General Tech

Rubrik -  - Built-in Immutability for Cyber Resiliency

Built-in Immutability for Cyber Resiliency

Imagine one or more of your systems is unavailable because of some malicious attack, whether a nasty virus, ransomware, or sabotage from a disgruntled employee. No worries, these things happen —  you’ll recover from backup. Except you discover that your backups have been compromised in the same manner. This is usually where the term air gap gets dropped. Someone will say, “you need a truly offline backup — tape! There’s no way ransomware can get into a tape backup!” While that’s true, how long does it take to recover from tape stored in a land somewhere far, far away? If a backup takes so long to restore that there’s major financial or business impact, does it actually exist? Realistically, there are ways to protect your data stored by backup systems even without this gap.  I previously wrote a blog post about immutable infrastructures, but compute infrastructures are not the only way that immutability matters in the data center. Immutable, by definition, means the state is set or inflexible once constructed. In other words, it cannot be changed. The goal is to build a more reliable automated compute infrastructure in order to enable stable continuous delivery. Data is becoming more and more…
Rubrik -  - Exploring Passive Survivability: Bracing for a Cyber Attack

Exploring Passive Survivability: Bracing for a Cyber Attack

Security attacks continue to be on the rise as threats like ransomware grow more mature. Many enterprises find themselves unprepared for an attack, with more organizations opting to pay ransom than ever before. This is because recovering from an attack is often time-consuming and complex, and in many cases, the backups themselves are compromised. Although preventing ransomware attacks may seem near impossible, there are tools and infrastructure best practices that can help you build an effective ransomware remediation plan to ensure cyber resiliency. In an article with Infosecurity Magazine, Robert Rhame, Director of Market Intelligence at Rubrik, explores the passive survivability model and how this framework can enable your team to bounce back from a successful attack. Let’s take a quick look at this model and how, according to Rhame, it can prepare your team.  A version of the below excerpted article originally appeared in Infosecurity Magazine. Design Your Infrastructure for Ransomware Resiliency When it comes to preparing for a threat that you can’t stop, your infrastructure must be designed in such a way that an attack, although damaging to your business, does not cause all of your operations to sink. Like a modern battleship, your infrastructure should be created…
Rubrik -  - How to Create a Successful Data Lake

How to Create a Successful Data Lake

Data-driven decision making is transforming how businesses and IT operate. As organizations look to access all types of information, they have carved out a need for higher-level infrastructure experts who help unlock new value from their data. The modern-day DBA has an opportunity to be an in-house expert and operate as a strategic business partner for managing this data and ensuring it is available to those who need it. To do this, in addition to building up their cloud and DevOps skills, many DBAs are delivering on this opportunity by turning to data lakes, a large repository into which data—in its raw, natural form—flows from many sources. Users across an organization can then access and analyze the centralized data. The true power of a data lake shines when you can maximize adoption across your enterprise so that big data informs as many business decisions as possible. To create your own data lake, you’ll need to decide on platforms and data sources, but, most importantly, you’ll need to determine how you can present the data lake to stakeholders to increase adoption across the organization. What is a Data Lake & Do You Need One? Enterprises in all industries and of all…
Rubrik -  - The Right Recipe for a Multi-Cloud Transition

The Right Recipe for a Multi-Cloud Transition

An inside look at how America’s Test Kitchen navigated their multi-cloud journey The outset of a new year (and a new decade) is prime time for IT teams to reevaluate their environments and scope out new data management strategies. And yet, with talk of digital transformation and cloud journeys saturating the air at tech conferences and consuming Twitter feeds, it’s also prime time for IT leaders to catch a case of the buzzword blues. The amount of information and choices available can be more paralyzing than freeing, leaving IT teams trudging into 2020 without any energy or motivation to enact change and modernize their infrastructure.  But before all the buzzwords have you spinning into an existential crisis, consider taking a page out of Dustin Brandt’s book. Brandt, Director of IT at America’s Test Kitchen (ATK), saw a relocation in ATK’s headquarters as an opportunity to reduce their data center footprint and overhaul their entire IT infrastructure. Despite challenges of re-platforming and re-provisioning infrastructure, ensuring consistent security, and navigating complex network integrations, Brandt also seized this opportunity to transition to a multi-cloud model. Take a look at how Brandt and his team made these changes as painless as possible, and what…
Rubrik -  - 5 Signs You’ve Outgrown Your Legacy Data Management System

