Tagged in

data security

Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

General Tech

Encrypting Your Data in the Cloud: Rubrik CloudOut with Google Cloud Storage

With the rise of ransomware attacks and other security threats, data encryption is mission-critical for any company’s security strategy. The risk of improperly encrypting data is especially amplified in the cloud era, when sensitive data is stored outside of customer data centers and in public cloud providers like Amazon Web Services, Microsoft Azure, and Google Cloud Platform. While these providers offer a number of tools to help customer encrypt data before it is stored, these tools can be complex and difficult to use. Addressing the top enterprise pain points is what Rubrik was founded on, and security has been core to its platform since day one. This includes end-to-end encryption, both in transit and at rest, which we extend to our integration with public cloud providers. The Rubrik approach simplifies how data encryption is implemented and masks complexity from users. Rubrik has a wide breadth of cloud capabilities, from simple archival to DR and test/dev. Many customers leverage our CloudOut capability for archival of their backup data in public cloud providers, often as a replacement for tape. This approach is typically more cost effective and more reliable, and offers better response times in the event that data restoration is required.…
Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Azure Blob Storage

Product

Encrypting Your Data in the Cloud: Rubrik CloudOut with Azure Blob Storage

In a previous post, I discussed the role of data encryption as a critical component of any company’s security posture and the potential pitfalls of not using encryption properly. This is magnified when you are talking about storing data outside of customer data centers in public cloud storage repositories such as Amazon S3, Azure Blob Storage, and Google Cloud Storage. Since the beginning, security has been a key pillar of Rubrik’s Cloud Data Management platform. Our engineers have built security into every aspect of the platform, from end-to-end encryption to immutable backups. Naturally, this obsession with security extends to our integration with the cloud. As customers adopt the cloud, many are leveraging our CloudOut capability for long-time archive in the public cloud, often as a replacement for tape. This approach is typically more cost effective, more reliable, and offers better response times in the event that data restoration is required. I recently spelled out how Rubrik secures data that is sent to the cloud by encrypting data both in transit and at rest using a variety of methodologies with AWS. This post gives a more in-depth look at Rubrik’s main principles for encrypting data in the cloud, including using the…
Rubrik -  - Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

Architecture

Encrypting Your Data in the Cloud: Rubrik CloudOut with Amazon S3

In a previous post, I discussed the role of data encryption as a critical component of any company’s security posture and the potential pitfalls of not using encryption properly. This is magnified when you are talking about storing data outside of customer data centers in public cloud storage repositories such as Amazon S3, Azure Blob Storage, and Google Cloud Storage. Security is one of the key pillars of Rubrik’s Cloud Data Management platform, and we design security into every aspect of the platform. This includes end-to-end encryption, both in transit and at rest, which extends to our integration with public cloud providers. The majority of Rubrik customers take advantage of our CloudOut capability to store their backup data in one of the big three public cloud providers, often as a replacement for tape. This approach is typically more cost effective, more reliable, and offers better response times in the event that data restoration is required. To secure data uploaded via CloudOut, Rubrik enables encryption in transit using TLS and encryption at rest using various methodologies. No matter the cloud provider, Rubrik applies the same three key principles to how we encrypt customer data: Use the strongest encryption cipher available and…
Rubrik -  - Built for Government: Rubrik Achieves DODIN APL Certification

Company

Built for Government: Rubrik Achieves DODIN APL Certification

Today, I’m thrilled to announce that Rubrik has become the first Cloud Data Management platform to be certified by the U.S. Department of Defense Information Network Approved Products List (DODIN APL). This certification, which placed us under the CyberSecurity Tools category, reflects Rubrik’s commitment to building a secure, next-generation platform for government agencies. As the only backup and recovery solution on the Approved Products List, we are excited by the opportunity to further support defense agencies in modernizing their infrastructure and on-ramping to the cloud. The DODIN APL provides a consolidated list of products that are approved for purchase after rigorous evaluation. DOD components are required to fulfill their system needs only through APL listed products, meaning that the APL must be consulted prior to purchasing a system or product. By meeting the strict security standards, Rubrik’s solutions can immediately be used within existing government networks and streamlines the purchase process for customers. In alignment with this certification, Rubrik’s technology also supports compliance with the Data Center Optimization Initiative (DCOI) and Modernizing Government Technology Act (MGT) mandates. These require agencies to improve their infrastructure to be more efficient, secure, resilient, and cost-effective, particularly through increased cloud adoption. The mandates provide…
Rubrik -  - FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Customers

FranceTV Publicité Accelerates Hybrid Cloud with Data Management Built for Security

Pascal Moulin, CTO of FranceTV Publicité, discusses the challenges of a legacy approach, why they chose Rubrik, and moving towards a hybrid cloud strategy with Rubrik. Tell me about FranceTV Publicité and your overall IT strategy. FranceTV Publicité is France Télévisions’s advertising network, accounting for 27.6% of PdA TV in France. France Télévisions is one of the world’s largest media brands with an average of 32.5 million viewers a day and a digital audience of 26.5 million of monthly unique visitors. We manage the advertising space of nearly 30 television channels. As the CTO, I am responsible for the IT and broadcasting infrastructure. Our IT infrastructure is critical to France Télévisions’s advertising and broadcasting operations. To ensure our systems run smoothly, we need a data management solution that is fast and reliable. Rubrik delivers that speed and modernizes our IT infrastructure. What challenges were you experiencing with your legacy solution? We had a traditional legacy backup solution consisting of multiple components such as software, hardware, and tape. It was very complex to manage, and restores were difficult and time consuming. It was also not secure since our data was not encrypted. Overall, one of our key objectives was to refresh…
Rubrik -  - The Accelerating World of Ransomware

