General Tech

Rubrik -  - Design Centers and You

Design Centers and You

A Bit of History I still find technology fascinating – don’t you? There’s a certain joy in tinkering, building, and ultimately creating that never gets old. This goes back to my earliest days when I used ResEdit to change the Welcome to Macintosh screen to say Be very, very afraid, but it remained true after graduating from college and diving headfirst into learning Novell Netware and eDirectory. For those of us with a CNA, it never actually expires and doesn’t technically have to be removed from your resume. I’ll let you decide if it stays or not though. Over time, part of my responsibilities both as a data center architect at a customer and then later as a presales technical director at a solutions integrator involved input on new product evaluations. I had to determine how the various products would or wouldn’t fit into my data center or our solutions portfolio. There are many facets to these kind of evaluations, so it can be daunting to keep track of the mountains of minutia – everything from technical to operational to financial and more. What’s a Design Center? In time, one idea that I came to focus on was a concept…
Rubrik -  - Embracing Digital Transformation with Rubrik and Azure

Embracing Digital Transformation with Rubrik and Azure

The 2017 Microsoft Ignite conference was an event where several items were crossed off my bucket list. Not only did I get to spend an hour recording an episode of the Datanauts Podcast with the infamous Jeffrey Snover, creator of PowerShell and all-around nice guy, but I also held the privilege of showcasing Rubrik’s official integration across both Azure and Azure Stack in the expo hall. The idea that cloud-born services, such as elastic compute pools and Function-as-a-Service (FaaS) features, can be pushed towards on-prem deployments is fairly magical, and that’s the idea behind Azure Stack. But I’m getting a bit ahead of myself. The real question to answer starts with “why push cloud services to co-exist on premises?” And in this case, I’ll point to the presentation given by Mr. Snover on data center transformation. In it, he shares his thoughts on how the very fabric of being an IT professional is changing. Rather than being tactically focused on resources that create and deploy infrastructure, we’re gaining momentum as strategically-positioned forces that can go beyond staying relevant and actually get ahead of the mounting pile of technical debt that has quagmired progress in the past. Part of this change…
Rubrik -  - The Beauty of Immutability

The Beauty of Immutability

Imagine one or more of your systems is unavailable because of some malicious attack, whether a nasty virus, ransomware, or sabotage from a disgruntled employee. No worries, these things happen —  you’ll recover from backup. Except you discover that your backups have been compromised in the same manner (this has happened). This is usually where the term air gap gets dropped. Someone will say, “you need a truly offline backup — tape! There’s no way ransomware can get into a tape backup!” While that’s true, how long does it take to recover from tape stored in a land somewhere far, far away? If a backup takes so long to restore that there’s major financial or business impact, does it actually exist? Realistically, there are ways to protect your data stored by backup systems even without this gap. I recently wrote a blog post about immutable infrastructures, but compute infrastructures are not the only way that immutability matters in the data center. Immutable, by definition, means the state is set or inflexible once constructed. In other words, it cannot be changed. The goal is to build a more reliable automated compute infrastructure in order to enable stable continuous delivery. Data has become…
Rubrik -  - Encrypting Your Data in the Cloud, Part 1: Why It Matters

Encrypting Your Data in the Cloud, Part 1: Why It Matters

Data Breaches Are Trending While IT security in 2018 has been dominated with news about CPU vulnerabilities, we may very well look back on 2017 as the year of online data breaches and cloud data leaks. From stolen consumer data due to unpatched vulnerabilities to sensitive data leaks due to misconfigured cloud storage buckets, it seems that no one’s data was safe in 2017. For a number of reasons, this is a trend that is likely to continue in 2018 and beyond: The inexorable move from analog to digital means more and more of our data is being stored on computers and websites that are targets for hackers. For example, the Equifax breach impacted 145 million consumers who had personal information stolen. A greater percentage of company employees work remotely using a wide range of devices from desktops to smartphones. This expands the threat landscape and gives malicious actors more ways to compromise valuable data. The growth of the public cloud means that increasingly more data is being stored outside of company data centers in repositories that are accessible via public endpoints. This move to the cloud requires knowledge and skill sets that are still in short supply, leading to…
Rubrik -  - Worried About Viruses? Ransom? Data Loss? The Cure is Here!

Worried About Viruses? Ransom? Data Loss? The Cure is Here!

