Tagged in

data security

Rubrik -  - 3 Steps to Constructing a Security-First IT Strategy

General Tech

3 Steps to Constructing a Security-First IT Strategy

How CIOs and other IT leaders can successfully guide their teams into a security-first IT strategy and earn stakeholder buy-in. Cybersecurity threats are not just becoming increasingly frequent and sophisticated– they remain a top financial concern for businesses, regardless of region or industry.  It is now on the shoulders of IT leaders to navigate the technical security landscape and build agile teams that can dynamically respond to new threats. In addition, because of the financial implications of downtime and breaches, these leaders must also be able to abstract the business value of security in order to influence company-wide priorities.   I sat down with Ron Sinopoli, CIO of McHugh Construction, to discuss how CIOs and other IT leaders can effectively drive and advocate for a security-first posture within their organizations. Sinopoli has been the CIO of McHugh for the past year, and he has already led the company through an entire upheaval of its IT strategy in order to uplevel security measures as a strategic priority for the business.   Here’s an inside look at the three major stages Sinopoli led his organization through when shifting to a security-first posture. Stage 1. The Security Event Post-Mortem: Conducting an Honest Analysis  “After all,…
Rubrik -  - Kick Ransomware in the Teeth with Polaris Radar

Architecture

Kick Ransomware in the Teeth with Polaris Radar

There’s a strong chance that you, a colleague, or a peer at another company has been hit by a ransomware attack. This means that someone penetrated your perimeter defense, likely through human phishing methods or insecure external access (such as RDP), and has landed malicious code within a permissive zone of your production environment. The outcome of these attacks comes in the form of encrypted content (files, folders, operating systems, etc.) that require cryptocurrency payment(s) to make it accessible once more. This pain can hit especially hard when: Identifying where the malicious code exists to remove or neuter it. Scoping out the damage and either paying the “ransom” or restoring data from backup. Determining how to prevent the intrusion from repeating, if possible. Fortunately, we at Rubrik understand this pain all too well. One of our earliest customers, Langs Building Supplies, had their production environment hit by a ransomware snag back in 2016. Their team acted quickly and used the immutable nature of Rubrik’s backups to recover the encrypted data without paying the ransom. Huzzah! Since then, we’ve taken the state of the art to a new frontier with the release of Radar, an application that lives on our Polaris…
Rubrik -  - Pillsbury Winthrop Shaw Pittman Achieves API-Driven Automation and Security with Rubrik

Customers

Pillsbury Winthrop Shaw Pittman Achieves API-Driven Automation and Security with Rubrik

With roots dating back to the late 1800s, Pillsbury Winthrop Shaw Pittman LLP is one of today’s leading global law firm with offices around the world. Recognized by the Financial Times as one of North America’s most innovative law firms and by legal research firm BTI Consulting as one of the top 20 firms for client service, Pillsbury is highly regarded for their forward-thinking approach. We recently spoke to David Comer, Senior Network Engineer, about his team’s experience with Rubrik. Tell us about Pillsbury’s IT strategy. Our IT strategy is to be on the leading edge of technology. Both our global staff and clients expect our systems to be up and running 24/7, so we invest heavily in technologies that ensure high application availability. We are always looking for ways to consolidate, be more economical, and help our attorneys be as efficient as possible through innovative technology. What issues were you experiencing with your legacy backup solution? Our company relies heavily on Exchange, SQL, and Sharepoint to get our work done. With our previous solution, the recovery process for mounting Exchange Databases to recover mailbox items was extremely manual. It would take us an hour to restore a single VM,…
Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

General Tech

Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

With the rise of ransomware attacks and other security threats, data encryption is mission-critical for any company’s security strategy. The risk of improperly encrypting data is especially amplified in the cloud era, when sensitive data is stored outside of customer data centers and in public cloud providers like Amazon Web Services, Microsoft Azure, and Google Cloud Platform. While these providers offer a number of tools to help customer encrypt data before it is stored, these tools can be complex and difficult to use. Addressing the top enterprise pain points is what Rubrik was founded on, and security has been core to its platform since day one. This includes end-to-end encryption, both in transit and at rest, which we extend to our integration with public cloud providers. The Rubrik approach simplifies how data encryption is implemented and masks complexity from users. Rubrik has a wide breadth of cloud capabilities, from simple archival to DR and test/dev. Many customers leverage our CloudOut capability for archival of their backup data in public cloud providers, often as a replacement for tape. This approach is typically more cost effective and more reliable, and offers better response times in the event that data restoration is required.…
Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Azure Blob Storage

Product

Encrypting Your Data in the Cloud: Rubrik CloudOut with Azure Blob Storage

In a previous post, I discussed the role of data encryption as a critical component of any company’s security posture and the potential pitfalls of not using encryption properly. This is magnified when you are talking about storing data outside of customer data centers in public cloud storage repositories such as Amazon S3, Azure Blob Storage, and Google Cloud Storage. Since the beginning, security has been a key pillar of Rubrik’s Cloud Data Management platform. Our engineers have built security into every aspect of the platform, from end-to-end encryption to immutable backups. Naturally, this obsession with security extends to our integration with the cloud. As customers adopt the cloud, many are leveraging our CloudOut capability for long-time archive in the public cloud, often as a replacement for tape. This approach is typically more cost effective, more reliable, and offers better response times in the event that data restoration is required. I recently spelled out how Rubrik secures data that is sent to the cloud by encrypting data both in transit and at rest using a variety of methodologies with AWS. This post gives a more in-depth look at Rubrik’s main principles for encrypting data in the cloud, including using the…
Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

