Latest Posts

Rubrik - Blog - Rubrik and vSAN: Simplifying the Operational Experience

Product

Rubrik and vSAN: Simplifying the Operational Experience

There is no doubt that policy plays a big role in the move to the next generation of the Software-Defined Data Center (SDDC). The introduction of cloud and software-defined solutions to IT environments brings many benefits in terms of flexibility and choice, but with that comes complexity. With all of the moving parts it takes to make up our data centers today, administrators are having a hard time keeping up with organization and customer demands. Traditionally, IT Operations have taken an imperative approach to managing environments, which includes providing instructions to infrastructure and letting it execute, building out components, and doing configurations manually. This practice cannot keep up with the software-defined world. For this reason, we’re seeing a shift to a declarative model in which administrators define the desired end state while the software determines the best path possible to obtain it. This approach revolves heavily around policy. Simplifying the Operational Experience VMware’s vSAN is a great example of how moving to a declarative approach and applying policy can benefit an organization. vSAN abstracts away the mundane tasks of managing the performance and availability of the underlying storage, instead replacing it with a set of policies, or pre-defined capabilities applied to…
Rubrik - Blog - In the Eye of the Beholder: Rubrik Alta 4.2

Product

In the Eye of the Beholder: Rubrik Alta 4.2

In any new release, there are the major features–the items you mention when asked for a 30-second version of “what’s new.” Rubrik Alta 4.2 is no exception, and we’ve talked a lot about the high-level themes and larger features. Perhaps it’s my IT Operations background, but while I get excited about the banner features, I also find the “smaller” items fascinating. I still remember reading release notes as a customer and seeing a feature or feature improvement that, while minor to many, was hugely impactful and an indication of development maturity. Developer cycles that aren’t also put towards improving existing features or “minor additions” aren’t healthy, especially for current customers. Given that, I’d like to take a few minutes to focus on a few less notable, but still important, 4.2 features. Let’s call them “In the Eye of the Beholder” features. Edge on AHV & Hyper-V I’ve spent a lot of time with customers who have extensive Remote Office / Branch Office (ROBO) architectures. Backup and recovery in these environments can be painful–lack of physical space, tape rotation, budget challenges, performance, and more. While Rubrik in the data center traditionally has a 3 or 4 node minimum, Rubrik Edge was specifically…
Rubrik - Blog - Welcome to Polaris: Courtesy of Slack and Serverless Compute

General Tech

Welcome to Polaris: Courtesy of Slack and Serverless Compute

At Rubrik, one of the “good problems” we have is massive hyper-growth across teams, which means we have to find easy, scalable ways to communicate to each other. This was put to the test with our launch of the Polaris SaaS platform earlier this year, which led to the Sales Engineer team getting multiple “can I get access to the Polaris demo account?” requests every week. In order to create the new accounts, I simply log into Polaris and select the Invite Users link, and then a welcome email that includes all relevant login information would be sent to the team member requesting access. Even though the invite process was just a few clicks, as someone focused on all things DevOps and automation at Rubrik, a small part of me would shudder every time I had to manually repeat the invite process. That was until Chris Wahl decided to throw down the gauntlet. As a self-confessed Slack (our communication tool of choice) addict, I was immediately intrigued and got to work. I soon had a proof-of-concept Python script up and running that automated the new user invite process. But now what? How could I turn that basic script into a…
Rubrik - Blog - Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

General Tech

Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

With the rise of ransomware attacks and other security threats, data encryption is mission-critical for any company’s security strategy. The risk of improperly encrypting data is especially amplified in the cloud era, when sensitive data is stored outside of customer data centers and in public cloud providers like Amazon Web Services, Microsoft Azure, and Google Cloud Platform. While these providers offer a number of tools to help customer encrypt data before it is stored, these tools can be complex and difficult to use. Addressing the top enterprise pain points is what Rubrik was founded on, and security has been core to its platform since day one. This includes end-to-end encryption, both in transit and at rest, which we extend to our integration with public cloud providers. The Rubrik approach simplifies how data encryption is implemented and masks complexity from users. Rubrik has a wide breadth of cloud capabilities, from simple archival to DR and test/dev. Many customers leverage our CloudOut capability for archival of their backup data in public cloud providers, often as a replacement for tape. This approach is typically more cost effective and more reliable, and offers better response times in the event that data restoration is required.…
Rubrik - Blog - Introducing Radar: Faster Recovery from Ransomware

Company

Introducing Radar: Faster Recovery from Ransomware

Ransomware is on the rise, and it’s only getting smarter. Recent research shows ransomware attacks grew more than 350% annually.* To defend against attacks, many companies typically focus on building a perimeter to prevent malware from ever entering their data center. However, as malware becomes increasingly sophisticated, it’s no longer a matter of if  but when an organization will be hit by an attack. While building a perimeter is essential, preventing every threat, every time, across every surface area is a near-impossible task. In fact, 71% of organizations were hit by ransomware after it successfully bypassed their detection and prevention measures.** Once an attack breaks through your defenses, bouncing back quickly is painful. For many IT professionals, this will bring to mind long nights spent trying to detect an attack, analyze the extent of the damage, and restore quickly from backup files. Resiliency should be stronger, and recovery should be faster. The most effective strategy for defending against ransomware is a defense in depth. This approach encompasses a holistic, multi-level ransomware response strategy that incorporates both prevention measures to keep threats out and strong resiliency to minimize downtime when an attack happens. Meet Radar: Recover Faster. Stay Smarter. We’ve been…