Tagged in

security

Rubrik -  - Rubrik Named a Data Resiliency Leader

Company

Rubrik Named a Data Resiliency Leader

As modern enterprises advance their digital transformation strategies, data is growing increasingly fragmented and difficult to manage. When combined with the rising number of privacy regulations and security threats, it’s critical that IT leaders prioritize adopting cutting-edge solutions that can ensure data resiliency across multiple data sources.  Rubrik was architected to enable enterprises to protect and maximize value from data that is scattered across data centers and clouds. Today, we’re thrilled to announce that Rubrik has been named a Leader in The Forrester Wave™: Data Resiliency Solutions, Q3 2019. The report evaluated 10 vendors based on 40 criteria, which were grouped into three categories: current offering, strategy, and market presence. Despite being in the market for only five years, we’ve been recognized as a Leader and achieved the highest possible score in the strategy category, with among the highest scores in the security and backup optimizations criteria. Based on rigorous research and analysis, Forrester identified three capabilities that data resiliency solution customers should look for in a provider. Rubrik believes that its innovative platform aligns with these principles, empowering IT professionals to: Drive policy-based execution. According to Forrester, “It’s not practical for firms to operate the backup infrastructure using individual…
Rubrik -  - 3 Steps to Constructing a Security-First IT Strategy

General Tech

3 Steps to Constructing a Security-First IT Strategy

How CIOs and other IT leaders can successfully guide their teams into a security-first IT strategy and earn stakeholder buy-in. Cybersecurity threats are not just becoming increasingly frequent and sophisticated– they remain a top financial concern for businesses, regardless of region or industry.  It is now on the shoulders of IT leaders to navigate the technical security landscape and build agile teams that can dynamically respond to new threats. In addition, because of the financial implications of downtime and breaches, these leaders must also be able to abstract the business value of security in order to influence company-wide priorities.   I sat down with Ron Sinopoli, CIO of McHugh Construction, to discuss how CIOs and other IT leaders can effectively drive and advocate for a security-first posture within their organizations. Sinopoli has been the CIO of McHugh for the past year, and he has already led the company through an entire upheaval of its IT strategy in order to uplevel security measures as a strategic priority for the business.   Here’s an inside look at the three major stages Sinopoli led his organization through when shifting to a security-first posture. Stage 1. The Security Event Post-Mortem: Conducting an Honest Analysis  “After all,…
Rubrik -  - Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Product

Deploying a Secure Data Protection as a Service Solution with Rubrik Polaris

Cloud security is one of the topics du jour in the enterprise IT space. In fact, it’s a big enough topic that Amazon Web Services (AWS) hosted their own security conference, AWS re:Inforce, back in June. It highlights the challenge with securing your data in the cloud,  especially if you are using tools and approaches that were not designed for security from the start. Not adhering to good security practices exposes cloud customers to the potential risk of being hacked and having data stolen. To assist customers and partners with building secure solutions, AWS has codified recommended practices and principles into the security pillar of their AWS Well-Architected Framework. The Well-Architected Framework is a tool for evaluating the soundness of any solution running on AWS and leveraging their services. The framework is comprised of five conceptual areas called pillars, including the security pillar.  So where does Rubrik Polaris fit into this picture? We previously announced the general availability of AWS native protection support in Rubrik Polaris, our Software-as-a-Service (SaaS) platform for cloud data management. Now, we want to explore how Polaris is able to build a secure solution for protecting Amazon EC2 instances and Amazon EBS volumes using the recommended…
Rubrik -  - Polaris Radar: The Last Line of Defense

Product

Polaris Radar: The Last Line of Defense

Ransomware is getting increasingly more sophisticated, and attacks are getting harder and harder to avoid–even when strong security measures are in place. In fact, over 70% of organizations were infected by ransomware after it successfully bypassed their detection and prevention measures.* Ransomware rapidly mutates into new variants, making it extremely difficult to detect with traditional signature-based approaches. That’s why we built Radar, a Polaris app that increases resilience in the face of cyber attacks. Rubrik’s approach includes multiple layers of defense, such as anomaly detection, data analysis, and instant recovery.   Dealing with Ransomware No one likes having their possessions held for ransom and being blackmailed into paying cash for something that is already theirs. Typically, a data center is infiltrated undetected via an endpoint device from a phishing attack that will begin to rapidly encrypt files based on various criteria. At this point, the victim can either pay the ransom or lose their data. There are three main reasons corporations choose not to pay ransoms: It encourages ransomware hackers to carry out more attacks. It shows that the organization is willing to pay, making them a higher priority target. Paying doesn’t always result in getting the decryption key. Dealing…
Rubrik -  - Back-to-Back Champions: Rubrik Wins VMworld Best of Show 2018, 2017

