as little data loss and financial impact as possible. To do so, organizations must first develop a strong ransomware remediation plan.
Sep 1, 2021   |  By Rubrik
Most of the collective data fueling today's technological and scientific advances consists of unstructured data files - trillions of them. Large files, medium files, and small files are stored on NAS systems, Unix servers, Windows servers, and public cloud platforms. And the number of individual files behind these innovations continue to increase at an exponential rate. Download this ebook and learn how to enhance visibility, protection, and mobility at petabyte scale for your unstructured data.
Sep 1, 2021   |  By Rubrik
Let's face it, recent ransomware attacks have caught many IT professionals off guard. Reason being is they honestly didn't have adequate plans in place. And it's not totally their fault. The ransomware attacks of today are far more sophisticated. Which means you need an equally sophisticated, yet easy to implement plan in place to survive and recover. In this whitepaper, Framework for a Comprehensive Ransomware Recovery Plan, we give you the tools to develop your own ransomware recovery playbook.

Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

With Rubrik Enterprise Edition, you can now turn major attacks into recoverable events. Your organization can take advantage of Zero Trust data protection, Ransomware Investigation, Sensitive Data Discovery, Incident Containment and Orchestrated Application Recovery on a single SaaS platform.

Why Rubrik?

  • Operational Excellence: Stop managing backups. Automate data operations and cut management time by 70-90%.
  • Ransomware-proof Backups: Don’t let ransomware consume your backups. Rubrik offers the only backup solution that is immutable and secure by design.
  • Never Pay for Hardware Again: Run our software in the cloud or on a qualified hardware platform of your choice.
  • Lower TCO: Break free from legacy solutions with expensive renewals and save 30-50%.
  • Fast Path to the Cloud: Unlock the cloud for long term data retention and better cloud economics. Easily archive to the cloud. Migrate applications to the cloud. Protect cloud-native applications.
  • Proactive Support: Our Support Engineers have your back, even before issues surface. That’s why we’ve achieved an audited NPS of 82.

Protect your data and applications from ransomware, rogue employees, natural disasters, and operational failures.