Tagged in

data protection

Rubrik -  - Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Product

Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Cloud security is one of the topics du jour in the enterprise IT space. In fact, it’s a big enough topic that Amazon Web Services (AWS) hosted their own security conference, AWS re:Inforce, back in June. It highlights the challenge with securing your data in the cloud,  especially if you are using tools and approaches that were not designed for security from the start. Not adhering to good security practices exposes cloud customers to the potential risk of being hacked and having data stolen. To assist customers and partners with building secure solutions, AWS has codified recommended practices and principles into the security pillar of their AWS Well-Architected Framework. The Well-Architected Framework is a tool for evaluating the soundness of any solution running on AWS and leveraging their services. The framework is comprised of five conceptual areas called pillars, including the security pillar.  So where does Rubrik Polaris fit into this picture? We previously announced the general availability of AWS native protection support in Rubrik Polaris, our Software-as-a-Service (SaaS) platform for cloud data management. Now, we want to explore how Polaris is able to build a secure solution for protecting Amazon EC2 instances and Amazon EBS volumes using the recommended…
Rubrik -  - Automating VM Protection in Rubrik with vSphere Tags

Product

Automating VM Protection in Rubrik with vSphere Tags

An oft ignored but useful organization tool, tags are labels that can be applied in your VMware inventory to organize and sort objects. Tags allow you to attach metadata to objects, making it easier to sort and search through your inventory. But wait…there’s more. Tags can also be used in conjunction with other programs like vRealize Automation to help manage an objects lifecycle.  Seen in the picture below is an assigned tag on a VM. To get the most out of vSphere tags, it’s important to also understand the concept of categories.  Categories can be used to group your tags together. Think of it like a large filing cabinet: each drawer is a category, and inside of a drawer, there are folders with objects. These folders have a tag or label on the top. As an example, you may create the category of Operating Systems  that contains tags like Windows 10  or Windows 7  and so on. Here is a very simple diagram of the hierarchy: This is one of the ways tags and categories can be used to help organize your environment. Here’s how you add a category for tags in vSphere: So what could we use categories and…
Rubrik -  - Rubrik SLA Domain: Settings, Ops, Considerations

Product

Rubrik SLA Domain: Settings, Ops, Considerations

This multi-part blog series will take a deep dive into Rubrik’s SLA Domains to assist in understanding them better as well as configuring them optimally for your environment. SLA Domains Explained In the data protection world, Service Level Agreements (SLAs) define protection levels for workloads, availability targets, and objects that are crucial to a company. Collecting this information, implementing it, and staying compliant with the SLA is usually a tedious and difficult process. Rubrik uses SLA Domains to make those SLAs easier to achieve.  SLA Domains are comprised of these three components: Snapshot protection and retention  Replication  Archival When combined, these components protect and help manage the lifecycle of your most critical data. SLA Domains can be set to align with your company’s own SLAs, making compliance incredibly simple. Additionally, Rubrik’s SLA Domain construct is declarative in nature, allowing for a set it and forget it style of implementation. While it may seem like a small thing to use declarative policies, there is a major difference between old-style imperative backup jobs and Rubrik’s declarative SLA Domains. To understand the difference, imagine a situation in which you want to give your friend a LEGO set for them to build. The imperative…
Rubrik -  - Managing Encrypted AWS Snapshots with Rubrik Polaris

Product

Managing Encrypted AWS Snapshots with Rubrik Polaris

Werner Vogels, CTO of AWS, has taken to wearing a T-shirt during his recent keynote speeches with the admonition, Encrypt Everything. This statement highlights the growing concerns over unauthorized access of data and regulations like the General Data Protection Regulation. Encrypting everything  is no longer just a nice-have, it’s a must-have for any business with workloads running in a public cloud. The challenge for most customers is knowing what encryption method to choose and how to properly manage their encryption keys. Making the wrong choices can leave a customer’s data as unprotected as it would be with no encryption at all. AWS, as well as other cloud providers, offers a number of options for simplifying the encryption of data in transit and at rest. This includes the capability to encrypt data stored in a customer’s Amazon Elastic Block Storage (EBS) volumes. This feature can be enabled with a check of a box, and the encryption is automatically handled using the AWS Key Management Service (KMS). To ensure end-to-end encryption, including when a snapshot of an Amazon EBS volume is taken and backed up, AWS will automatically encrypt the snapshot of any encrypted Amazon EBS volume. Supporting this capability is now…
Rubrik -  - Exploring Passive Survivability: Bracing for a Security Attack

General Tech

Exploring Passive Survivability: Bracing for a Security Attack

Security attacks continue to be on the rise as threats like ransomware grow more mature and complex.  Although preventing ransomware attacks may seem near impossible, there are tools and infrastructure best practices that make recovering from a cyberattack less painful. In a recent article with Infosecurity Magazine, Robert Rhame, Director of EMEA Product Marketing at Rubrik, explores the passive survivability model and how this framework can enable your team to bounce back from a successful attack. Let’s take a quick look at this model and how, according to Rhame, it can prepare your team.  A version of the below excerpted article originally appeared in Infosecurity Magazine. Design Your Infrastructure Like a Ship When it comes to preparing for a threat that you can’t stop, your infrastructure must be designed in such a way that an attack, although damaging to your business, does not cause all of your operations to sink. Like a modern battleship, your infrastructure should be created with an inherent resiliency built into it. This resiliency is different than traditional network segmentation and should be thought of as failure compartmentalization. The prevalence of the cloud, mobile, SaaS, and IoT devices means that organizations must no longer be focused…
Rubrik -  - The Digitization of Media: Protecting and Delivering Content with the Cloud