Company

Back-to-Back Champions: Rubrik Wins VMworld Best of Show 2018, 2017

Rubrik is honored to have Radar, its newest Polaris application, receive two Best of VMworld 2018 U.S. awards: the Gold Award for Security and Best of Show. This marks the second year in a row that we’ve been named Best of Show, and the third year we’ve won a Gold at a VMworld conference. These awards recognize the most innovative new products in the server virtualization, cloud, and end-user computing markets. This year, a panel of industry experts evaluated 75 products in areas such as innovation, performance, ease of use and manageability, and ability to fill a market gap. Each year, the judges select one product as Best of Show, which “represents the best of the best” among the winners in previous categories. We’re humbled to be considered alongside many innovative companies and view this achievement as a testament to our leadership in the data management and security spaces. To win the Gold Award for security, Radar was weighed against many disruptive products that “monitor and protect hypervisors, cloud workloads, guest OSes and virtual networks and enforce security best practices.” The judges commented that Radar showed we “gave serious thought to security and ransomware monitoring in the data protection space.”…
Rubrik -  - Grove Bank & Trust Is Hurricane-Ready with Rubrik

Customers

Grove Bank & Trust Is Hurricane-Ready with Rubrik

A South Florida staple since 1926, Grove Bank & Trust is the oldest continuously operating bank in Miami Dade County. Named for the Coconut Grove neighborhood of Miami that hosts its headquarters, Grove Bank & Trust delivers checking, savings, lending, financial planning, insurance, and investment services to customers through its five branch offices in Miami, Aventura, and Coral Gables. At Grove Bank & Trust, CIO Sergio Garcia leads a team of three that handles all IT functions and initiatives across the entire bank. What challenges were you experiencing with data protection? Our legacy backup solution was unreliable, difficult to manage, and often resulted in failed backups. These inadequacies placed Grove Bank at risk of being non-compliant with SLAs and industry regulations. We have to hold a lot of our data for multiple years, and we weren’t backing up everything that we needed to in case of a disaster. It’s not just that the old solution was difficult to use, it’s that it made it difficult to provide the regulators with proof that we have backups, can recover, and have completed adequate testing. What were you looking for in your new solution? The bank is growing very rapidly, and we’ve been aggressively…
Rubrik -  - Worried About Viruses? Ransom? Data Loss? The Cure is Here!

General Tech

Worried About Viruses? Ransom? Data Loss? The Cure is Here!

This is not hype! This is reality. Companies across industries get hit with viruses all the time. In the always-on economy, companies rely on 24/7 data availability, so any downtime can severely impact the business. The good news is that with a strong data management solution, you can quickly recover from a disaster without any data loss. Before we dive into how Rubrik delivers that solution, let’s go over what happens during a virus attack. The Lifecycle of a Virus Attack Before Rubrik As the above diagram shows, a typical attack has several phases: you get hit with the virus, your systems are under attack, and your business loses access to the encrypted data. Once it’s detected, your IT team documents and implements steps to prevent the virus from spreading. But since most organizations rely on data to perform daily operations, the data loss you’ve already experienced has a severe impact on the organization. Unfortunately, for many organizations, a virus’ life doesn’t end with patching the vulnerability. Even with a sophisticated antivirus software, viruses can remain in your system undetected. This often leads to further data corruption and a vicious cycle of attack, recover, and patch. For this reason, many…
Rubrik -  - 3 Cloud Data Management Trends to Watch in 2018

General Tech

3 Cloud Data Management Trends to Watch in 2018

Enterprises across verticals are undergoing a digital transformation. They must now operate in the “always on” economy and execute instant service delivery to meet modern consumer demands. This shift requires an infrastructure that supports 24/7 application availability in both data center and cloud, while also ensuring data is protected and compliant. As data management becomes increasingly crucial to meet business goals, companies are exploring new solutions to streamline and automate their processes. Here are the top trends you can expect to see in 2018: 1. AI-Powered Data Management Leveraging machine learning for data protection and analysis provides valuable business opportunities, but enterprises have barely scratched the surface. According to Gartner, AI will be a major digital driver for reinventing both business models and the customer experience through 2025. One application of ML that many companies are expected to explore relates to event-driven IT. This model involves constantly sensing and responding to business events, which could be anything from a completed transaction to threat detection. As companies prepare for intelligent applications and analysis, they will seek solutions that can centralize data management across all their environments. 2. Accelerated Cloud Adoption While cloud computing isn’t new to the enterprise lexicon, it is…
Rubrik -  - How to Avoid Ransomware Jail

General Tech

How to Avoid Ransomware Jail

It’s 1983, and Ronald Reagan is sitting down to watch the hit film War Games. Five days later, the president asked his secretaries of state, “Could a scenario like war games ever happen?” One week later, General Vessey returned with the answer: “Mr. President, it is a lot worse than you think.” Was this the first time that cyber security and privacy had surfaced in computer systems? Categorically, no. Security and Privacy in Computer systems 1967 by Willis Ware was the first paper on the topic — written in 1967. So, since the beginning of networked computing, cyber security, and privacy have been a factor. So, why is it suddenly a huge industry buzzword? My thoughts on this are twofold: Across governments, the use and ideas of cyber warfare were dismissed, ignored, or forgotten. But in 2007, the Aurora test categorically proved that cyber attackers could inflict physical damage using computer tools. This was a pivotal moment, as critical infrastructure was at risk. Cybercrime then shifted to the public sphere with cyber groups lining their sights on non-government attacks, such as online fraud, ransomware, malware, and phishing. The role that security and privacy now play in IT and our personal lives…
  • 1
  • 2