5 Signs You’ve Outgrown Your Legacy Data Management System

Despite all the talk about “data-driven decisions,” one thing is often neglected: making sure the data is actually ready to “drive.” Too many companies continue to cling to their legacy IT systems, even when those systems no longer fit the business. Outdated data management solutions require IT teams to spend valuable time maintaining and troubleshooting, and also prevent organizations from getting the most out of their data. On top of this time-consuming management, relying on legacy technology can increase vulnerability to serious risk factors—from customer dissatisfaction to security breaches. So, how can you tell that you’ve outgrown your legacy data management system and that it’s time for a change? Here are five strong signals. Unnecessary Complexity Has You Spinning Your Wheels Legacy data management often entails a complicated, multi-tiered architecture that results in siloed data and disorganization. As a result, maintenance requires a lot of manual work. These are some of the signs that you’re mired neck-deep in unnecessary complexity: Your team spends time devising workarounds for software or designing workflows specifically to accommodate a legacy technology’s capabilities. Your team has created a Frankenstein-like combination of supplemental software to make up for the shortcomings of your legacy system
. Your team…
Rubrik -  - How Automation Can Advance Your Career

How Automation Can Advance Your Career

Working in IT keeps you on your toes as you constantly evaluate, test, and implement new technologies and applications. In many ways, IT environments are getting more difficult to manage and protect due to rapid data growth, the increase in available tools and integrations, and the rise of cloud adoption. In addition, IT organizations are now (finally!) often considered strategic business partners as data becomes more valuable and business-critical. This shift also means that IT admins are often asked to do more with less, which is why many organizations are leaning on automation. And (despite popular belief) creating scripts and automated tooling isn’t just for developers. Any IT professional—whether you’re an entry-level backup admin or seasoned DBA—can leverage automation. It’s a great way to meet your goals and advance your skillset. To give you a little inspiration, I can still remember exactly where I was and what process I automated for the first time. It was a fully automated NetApp Clustered Data ONTAP upgrade process that included creating a temporary HTTP server that could be used in the field. I also remember, looking back at that specific piece of automation, how rudimentary it was compared to what I’m doing today.…
Rubrik -  - GraphQL vs REST: What You Need to Know

GraphQL vs REST: What You Need to Know

Of late, GraphQL has been presented as a revolutionary alternative to REST APIs—but as with anything else, it has its pros and cons. In some scenarios, GraphQL will indeed be a better solution, but in others, you might find that REST APIs are still preferable. This blog post will walk through the basic differences between GraphQL and REST APIs so you can make the best possible decisions for your automation needs. GraphQL: An Introduction GraphQL follows the same set of constraints as REST APIs, but it organizes data into a graph using one interface. Objects are represented by nodes (defined using the GraphQL schema), and the relationship between nodes is represented by edges in the graph. Each object is then backed by a resolver that accesses the server’s data. When a GraphQL server responds to an end user’s request, it begins with the query root, and the resolver executes every field on the requested object. A key-value map houses each field’s values, and some return another object selecting another set of fields. This continues until only a string or a number is returned. The server then responds with a nested set of objects, as requested by the end user. The…
Rubrik -  - Top 3 Data Management Trends at NetApp Insight

Top 3 Data Management Trends at NetApp Insight

Last week, Rubrik was thrilled to be a sapphire sponsor at  the NetApp Insight Conference, where we had the opportunity to speak firsthand with our customers, give a sneak peek of our upcoming NetApp SnapDiff integration, and highlight our strategic partnership with NetApp. Attending Insight also provided significant, well, insights into what’s top of mind for IT organizations and the biggest challenges enterprises face with data protection. To help navigate the sea of information, we’ve put together a list of the biggest trends and observations from Insight:  1. Everyone is thinking about multi-cloud. Data is everywhere. As data mobility becomes a reality, so does the concept of data in multiple clouds. This multi-cloud operations paradigm leads to complex management and potential compliance violations. At Insight, it became clear when speaking to customers that they need simplification of infrastructure and operations across all environments, especially as data becomes increasingly fragmented. This strategy complements Rubrik’s founding vision to simplify data management and track and store data where it makes the most sense. 2. Customers are looking for modern data protection and control. Many IT orgs today are faced with the problem of clunky, legacy data protection systems with little ROI. On top…
Rubrik -  - How Infrastructure as Code Supports DevOps Best Practices

How Infrastructure as Code Supports DevOps Best Practices

As operations increasingly migrate to the cloud, there are more opportunities to develop support solutions and infrastructure, from ensuring security to improving integrations. Infrastructure as code can help you increase automation and reduce your deployment cycle time so you can help more customers interested in these services. Incorporating infrastructure as code into your IT org’s practices can help eliminate costly human setup errors and inconsistencies, save time, and more easily debug issues with your team or the open source community at large. What is Infrastructure as Code, Anyway? Infrastructure as Code (or IaC) is a descriptive model that allows you to automatically generate a desired environment, including networks, VMs, and connection types. IaC uses the same type of versioning approach that DevOps and software engineering teams use in source code, but it’s applied to build the exact same environment for each and every deployment. Consider IaC a method of automating the process of test environment setup. In the past, you would have had to manually specify the machines, configuration, and network each time you were testing an application in a particular environment. The manual approach is prone to human error and quite time-consuming. IaC automates the process by giving you…