Customers

The Digitization of Media: Protecting and Delivering Content with the Cloud

Cloud computing was once a buzzword. Now it’s a reality. This massive adoption of cloud is happening across nearly every industry and vertical as companies look to lower costs and increase agility. In this blog, we explore how two of our media and entertainment customers, Sesame Workshop and America’s Test Kitchen, are embracing the cloud to unlock added business value. Sesame Workshop Supports Key Digitization Efforts and Moves to the Cloud with Rubrik Sesame Workshop is a non-profit providing educational entertainment to children through a variety of media platforms and is best known for overseeing Sesame Street, the longest-running children’s show of all-time. Delivering educational programming to children in over 150 countries, Sesame Workshop’s IT team manages over 45 years-worth of intellectual property. Having previously relied on outdated, complex, legacy technologies, the organization selected Rubrik to help their team protect, archive, and manage business-critical data and content and to accelerate their use of Microsoft Azure. Sesame Workshop CTO Shadrach Kisten insists that the cloud is necessary for content archival, long-term retention, and accessibility among team members – something Rubrik facilitates. According to Kisten, “With Rubrik, we will be able to archive to Azure for 90 days and then push the…
Rubrik -  - IT and Sports: A Tale of Three Teams

Customers

IT and Sports: A Tale of Three Teams

Professional sports are big business. With teams looking for an edge both on and off the field, many clubs are embracing advancements in technology and big data to provide the best possible game-day experiences for players and fans. Not only is data being used to create championship-winning strategies, it’s also leveraged to better understand fan relations and ROIs and to gain insight into athletic performance during training sessions. This shift has led to the front offices of many franchises to embrace best-of-breed IT technologies that not only protect sensitive information, but help them unlock new business value from it. Tampa Bay Rays Hit It Out-of-the-Park with Instant Data Recovery From recruiting top athletes to game management, American baseball pioneered the use of data for on-field success. Many teams, like the Tampa Bay Rays, have scaled their IT infrastructure accordingly to store and manage critical statistics, including past season metrics, individual player performances, and other crucial data points. The Rays leverage this data to create reports that influence game plans and day-to-day business operations. As critical as data is for The Rays, managing it wasn’t always easy. The IT team was bogged down by fragmented, cumbersome backups and slow restores. To…
Rubrik -  - Simplifying AWS Native Protection with Rubrik Polaris

Product

Simplifying AWS Native Protection with Rubrik Polaris

Why Polaris for AWS? Last year, Rubrik introduced the world to Polaris, our innovative SaaS offering for a new breed of data management apps. Our first Polaris app was Polaris GPS, which provides customers with centralized management and monitoring of their globally-distributed Rubrik infrastructure. We quickly followed that up with our second application, Polaris Radar, which leverages machine learning to help customers detect and recover from ransomware. However, with organizations driving cloud adoption more and more, we always knew protecting workloads running in the cloud would be a key focus of Polaris. We spearheaded these efforts with Office 365 protection in our Andes release. This was just the beginning, and I’m happy to announce that Rubrik has now released native protection for Amazon Web Service (AWS) workloads using Polaris. Building on the capabilities of our flagship Cloud Data Management (CDM) product, Polaris integrates with the native snapshot capabilities and APIs provided by AWS for protecting Amazon EC2 instances and Amazon EBS volumes. This tight integration provides Rubrik customers with a central point of management to address various data protection use cases. Why should customers use Polaris to protect Amazon EC2 and Amazon EBS? As a SaaS solution, Polaris provides many…
Rubrik -  - Understanding RPO and RTO

General Tech

Understanding RPO and RTO

As enterprises utilize more and more business-critical digital services, information technology infrastructure and applications have become key strategic imperatives. Downtime and data loss translate to a huge business and financial impact that  must be minimized with an effective data protection strategy. When planning for a data protection strategy or a disaster recovery plan (DRP), there are several criteria to consider in order to align with the business impact of various applications and workloads. A Business Impact Analysis (BIA) can help assess and weigh the impact and consequences, both financial and non-financial, of an interruption in business operations. These findings can help organizations determine their availability Service Level Agreements (SLA), or the level of service expected by the customer from the entity that provides the service. Most often, multiple SLAs are defined to match the various levels of criticality that were determined during the BIA. For example, the following SLAs are commonly utilized: 99%, or two 9s, corresponds to 3 days 15 hours and 36 minutes of downtime per year. 99.9%, or three 9s, corresponds to 8 hours 45 minutes and 36 seconds of downtime per year. 99.99%, or four 9s, corresponds to 52 minutes and 34 seconds of downtime per…