Latest Posts

Rubrik - Blog - Rubrik Achieves New Federal Certification: Why it Matters

Company

Rubrik Achieves New Federal Certification: Why it Matters

Today, I’m excited to announce that Rubrik has achieved EAL2+ Common Criteria certification for its software-defined appliances. After months of rigorous evaluation, we’re proud to provide our partners and customers with a fully-certified data protection solution that enables secure management of physical and virtualized data, across all locations — on-premises, at the edge, and in the cloud. Over the past year, the interest of Rubrik within the Federal Government has accelerated at a rapid pace. We have been adopted by organizations within the Defense Department, intelligence community, and civilian agencies in support of their mission. With this, our partner community has grown exponentially by embracing Rubrik as a solution partner across systems integrators and value added resellers. We’re excited to continue supporting our customers in achieving their business objectives and know that Common Criteria certification is a meaningful addition to that support. Common Criteria, which is mandated by the U.S. government, is an internationally recognized set of guidelines that define a framework for evaluating security features and capabilities of IT security products. At Rubrik, security has been built into our platform from the beginning. We provide in-flight and at-rest encryption, as well as offer a FIPS 140-2 Level 2 certified…
Rubrik - Blog - Live Mount: Never Wait for a Restore Again!

General Tech

Live Mount: Never Wait for a Restore Again!

If you’ve been keeping an eye on Rubrik, you probably have seen the term Live Mount a lot. So, what exactly is Live Mount? And why is it such a big deal? Live Mount describes the process of restoring a full VM from a backup – in a matter of seconds. Rubrik created Live Mount to satisfy lower RTOs while simultaneously lowering the total cost of ownership. If you need to get your data and application back up and running, but your business cannot withstand waiting for a restore, Live Mount is for you. To fully understand how this works, let’s first explore what a restore is by comparing a well-known backup and restore workflow. Suppose a backup job takes you 1 hour to perform. However, your data gets corrupted and you need to restore. With legacy solutions, a restore could take hours to complete. And every minute that passes with your data down is a financial loss for your business. In a traditional IT shop, the workaround for faster recovery is investing significantly in tools to speed up your backup windows and deploying replication technologies. These costs quickly accrue for a business. Rubrik’s Live Mount capability resolves this issue…
Rubrik - Blog - Rubrik Multi-tenancy: Secure Data Isolation for a True Cloud Computing Era

Product

Rubrik Multi-tenancy: Secure Data Isolation for a True Cloud Computing Era

Multi-tenancy is one of the cornerstones of a cloud data management platform. It enables you to support multiple customers (commonly referred to as ‘tenants’) on a single platform. Pooling resources results in lower costs, greater efficiencies, and faster innovation for both tenants and service providers. Secure data and metadata isolation is required in multi-tenant environments. Traditionally, data isolation required for multi-tenant environments is established as physical boundaries. The storage domain, including its compute resources, is divided into multiple partitions, and role-based access control is applied on those partitions, as shown above. Each tenant is given a rigid partition isolated from others using physical boundaries. The resources are often over-provisioned to meet tenant demand during peak usage. Thus, resources are often underutilized and typically wasted. The security principals (user and service accounts) need to be reserved for each partition. Rubrik brings an innovative cloud-based framework for secure data and metadata isolation. This is designed to give the best of both worlds; security benefits of physical boundaries and economic advantages of a true cloud computing model. It is made possible by virtualizing all resources so that tenants can share allocated resources in a secure, isolated fashion, as pictured above. Let’s take a…
Rubrik - Blog - How to Avoid Ransomware Jail

General Tech

How to Avoid Ransomware Jail

field_5a73467287db1
Rubrik - Blog - 2017 in Review: Tech Innovation & Industry Recognition

Company

2017 in Review: Tech Innovation & Industry Recognition

field_5a73467287db1

Close search icon

Contact Sales