Tagged in

security

Rubrik -  - Grove Bank & Trust Is Hurricane-Ready with Rubrik

Customers

Grove Bank & Trust Is Hurricane-Ready with Rubrik

A South Florida staple since 1926, Grove Bank & Trust is the oldest continuously operating bank in Miami Dade County. Named for the Coconut Grove neighborhood of Miami that hosts its headquarters, Grove Bank & Trust delivers checking, savings, lending, financial planning, insurance, and investment services to customers through its five branch offices in Miami, Aventura, and Coral Gables. At Grove Bank & Trust, CIO Sergio Garcia leads a team of three that handles all IT functions and initiatives across the entire bank. What challenges were you experiencing with data protection? Our legacy backup solution was unreliable, difficult to manage, and often resulted in failed backups. These inadequacies placed Grove Bank at risk of being non-compliant with SLAs and industry regulations. We have to hold a lot of our data for multiple years, and we weren’t backing up everything that we needed to in case of a disaster. It’s not just that the old solution was difficult to use, it’s that it made it difficult to provide the regulators with proof that we have backups, can recover, and have completed adequate testing. What were you looking for in your new solution? The bank is growing very rapidly, and we’ve been aggressively…
Rubrik -  - Worried About Viruses? Ransom? Data Loss? The Cure is Here!

General Tech

Worried About Viruses? Ransom? Data Loss? The Cure is Here!

This is not hype! This is reality. Companies across industries get hit with viruses all the time. In the always-on economy, companies rely on 24/7 data availability, so any downtime can severely impact the business. The good news is that with a strong data management solution, you can quickly recover from a disaster without any data loss. Before we dive into how Rubrik delivers that solution, let’s go over what happens during a virus attack. The Lifecycle of a Virus Attack Before Rubrik As the above diagram shows, a typical attack has several phases: you get hit with the virus, your systems are under attack, and your business loses access to the encrypted data. Once it’s detected, your IT team documents and implements steps to prevent the virus from spreading. But since most organizations rely on data to perform daily operations, the data loss you’ve already experienced has a severe impact on the organization. Unfortunately, for many organizations, a virus’ life doesn’t end with patching the vulnerability. Even with a sophisticated antivirus software, viruses can remain in your system undetected. This often leads to further data corruption and a vicious cycle of attack, recover, and patch. For this reason, many…
Rubrik -  - 3 Cloud Data Management Trends to Watch in 2018

General Tech

3 Cloud Data Management Trends to Watch in 2018

Enterprises across verticals are undergoing a digital transformation. They must now operate in the “always on” economy and execute instant service delivery to meet modern consumer demands. This shift requires an infrastructure that supports 24/7 application availability in both data center and cloud, while also ensuring data is protected and compliant. As data management becomes increasingly crucial to meet business goals, companies are exploring new solutions to streamline and automate their processes. Here are the top trends you can expect to see in 2018: 1. AI-Powered Data Management Leveraging machine learning for data protection and analysis provides valuable business opportunities, but enterprises have barely scratched the surface. According to Gartner, AI will be a major digital driver for reinventing both business models and the customer experience through 2025. One application of ML that many companies are expected to explore relates to event-driven IT. This model involves constantly sensing and responding to business events, which could be anything from a completed transaction to threat detection. As companies prepare for intelligent applications and analysis, they will seek solutions that can centralize data management across all their environments. 2. Accelerated Cloud Adoption While cloud computing isn’t new to the enterprise lexicon, it is…
Rubrik -  - How to Avoid Ransomware Jail

General Tech

How to Avoid Ransomware Jail

It’s 1983, and Ronald Reagan is sitting down to watch the hit film War Games. Five days later, the president asked his secretaries of state, “Could a scenario like war games ever happen?” One week later, General Vessey returned with the answer: “Mr. President, it is a lot worse than you think.” Was this the first time that cyber security and privacy had surfaced in computer systems? Categorically, no. Security and Privacy in Computer systems 1967 by Willis Ware was the first paper on the topic — written in 1967. So, since the beginning of networked computing, cyber security, and privacy have been a factor. So, why is it suddenly a huge industry buzzword? My thoughts on this are twofold: Across governments, the use and ideas of cyber warfare were dismissed, ignored, or forgotten. But in 2007, the Aurora test categorically proved that cyber attackers could inflict physical damage using computer tools. This was a pivotal moment, as critical infrastructure was at risk. Cybercrime then shifted to the public sphere with cyber groups lining their sights on non-government attacks, such as online fraud, ransomware, malware, and phishing. The role that security and privacy now play in IT and our personal lives…
Rubrik -  - Top 4 Features to Look for in a GDPR Solution