This is not hype! This is reality. Companies across industries get hit with viruses all the time. In the always-on economy, companies rely on 24/7 data availability, so any downtime can severely impact the business. The good news is that with a strong data management solution, you can quickly recover from a disaster without any data loss. Before we dive into how Rubrik delivers that solution, let’s go over what happens during a virus attack. The Lifecycle of a Virus Attack Before Rubrik As the above diagram shows, a typical attack has several phases: you get hit with the virus, your systems are under attack, and your business loses access to the encrypted data. Once it’s detected, your IT team documents and implements steps to prevent the virus from spreading. But since most organizations rely on data to perform daily operations, the data loss you’ve already experienced has a severe impact on the organization. Unfortunately, for many organizations, a virus’ life doesn’t end with patching the vulnerability. Even with a sophisticated antivirus software, viruses can remain in your system undetected. This often leads to further data corruption and a vicious cycle of attack, recover, and patch. For this reason, many…
Rubrik -  - 3 Cloud Data Management Trends to Watch in 2018

3 Cloud Data Management Trends to Watch in 2018

Enterprises across verticals are undergoing a digital transformation. They must now operate in the “always on” economy and execute instant service delivery to meet modern consumer demands. This shift requires an infrastructure that supports 24/7 application availability in both data center and cloud, while also ensuring data is protected and compliant. As data management becomes increasingly crucial to meet business goals, companies are exploring new solutions to streamline and automate their processes. Here are the top trends you can expect to see in 2018: 1. AI-Powered Data Management Leveraging machine learning for data protection and analysis provides valuable business opportunities, but enterprises have barely scratched the surface. According to Gartner, AI will be a major digital driver for reinventing both business models and the customer experience through 2025. One application of ML that many companies are expected to explore relates to event-driven IT. This model involves constantly sensing and responding to business events, which could be anything from a completed transaction to threat detection. As companies prepare for intelligent applications and analysis, they will seek solutions that can centralize data management across all their environments. 2. Accelerated Cloud Adoption While cloud computing isn’t new to the enterprise lexicon, it is…
Rubrik -  - Live Mount: Never Wait for a Restore Again!

Live Mount: Never Wait for a Restore Again!

If you’ve been keeping an eye on Rubrik, you probably have seen the term Live Mount a lot. So, what exactly is Live Mount? And why is it such a big deal? Live Mount describes the process of restoring a full VM from a backup – in a matter of seconds. Rubrik created Live Mount to satisfy lower RTOs while simultaneously lowering the total cost of ownership. If you need to get your data and application back up and running, but your business cannot withstand waiting for a restore, Live Mount is for you. To fully understand how this works, let’s first explore what a restore is by comparing a well-known backup and restore workflow. Suppose a backup job takes you 1 hour to perform. However, your data gets corrupted and you need to restore. With legacy solutions, a restore could take hours to complete. And every minute that passes with your data down is a financial loss for your business. In a traditional IT shop, the workaround for faster recovery is investing significantly in tools to speed up your backup windows and deploying replication technologies. These costs quickly accrue for a business. Rubrik’s Live Mount capability resolves this issue…
Rubrik -  - How to Avoid Ransomware Jail

How to Avoid Ransomware Jail

It’s 1983, and Ronald Reagan is sitting down to watch the hit film War Games. Five days later, the president asked his secretaries of state, “Could a scenario like war games ever happen?” One week later, General Vessey returned with the answer: “Mr. President, it is a lot worse than you think.” Was this the first time that cyber security and privacy had surfaced in computer systems? Categorically, no. Security and Privacy in Computer systems 1967 by Willis Ware was the first paper on the topic — written in 1967. So, since the beginning of networked computing, cyber security, and privacy have been a factor. So, why is it suddenly a huge industry buzzword? My thoughts on this are twofold: Across governments, the use and ideas of cyber warfare were dismissed, ignored, or forgotten. But in 2007, the Aurora test categorically proved that cyber attackers could inflict physical damage using computer tools. This was a pivotal moment, as critical infrastructure was at risk. Cybercrime then shifted to the public sphere with cyber groups lining their sights on non-government attacks, such as online fraud, ransomware, malware, and phishing. The role that security and privacy now play in IT and our personal lives…
Rubrik -  - Getting Strategic with Copy Data Management

Getting Strategic with Copy Data Management

Copy data management (CDM) is a term that we hear a lot in the industry. Yet, many of us don’t have a clear idea of what it really means. In this blog, I’ll walk you through what copy data management is and what makes Rubrik a strategic tool for it. The amount of data collected and processed by businesses has grown exponentially. Adding to this increase, a recent study performed by IDC cites the average number of copies per piece of data is 13. As you can imagine, this growth of data and copy data uses up storage space and can hinder performance. In fact, IDC estimated that 60% of storage is provisioned to store copy data – even with deduplication. This tells us that IT organizations need a reliable and scalable approach to managing copy data. An effective copy data management solution creates space efficiency and easily unlocks copy data use cases — such as test/dev, backup and recovery, and replication — across your entire infrastructure. So, let’s get a little closer to home. At a recent user group event, I had the opportunity to speak to a room of IT professionals and ask them a few questions: How…

    Close search icon

    Contact Sales