Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik

Rubrik Enhanced Performance, Usability, and Scale for Microsoft SQL and Oracle Database

Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.

Protect SAP HANA on IBM Power Systems with Rubrik Zero Trust Data Security

SAP HANA is often a database of choice for large enterprises looking to drive more significant insights and quick decision-making through real-time or advanced analytics. As a result, SAP HANA has become key to driving day-to-day operations for many organizations and must be protected to guarantee maximum availability. However, managing this protection is no easy feat.

Introducing Rubrik SaaS Support for Microsoft Azure SQL

Since January 2020, Microsoft Azure SQL DB has grown nearly 3x in popularity. This rapid growth comes as no surprise as Platform-as-a-service (PaaS) offerings have many benefits in the migration strategy from traditional SQL Server database workloads. The Microsoft PaaS offering, Azure SQL Database, takes care of mundane tasks once performed by Infrastructure Engineers such as patching operating systems and applying SQL Server updates or critical security patches.

Simulating Filesystem Tree with Billions of Files: Part 2

Following up on our Simulating Filesystem Tree with Billions of Files series, let's imagine that we want to create a filesystem with 1 billion inodes in memory. At this scale, every single byte used to represent the inode will use 1GB of memory. Just with the inode numbers, each with 8 bytes, will use at least 8GB of memory. If we consider, conservatively, that each inode will use approximately 50 bytes of space, it will not be feasible to store this information in memory.

What to Prioritize in Your Fight Against Rising Cybersecurity Threats

At our recent Data Security Summit, Bipul Sinha sat down with author and award-winning The New York Times cybersecurity journalist Nicole Perlroth to discuss learnings from her research and thousands of interviews with security leaders, government officials, hackers, spies, and more.

Is Your Board Adequately Addressing the Threat of Ransomware?

The real risk of business disruption, brand damage, and potential liabilities caused by ransomware attacks has elevated cybersecurity from a technical or operational issue normally handled by security teams, to a major Board level priority and discussion. Even the most sophisticated and mature organizations that once believed their cybersecurity defenses were robust are now rethinking their preparedness and response capabilities required to address the imminent threat of ransomware attacks.

Debunking the Myths about Air Gaps

The air gap, a cybersecurity countermeasure that isolates digital assets to put them out of reach of malicious actors, is the subject of many industry myths. Are you confused by all the myths around air gaps? Does it seem odd that logical air gaps are not considered air gaps in spite of their ability to defend against attacks? If you answered “yes” to these questions, you're likely not alone.

The Secure Data Layer: A Formidable Opponent Against Ransomware

When organizations are attacked by ransomware, only a little more than half are able to recover their data using a backup. This begs the question, “What about the rest? Why might they be unable to recover?” One reason may be that their backup data has been compromised. Backups are a hot target for hackers. If they can get to an organization’s backup data, they have far more leverage.

Something, Something, Hackathon: Rubrik Announces 6th Annual Hackathon Winners

Hackathons vary in sizes and shapes, but ours has typically been a 24-hour sprint, with teams submitting a five-minute video presenting their project. This year was our biggest hackathon yet, with almost 90 teams registering across a multitude of departments including Support, Sales, Product, Technical Writing, and, of course, Engineering! We crowdsource the first-round judging by asking anyone at Rubrik to participate in evaluating projects.

Operationalizing Data Resiliency

Oracle databases are an integral part of modern technological infrastructure for organizations globally. They underpin high-volume digital business, perform thousands of transactions, and house an organization’s critical and sensitive information. Today’s business requirements and data-driven applications are expanding the definition of “data loss” to include data that is inaccessible to the business for a period to significantly and negatively impact it.