Tagged in

data security

Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

Architecture

Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

In a previous post, I discussed the role of data encryption as a critical component of any company’s security posture and the potential pitfalls of not using encryption properly. This is magnified when you are talking about storing data outside of customer data centers in public cloud storage repositories such as Amazon S3, Azure Blob Storage, and Google Cloud Storage. Security is one of the key pillars of Rubrik’s Cloud Data Management platform, and we design security into every aspect of the platform. This includes end-to-end encryption, both in transit and at rest, which extends to our integration with public cloud providers. The majority of Rubrik customers take advantage of our CloudOut capability to store their backup data in one of the big three public cloud providers, often as a replacement for tape. This approach is typically more cost effective, more reliable, and offers better response times in the event that data restoration is required. To secure data uploaded via CloudOut, Rubrik enables encryption in transit using TLS and encryption at rest using various methodologies. No matter the cloud provider, Rubrik applies the same three key principles to how we encrypt customer data: Use the strongest encryption cipher available and…
Rubrik -  - Built for Government: Rubrik Achieves DODIN APL Certification

Company

Built for Government: Rubrik Achieves DODIN APL Certification

Today, I’m thrilled to announce that Rubrik has become the first Cloud Data Management platform to be certified by the U.S. Department of Defense Information Network Approved Products List (DODIN APL). This certification, which placed us under the CyberSecurity Tools category, reflects Rubrik’s commitment to building a secure, next-generation platform for government agencies. As the only backup and recovery solution on the Approved Products List, we are excited by the opportunity to further support defense agencies in modernizing their infrastructure and on-ramping to the cloud. The DODIN APL provides a consolidated list of products that are approved for purchase after rigorous evaluation. DOD components are required to fulfill their system needs only through APL listed products, meaning that the APL must be consulted prior to purchasing a system or product. By meeting the strict security standards, Rubrik’s solutions can immediately be used within existing government networks and streamlines the purchase process for customers. In alignment with this certification, Rubrik’s technology also supports compliance with the Data Center Optimization Initiative (DCOI) and Modernizing Government Technology Act (MGT) mandates. These require agencies to improve their infrastructure to be more efficient, secure, resilient, and cost-effective, particularly through increased cloud adoption. The mandates provide…
Rubrik -  - FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Customers

FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Pascal Moulin, CTO of FranceTV Publicité, discusses the challenges of a legacy approach, why they chose Rubrik, and moving towards a hybrid cloud strategy with Rubrik. Tell me about FranceTV Publicité and your overall IT strategy. FranceTV Publicité is France Télévisions’s advertising network, accounting for 27.6% of PdA TV in France. France Télévisions is one of the world’s largest media brands with an average of 32.5 million viewers a day and a digital audience of 26.5 million of monthly unique visitors. We manage the advertising space of nearly 30 television channels. As the CTO, I am responsible for the IT and broadcasting infrastructure. Our IT infrastructure is critical to France Télévisions’s advertising and broadcasting operations. To ensure our systems run smoothly, we need a data management solution that is fast and reliable. Rubrik delivers that speed and modernizes our IT infrastructure. What challenges were you experiencing with your legacy solution? We had a traditional legacy backup solution consisting of multiple components such as software, hardware, and tape. It was very complex to manage, and restores were difficult and time consuming. It was also not secure since our data was not encrypted. Overall, one of our key objectives was to refresh…
Rubrik -  - The Accelerating World of Ransomware

General Tech

The Accelerating World of Ransomware

Have you been hearing more about ransomware recently? It seems like every day there’s another news headline, vendor presentation, or story about data held ransom. So, what’s driving this “buzz”? Is it just a media-created frenzy, or are there actual changes in the ransomware landscape? Ransomware: A Maturing Landscape Per ZDNet, the cost of ransomware attacks rose from $25M in 2015 to $1B in 2016–an incredible rate of growth. The landscape is evolving into a structure similar to the IT market; there are ransomware vendors, “channel partners” or providers, and (of course) customers. Ransomware vendors now sell “kits” to aspiring hackers that offer various degrees of customization, encryption types, and technical skill required to use. This is a thriving industry, as exemplified by the barrage of stories on organizations such as public transportation services, school districts, and hospital after hospital. Customer Service from Ransomware Once your files are encrypted by ransomware, you are their customer–albeit a very unwilling one. In a darkly ironic twist, ransomware providers are ramping up their customer service efforts to give technical support on using Bitcoin and other related tasks. In some cases, the hacker even pays a percentage of ransoms back to the vendor. This new sector reveals a maturing marketplace with continuing investment that will…
Rubrik -  - Isolated Recovery & Ransomware: Cost vs. Value