General Tech

The Accelerating World of Ransomware

Have you been hearing more about ransomware recently? It seems like every day there’s another news headline, vendor presentation, or story about data held ransom. So, what’s driving this “buzz”? Is it just a media-created frenzy, or are there actual changes in the ransomware landscape? Ransomware: A Maturing Landscape Per ZDNet, the cost of ransomware attacks rose from $25M in 2015 to $1B in 2016–an incredible rate of growth. The landscape is evolving into a structure similar to the IT market; there are ransomware vendors, “channel partners” or providers, and (of course) customers. Ransomware vendors now sell “kits” to aspiring hackers that offer various degrees of customization, encryption types, and technical skill required to use. This is a thriving industry, as exemplified by the barrage of stories on organizations such as public transportation services, school districts, and hospital after hospital. Customer Service from Ransomware Once your files are encrypted by ransomware, you are their customer–albeit a very unwilling one. In a darkly ironic twist, ransomware providers are ramping up their customer service efforts to give technical support on using Bitcoin and other related tasks. In some cases, the hacker even pays a percentage of ransoms back to the vendor. This new sector reveals a maturing marketplace with continuing investment that will…
Rubrik -  - Isolated Recovery & Ransomware: Cost vs. Value

General Tech

Isolated Recovery & Ransomware: Cost vs. Value

Has a vendor been talking to you about Isolated Recovery recently? Or have you been thinking about duplicating and air gapping your backup systems with scheduled updates to protect against ransomware? Could there be a less expensive, less complex way to achieve similar benefits? Let’s dive into these ideas to explore the concept and limitations of Isolated Recovery–and where Rubrik can help. What is Isolated Recovery? From a network perspective, the concept of air gapping isn’t new. Simply put, there’s physical isolation between two networks – most commonly a secured and an unsecured network. While Isolated Recovery shares this “physical isolation” characteristic, it is built on the concept of having a separate data center infrastructure that is disconnected from the primary infrastructure via an air gap. In the case of Isolated Recovery, the air gap is closed on a regular schedule for replication updates. Think of this as being similar to the operational overhead of a DR infrastructure. In theory, if your files are encrypted by ransomware, there is complete surety that your air-gapped data isn’t affected and is available for restore. Is there a real benefit? You might already be thinking about update schedules. What if the ransomware isn’t detected…
Rubrik -  - Security 101: What Security Really Means For Data Management

Business

Security 101: What Security Really Means For Data Management

Data security is not a new priority for enterprises. In earlier blog posts, we discussed the rising threat of ransomware and how a next-gen data management solution prevented a ransomware attack. Given the exponential growth of data and increasing trend in data breaches, it is imperatives that businesses apply the highest security standards to all their data. However, the concept of security is often confounded in the context of data management. To clarify the important terms, components, and their implications for data security within enterprise backup and recovery, I sat down with Adam Goldberg, who leads product development for Rubrik’s security solutions. Adam comes from a security background with previous experience at the Department of Defense.Federal Information Processing Standard (FIPS) Federal Information Processing Standard (FIPS) FIPS 140-2 is the National Institute of Standards and Technology (NIST) security standard used to accredit cryptographic modules. It is often a requirement for a product to be installed in a location where sensitive data is stored. The FIPS 140-2 standard extends far beyond the federal government. For example, financial and healthcare institutions collect, store, and transfer highly sensitive information that needs to be secured. While FIPS 140-2 features four levels of security, only Level…
Rubrik -  - Langs Building Supplies Stops Ransomware Attack in its Tracks

Customers

Langs Building Supplies Stops Ransomware Attack in its Tracks

A ransomware attack prevented by a reliable, next-gen backup solution Langs Building Supplies, a leading supplier of timber products in South Queensland, Australia, was recently hit by a ransomware attack. Due to its effective backup infrastructure, the company was able to thwart the threat and restore its data without paying a ransom. Ransomware is a special type of malware that encrypts victims’ data and prevents them from accessing it until a ransom is paid. In a previous post, our security lead David Ramos explained the rising threat of ransomware and strategies for prevention. As Ramos stated, “With an effective backup solution, ransomware can ideally be reduced to a minor inconvenience.” This was certainly true for Langs Building Supplies. We sat down with Matthew Day, ICT and Support Manager at Langs Building Supplies, to discuss his experience defending against a ransomware attack. Q: How were you able to identify a ransomware attack had occurred? A: We have monitoring tools in place to send alerts when there are high change rates in the data structure. An alert was triggered, and we were able to shut down the affected VDI desktop within minutes. Because we could stop the attack mid-stream, we were able…
  • 1
  • 2