Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

8 Must-Ask Questions to Consider: Rubrik Ransomware Recovery Assessment

2021 was the year of ransomware. You couldn’t watch or read the news without hearing about another business falling victim. Cybersecurity Ventures estimates that a ransomware attack took place every 11 seconds in 2021, with global damages reaching an estimated $20 billion – that is 57x more than it was in 2015. Unfortunately, the reality is that ransomware is here to stay, and every organization, regardless of industry or size, is a potential target.

Become Cyber Resilient and Evade the Impact of Ransomware Attacks on Your Microsoft 365

Your Microsoft 365 data is a prime target for ransomware. Attackers know that Microsoft 365 lives directly in the path of business-critical operations now more than ever. As highlighted by Mandiant – one of the industry's leading cyber security firms – this translates to “targeted threat groups investing a lot of time and money into understanding Office 365 and understanding how to attack it.”

Introducing wachy: A New Approach to Performance Debugging

Wachy is a new Linux performance debugging tool that Rubrik recently released as open source. It enables interesting new ways of understanding performance by tracing arbitrary compiled binaries and functions with no code changes. This blog post briefly outlines various performance debugging tools that we commonly use, and the advantages and disadvantages of each. Then, we discuss why and how we built wachy.

Protect Archived Data from Ransomware with Immutability for Amazon Web Services Cloud Storage

Protecting your data in the cloud is fundamental to your security posture in terms of business continuity and disaster recovery. While Rubrik customers utilize the cloud every day to safely store off-site copies of their data, this blog is going to explain how we’ve made that practice even safer! We know that security threats to backup systems are on the rise, with hacking, malware, and even human error becoming more prevalent in the age of remote work.

WED2B Prevents Disruption from Ransomware Attack Using Rubrik in 24 Hours

It was 11 PM on a Friday in November of 2019. WED2B IT systems administrator Jamie Jeeves started receiving a barrage of email alerts warning that antivirus (AV) clients were crashing in the company’s central office. All prospects for a relaxing weekend vanished when Jeeves logged into the remote system to investigate the AV shutdowns. While checking the network’s file share, Jeeves noticed they were in trouble. Mass encryption of data was underway.

Efficient and Reliable Protection and Recovery of Nutanix AHV

You run many of your business-critical applications on Nutanix AHV. Protecting your data from cyberattacks and being able to quickly restore your applications, so your business can continue as usual. This is why, at Rubrik, we continue to innovate and expand protection for virtual environments, and we are humbled and proud to be a trusted partner when it comes to protecting businesses.

Rubrik Enhanced Performance, Usability, and Scale for Microsoft SQL and Oracle Database

Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.

Protect SAP HANA on IBM Power Systems with Rubrik Zero Trust Data Security

SAP HANA is often a database of choice for large enterprises looking to drive more significant insights and quick decision-making through real-time or advanced analytics. As a result, SAP HANA has become key to driving day-to-day operations for many organizations and must be protected to guarantee maximum availability. However, managing this protection is no easy feat.