Architecture

Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

In a previous post, I discussed the role of data encryption as a critical component of any company’s security posture and the potential pitfalls of not using encryption properly. This is magnified when you are talking about storing data outside of customer data centers in public cloud storage repositories such as Amazon S3, Azure Blob Storage, and Google Cloud Storage. Security is one of the key pillars of Rubrik’s Cloud Data Management platform, and we design security into every aspect of the platform. This includes end-to-end encryption, both in transit and at rest, which extends to our integration with public cloud providers. The majority of Rubrik customers take advantage of our CloudOut capability to store their backup data in one of the big three public cloud providers, often as a replacement for tape. This approach is typically more cost effective, more reliable, and offers better response times in the event that data restoration is required. To secure data uploaded via CloudOut, Rubrik enables encryption in transit using TLS and encryption at rest using various methodologies. No matter the cloud provider, Rubrik applies the same three key principles to how we encrypt customer data: Use the strongest encryption cipher available and…
Rubrik -  - Built for Government: Rubrik Achieves DODIN APL Certification

Company

Built for Government: Rubrik Achieves DODIN APL Certification

Today, I’m thrilled to announce that Rubrik has become the first Cloud Data Management platform to be certified by the U.S. Department of Defense Information Network Approved Products List (DODIN APL). This certification, which placed us under the CyberSecurity Tools category, reflects Rubrik’s commitment to building a secure, next-generation platform for government agencies. As the only backup and recovery solution on the Approved Products List, we are excited by the opportunity to further support defense agencies in modernizing their infrastructure and on-ramping to the cloud. The DODIN APL provides a consolidated list of products that are approved for purchase after rigorous evaluation. DOD components are required to fulfill their system needs only through APL listed products, meaning that the APL must be consulted prior to purchasing a system or product. By meeting the strict security standards, Rubrik’s solutions can immediately be used within existing government networks and streamlines the purchase process for customers. In alignment with this certification, Rubrik’s technology also supports compliance with the Data Center Optimization Initiative (DCOI) and Modernizing Government Technology Act (MGT) mandates. These require agencies to improve their infrastructure to be more efficient, secure, resilient, and cost-effective, particularly through increased cloud adoption. The mandates provide…
Rubrik -  - FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Customers

FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Pascal Moulin, CTO of FranceTV Publicité, discusses the challenges of a legacy approach, why they chose Rubrik, and moving towards a hybrid cloud strategy with Rubrik. Tell me about FranceTV Publicité and your overall IT strategy. FranceTV Publicité is France Télévisions’s advertising network, accounting for 27.6% of PdA TV in France. France Télévisions is one of the world’s largest media brands with an average of 32.5 million viewers a day and a digital audience of 26.5 million of monthly unique visitors. We manage the advertising space of nearly 30 television channels. As the CTO, I am responsible for the IT and broadcasting infrastructure. Our IT infrastructure is critical to France Télévisions’s advertising and broadcasting operations. To ensure our systems run smoothly, we need a data management solution that is fast and reliable. Rubrik delivers that speed and modernizes our IT infrastructure. What challenges were you experiencing with your legacy solution? We had a traditional legacy backup solution consisting of multiple components such as software, hardware, and tape. It was very complex to manage, and restores were difficult and time consuming. It was also not secure since our data was not encrypted. Overall, one of our key objectives was to refresh…
Rubrik -  - The Accelerating World of Ransomware

General Tech

The Accelerating World of Ransomware

Have you been hearing more about ransomware recently? It seems like every day there’s another news headline, vendor presentation, or story about data held ransom. So, what’s driving this “buzz”? Is it just a media-created frenzy, or are there actual changes in the ransomware landscape? Ransomware: A Maturing Landscape Per ZDNet, the cost of ransomware attacks rose from $25M in 2015 to $1B in 2016–an incredible rate of growth. The landscape is evolving into a structure similar to the IT market; there are ransomware vendors, “channel partners” or providers, and (of course) customers. Ransomware vendors now sell “kits” to aspiring hackers that offer various degrees of customization, encryption types, and technical skill required to use. This is a thriving industry, as exemplified by the barrage of stories on organizations such as public transportation services, school districts, and hospital after hospital. Customer Service from Ransomware Once your files are encrypted by ransomware, you are their customer–albeit a very unwilling one. In a darkly ironic twist, ransomware providers are ramping up their customer service efforts to give technical support on using Bitcoin and other related tasks. In some cases, the hacker even pays a percentage of ransoms back to the vendor. This new sector reveals a maturing marketplace with continuing investment that will…
  • 1
  • 2