General Tech

Top 4 Features to Look for in a GDPR Solution

Changes to Europe’s General Data Protection Regulation (GDPR) comes into force on May 25, 2018. For those unfamiliar, the law grants European citizens comprehensive rights over personal data that organizations store and process. GDPR places additional burden on the companies, and those that fail to comply face hefty fines. The deadline is fast approaching, yet many companies have not started preparing. While no single solution can ensure compliance, here are four key components to keep in mind as you evaluate solutions: 1. Unified Management Companies often hold personal data on customers, employees, vendors, contractors, and other entities. This data can be spread across a variety of sources like VMs, databases, files, and Exchange Mailboxes. Unfortunately, this fragmented infrastructure makes managing and protecting workloads a major challenge. In addition to being tedious, a patchwork of point solutions can complicate GDPR compliance. Using a single comprehensive solution enables users to define and enforce a data management policy across their entire infrastructure. With Rubrik, one platform supports all common data management scenarios (backup, disaster recovery, archival, etc.) and protects a wide variety of workloads like VMs, physical servers, databases, NAS Shares, and public cloud. This broad and fast-growing support matrix helps organizations enforce their…
Rubrik -  - Rubrik Cloud Data Management: Security by Design

General Tech

Rubrik Cloud Data Management: Security by Design

Since the beginning, Rubrik’s Cloud Data Management platform has been designed with security as one of its core principles. Our goal is to ensure that data is managed in a secure and responsible manner, independent of its location. This capability is growing more important with the changes to the General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018, for any organisation that processes or stores data from individuals in the EU. For companies that must comply with GDPR, security by design is imperative in data management. The regulation requires companies to use solutions in which data protection is designed into the development rather than added on at a later point. Requirements apply to on-prem and cloud environments, as well as to measurements that prevent employee-caused breaches. Data Management Designed for Protection Rubrik delivers end-to-end encryption across all environments while maintaining performance. It starts at the point of ingesting the data from your production systems. For both virtual and physical environments, we encrypt data in-flight to protect it from eavesdropping. Once the data arrives to the Rubrik cluster, customers can choose the method for encryption at-rest, either using software-based encryption or FIPS 140-2 Level 2 Certified hardware-based encryption. Rubrik also…
Rubrik -  - Security 101: What Security Really Means For Data Management

Business

Security 101: What Security Really Means For Data Management

Data security is not a new priority for enterprises. In earlier blog posts, we discussed the rising threat of ransomware and how a next-gen data management solution prevented a ransomware attack. Given the exponential growth of data and increasing trend in data breaches, it is imperatives that businesses apply the highest security standards to all their data. However, the concept of security is often confounded in the context of data management. To clarify the important terms, components, and their implications for data security within enterprise backup and recovery, I sat down with Adam Goldberg, who leads product development for Rubrik’s security solutions. Adam comes from a security background with previous experience at the Department of Defense.Federal Information Processing Standard (FIPS) Federal Information Processing Standard (FIPS) FIPS 140-2 is the National Institute of Standards and Technology (NIST) security standard used to accredit cryptographic modules. It is often a requirement for a product to be installed in a location where sensitive data is stored. The FIPS 140-2 standard extends far beyond the federal government. For example, financial and healthcare institutions collect, store, and transfer highly sensitive information that needs to be secured. While FIPS 140-2 features four levels of security, only Level…
Rubrik -  - Let’s Talk About Security

Product

Let’s Talk About Security

Today, Rubrik announced the r528, the industry’s first security-enhanced converged data management appliance. So, let’s talk about security. Not just the kind that you set in place to keep your actual devices safe, but also what you do to protect the data on them. All of your data. Including your backups. Remember when one of the largest regional banks in the United States “lost” computer back-up tapes containing personal information including social security numbers and bank account information for over 260,000 of its customers? That was in 2012. With the amount of digital data generated annually projected to grow to 44 ZB (1 zettabyte = 1 trillion gigabytes) by 2020¹, and a growing trend in data breaches, it is even more imperative to apply the highest security standards to all of our data, even backups. Often times we think of data security as something applied to the information generated via transactions. We encrypt data in-flight to ensure data is secure against eavesdropping or manipulation as it travels across a network. We even put in place checks on data in our primary systems to ensure the data we really care about can’t be hacked into. What about data that’s been backed…