General Tech

Isolated Recovery & Ransomware: Cost vs. Value

Has a vendor been talking to you about Isolated Recovery recently? Or have you been thinking about duplicating and air gapping your backup systems with scheduled updates to protect against ransomware? Could there be a less expensive, less complex way to achieve similar benefits? Let’s dive into these ideas to explore the concept and limitations of Isolated Recovery–and where Rubrik can help. What is Isolated Recovery? From a network perspective, the concept of air gapping isn’t new. Simply put, there’s physical isolation between two networks – most commonly a secured and an unsecured network. While Isolated Recovery shares this “physical isolation” characteristic, it is built on the concept of having a separate data center infrastructure that is disconnected from the primary infrastructure via an air gap. In the case of Isolated Recovery, the air gap is closed on a regular schedule for replication updates. Think of this as being similar to the operational overhead of a DR infrastructure. In theory, if your files are encrypted by ransomware, there is complete surety that your air-gapped data isn’t affected and is available for restore. Is there a real benefit? You might already be thinking about update schedules. What if the ransomware isn’t detected…
Rubrik -  - Security 101: What Security Really Means For Data Management

Business

Security 101: What Security Really Means For Data Management

Data security is not a new priority for enterprises. In earlier blog posts, we discussed the rising threat of ransomware and how a next-gen data management solution prevented a ransomware attack. Given the exponential growth of data and increasing trend in data breaches, it is imperatives that businesses apply the highest security standards to all their data. However, the concept of security is often confounded in the context of data management. To clarify the important terms, components, and their implications for data security within enterprise backup and recovery, I sat down with Adam Goldberg, who leads product development for Rubrik’s security solutions. Adam comes from a security background with previous experience at the Department of Defense.Federal Information Processing Standard (FIPS) Federal Information Processing Standard (FIPS) FIPS 140-2 is the National Institute of Standards and Technology (NIST) security standard used to accredit cryptographic modules. It is often a requirement for a product to be installed in a location where sensitive data is stored. The FIPS 140-2 standard extends far beyond the federal government. For example, financial and healthcare institutions collect, store, and transfer highly sensitive information that needs to be secured. While FIPS 140-2 features four levels of security, only Level…
Rubrik -  - Langs Building Supplies Stops Ransomware Attack in its Tracks

Customers

Langs Building Supplies Stops Ransomware Attack in its Tracks

A ransomware attack prevented by a reliable, next-gen backup solution Langs Building Supplies, a leading supplier of timber products in South Queensland, Australia, was recently hit by a ransomware attack. Due to its effective backup infrastructure, the company was able to thwart the threat and restore its data without paying a ransom. Ransomware is a special type of malware that encrypts victims’ data and prevents them from accessing it until a ransom is paid. In a previous post, our security lead David Ramos explained the rising threat of ransomware and strategies for prevention. As Ramos stated, “With an effective backup solution, ransomware can ideally be reduced to a minor inconvenience.” This was certainly true for Langs Building Supplies. We sat down with Matthew Day, ICT and Support Manager at Langs Building Supplies, to discuss his experience defending against a ransomware attack. Q: How were you able to identify a ransomware attack had occurred? A: We have monitoring tools in place to send alerts when there are high change rates in the data structure. An alert was triggered, and we were able to shut down the affected VDI desktop within minutes. Because we could stop the attack mid-stream, we were able…
Rubrik -  - Why Your Hospital May be Held Hostage Without Healthy Data Protection

Business

Why Your Hospital May be Held Hostage Without Healthy Data Protection

There’s a crisis in healthcare. The crisis we are referring to is not the economic system, but rather cyber threats targeted at hospitals’ data. In February, a cyberattack in Los Angeles left the Hollywood Presbyterian Medical Center paralyzed without access to electronic records while its hackers held its computer systems captive for a reputedly multi-million dollar ransom. The result – a 40 bitcoin (approximately $17,000) payment and a loss of operations for over a week. This cyberthreat, known as ransomware, is growing and is predicted to increase in 2016. In one week alone, three hospitals were hit by ransomware attacks. How do hospitals protect themselves from ransomware threats? To answer this question, we sat down with David Ramos, who leads the development of Rubrik’s security measures. Ramos has a Ph.D. from Stanford in Computer Science and discovered dozens of security bugs in open source software, including three in OpenSSL for which security advisories were issued. Ramos explains why hospitals are especially vulnerable to these types of attacks, and why data protection and security need to be integrated at the highest standard in a reliable backup solution. Q. What is Ransomware? How is Ransomware different from other cyber threats? A. Ransomware…
Rubrik -  - Meet the r599 BC: Bringing Backup Back

Culture

Meet the r599 BC: Bringing Backup Back

Rubrik is proud to announce our latest product, the all new r599 BC. r599 BC does one job and does it best: archival to papyrus. “Backup is dead,” they said. “Even the dead need backup!” we believe. During our beta testing, the most crucial piece of feedback we received was from Mr. Tutankhamun, C.I.O., Pharaohmatix Inc. “We deal with sensitive data, and we need encryption, not just backup,” he said. Enter r599 BC: papyrus archival with encryption using hieroglyphs. r599 BC is the world’s first converged data management platform with state-of-art ancient encryption built right into it. What’s more, there’s no master key we can forge to break the encryption. That means you own your data. Now. Always. The customer testimonials are flying in, and they all agree: r599 BC is light-years ahead of its time. “You guys made backup sexy again.” “Rock solid backup!” “Now I can backup all of Cleopatra’s selfies without worrying!” It’s product of the century. With r599 BC, data security will never be the same again. The government can not have and will never have access to your data.

    Close search icon

    Contact Sales