Tagged in

data protection

Rubrik -  - How to Protect Mission-Critical Oracle Databases with Rubrik

Product

How to Protect Mission-Critical Oracle Databases with Rubrik

When it comes to protecting mission-critical Oracle databases, many DBAs have traditionally turned to Oracle Recovery Manager (RMAN).  However, with thousands of options and hundreds of scripts, protecting Oracle databases at scale can be a challenge for even the most seasoned DBA.  This blog wiIl explore how Rubrik Cloud Data Management simplifies the protection of Oracle databases by enabling DevOps-centric automation, instant recovery, self-service clones, and streamlined collaboration between DBAs and backup admins.   Automate Oracle Data Protection with Rubrik Backup Service and SLA Domain Policies For organizations looking for a hands-off approach to Oracle data protection, Rubrik provides the Rubrik Backup Service (RBS) and SLA Domain Policies. RBS is a lightweight connector that can be installed on either Linux or UNIX hosts and auto-discovers all of the Oracle real application clusters (RAC), hosts, databases, and tablespaces within the environment.  Once the entire Oracle environment is discovered, users can leverage Rubrik’s intelligent and automated SLA policy engine to create declarative policies that define backup frequency, retention duration, and desired location. After an SLA policy has been mapped, Oracle databases will be automatically protected, replicated, and archived. “One of the biggest advantages with Rubrik over legacy solutions is its policy-based management for…
Rubrik -  - Rubrik Named a Data Resiliency Leader

Company

Rubrik Named a Data Resiliency Leader

As modern enterprises advance their digital transformation strategies, data is growing increasingly fragmented and difficult to manage. When combined with the rising number of privacy regulations and security threats, it’s critical that IT leaders prioritize adopting cutting-edge solutions that can ensure data resiliency across multiple data sources.  Rubrik was architected to enable enterprises to protect and maximize value from data that is scattered across data centers and clouds. Today, we’re thrilled to announce that Rubrik has been named a Leader in The Forrester Wave™: Data Resiliency Solutions, Q3 2019. The report evaluated 10 vendors based on 40 criteria, which were grouped into three categories: current offering, strategy, and market presence. Despite being in the market for only five years, we’ve been recognized as a Leader and achieved the highest possible score in the strategy category, with among the highest scores in the security and backup optimizations criteria. Based on rigorous research and analysis, Forrester identified three capabilities that data resiliency solution customers should look for in a provider. Rubrik believes that its innovative platform aligns with these principles, empowering IT professionals to: Drive policy-based execution. According to Forrester, “It’s not practical for firms to operate the backup infrastructure using individual…
Rubrik -  - 3 Steps to Constructing a Security-First IT Strategy

General Tech

3 Steps to Constructing a Security-First IT Strategy

How CIOs and other IT leaders can successfully guide their teams into a security-first IT strategy and earn stakeholder buy-in. Cybersecurity threats are not just becoming increasingly frequent and sophisticated– they remain a top financial concern for businesses, regardless of region or industry.  It is now on the shoulders of IT leaders to navigate the technical security landscape and build agile teams that can dynamically respond to new threats. In addition, because of the financial implications of downtime and breaches, these leaders must also be able to abstract the business value of security in order to influence company-wide priorities.   I sat down with Ron Sinopoli, CIO of McHugh Construction, to discuss how CIOs and other IT leaders can effectively drive and advocate for a security-first posture within their organizations. Sinopoli has been the CIO of McHugh for the past year, and he has already led the company through an entire upheaval of its IT strategy in order to uplevel security measures as a strategic priority for the business.   Here’s an inside look at the three major stages Sinopoli led his organization through when shifting to a security-first posture. Stage 1. The Security Event Post-Mortem: Conducting an Honest Analysis  “After all,…
Rubrik -  - Rubrik is Certified for VMware vCloud Director!

Company

Rubrik is Certified for VMware vCloud Director!

At Rubrik, we take a partner-focused approach to develop innovative solutions for the modern enterprise. Many customers leverage Rubrik’s solutions for VMware (vSphere, vSAN, VMware Cloud Foundation, vRealize Suite, vCloud Director, and Continuous Data Protection) to seamlessly automate and operate within a hybrid cloud environment. Rubrik has collaborated with VMware to design and develop our vCloud Director data management solution. This also includes delivering the Rubrik Extension for vCloud Director using the vCloud Director Extensibility Framework introduced in vCloud Director 9.1. This extension enables Rubrik actions and workflow to be directly executed within the vCloud Director user interface. The Rubrik Extension for vCloud Director empowers service providers and global system integrators to offer self-service data management for their customers. We are pleased that Rubrik’s integration with vCloud Director will be listed on the VMware Compatibilty Guide. Products listed on the VMware Compatibility Guide are supported by VMware’s Global Support Services organization, providing customers the buying assurance they need. “Rubrik worked with VMware as a design and launch partner to deliver a tightly integrated solution that can be consumed directly within the vCloud Director user interface. The integration follows VMware’s best practices and enables joint VMware and Rubrik service provider partners…
Rubrik -  - Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Product

Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Cloud security is one of the topics du jour in the enterprise IT space. In fact, it’s a big enough topic that Amazon Web Services (AWS) hosted their own security conference, AWS re:Inforce, back in June. It highlights the challenge with securing your data in the cloud,  especially if you are using tools and approaches that were not designed for security from the start. Not adhering to good security practices exposes cloud customers to the potential risk of being hacked and having data stolen. To assist customers and partners with building secure solutions, AWS has codified recommended practices and principles into the security pillar of their AWS Well-Architected Framework. The Well-Architected Framework is a tool for evaluating the soundness of any solution running on AWS and leveraging their services. The framework is comprised of five conceptual areas called pillars, including the security pillar.  So where does Rubrik Polaris fit into this picture? We previously announced the general availability of AWS native protection support in Rubrik Polaris, our Software-as-a-Service (SaaS) platform for cloud data management. Now, we want to explore how Polaris is able to build a secure solution for protecting Amazon EC2 instances and Amazon EBS volumes using the recommended…
Rubrik -  - Automating VM Protection in Rubrik with vSphere Tags

Product

Automating VM Protection in Rubrik with vSphere Tags

An oft ignored but useful organization tool, tags are labels that can be applied in your VMware inventory to organize and sort objects. Tags allow you to attach metadata to objects, making it easier to sort and search through your inventory. But wait…there’s more. Tags can also be used in conjunction with other programs like vRealize Automation to help manage an objects lifecycle.  Seen in the picture below is an assigned tag on a VM. To get the most out of vSphere tags, it’s important to also understand the concept of categories.  Categories can be used to group your tags together. Think of it like a large filing cabinet: each drawer is a category, and inside of a drawer, there are folders with objects. These folders have a tag or label on the top. As an example, you may create the category of Operating Systems  that contains tags like Windows 10  or Windows 7  and so on. Here is a very simple diagram of the hierarchy: This is one of the ways tags and categories can be used to help organize your environment. Here’s how you add a category for tags in vSphere: So what could we use categories and…
Rubrik -  - Rubrik SLA Domain: Settings, Ops, Considerations

Product

Rubrik SLA Domain: Settings, Ops, Considerations

This multi-part blog series will take a deep dive into Rubrik’s SLA Domains to assist in understanding them better as well as configuring them optimally for your environment. SLA Domains Explained In the data protection world, Service Level Agreements (SLAs) define protection levels for workloads, availability targets, and objects that are crucial to a company. Collecting this information, implementing it, and staying compliant with the SLA is usually a tedious and difficult process. Rubrik uses SLA Domains to make those SLAs easier to achieve.  SLA Domains are comprised of these three components: Snapshot protection and retention  Replication  Archival When combined, these components protect and help manage the lifecycle of your most critical data. SLA Domains can be set to align with your company’s own SLAs, making compliance incredibly simple. Additionally, Rubrik’s SLA Domain construct is declarative in nature, allowing for a set it and forget it style of implementation. While it may seem like a small thing to use declarative policies, there is a major difference between old-style imperative backup jobs and Rubrik’s declarative SLA Domains. To understand the difference, imagine a situation in which you want to give your friend a LEGO set for them to build. The imperative…
Rubrik -  - Managing Encrypted AWS Snapshots with Rubrik Polaris

Product

Managing Encrypted AWS Snapshots with Rubrik Polaris

Werner Vogels, CTO of AWS, has taken to wearing a T-shirt during his recent keynote speeches with the admonition, Encrypt Everything. This statement highlights the growing concerns over unauthorized access of data and regulations like the General Data Protection Regulation. Encrypting everything  is no longer just a nice-have, it’s a must-have for any business with workloads running in a public cloud. The challenge for most customers is knowing what encryption method to choose and how to properly manage their encryption keys. Making the wrong choices can leave a customer’s data as unprotected as it would be with no encryption at all. AWS, as well as other cloud providers, offers a number of options for simplifying the encryption of data in transit and at rest. This includes the capability to encrypt data stored in a customer’s Amazon Elastic Block Storage (EBS) volumes. This feature can be enabled with a check of a box, and the encryption is automatically handled using the AWS Key Management Service (KMS). To ensure end-to-end encryption, including when a snapshot of an Amazon EBS volume is taken and backed up, AWS will automatically encrypt the snapshot of any encrypted Amazon EBS volume. Supporting this capability is now…
Rubrik -  - Exploring Passive Survivability: Bracing for a Security Attack

General Tech

Exploring Passive Survivability: Bracing for a Security Attack

Security attacks continue to be on the rise as threats like ransomware grow more mature and complex.  Although preventing ransomware attacks may seem near impossible, there are tools and infrastructure best practices that make recovering from a cyberattack less painful. In a recent article with Infosecurity Magazine, Robert Rhame, Director of EMEA Product Marketing at Rubrik, explores the passive survivability model and how this framework can enable your team to bounce back from a successful attack. Let’s take a quick look at this model and how, according to Rhame, it can prepare your team.  A version of the below excerpted article originally appeared in Infosecurity Magazine. Design Your Infrastructure Like a Ship When it comes to preparing for a threat that you can’t stop, your infrastructure must be designed in such a way that an attack, although damaging to your business, does not cause all of your operations to sink. Like a modern battleship, your infrastructure should be created with an inherent resiliency built into it. This resiliency is different than traditional network segmentation and should be thought of as failure compartmentalization. The prevalence of the cloud, mobile, SaaS, and IoT devices means that organizations must no longer be focused…