Viverra volutpat varius gravida ultrices pulvinar. Hyperlink facilisis risus, quisque imperdiet pellentesque cursus etiam porttitor. Diam, feugiat facilisis congue lectus neque, risus. Integer id suscipit ut quis in hendrerit placerat nisi a. Volutpat at vitae vitae luctus ut odio. Felis vel risus elementum, sagittis. Mattis et faucibus diam quis risus. Odio vel viverra nulla consectetur varius tellus integer ultrices.

Introduction & The Challenge
When we began the journey to migrate our data protection infrastructure, our core goal was shifting from a reactive backup mentality to a proactive cyber resilience posture. This required consolidating 5PB of data across 12 global data centers and building an automated disaster recovery environment in the cloud.
This article covers the technical architecture we chose, focusing specifically on how the Rubrik Security Cloud (RSC) enables automated recovery and validation steps that helped reduce our Financial Database Recovery Time Objective (RTO) from 16 hours to just 2 hours.

1. Hybrid Architecture Overview: On-Prem to AWS
Our environment relies on a hybrid architecture, securing core business systems like VMware and Microsoft 365. The critical design decision was utilizing Rubrik appliances on-premises for fast local recovery, while integrating them tightly with the Rubrik Security Cloud (RSC) in AWS for cloud-based disaster recovery.
By leveraging RSC's cloud capabilities, we achieved two key technical wins:
- Eliminating Third-Party DR Sites: We no longer require a separate, costly third-party DR data center for VMware workloads. The cloud acts as our DR target.
- Unified Management: The 5PB of data across 12 global data centers is managed from a single control plane, consolidating three legacy backup tools into one.
Practitioner Tip Placeholder
This section is reserved for a short, impactful tip related to optimizing hybrid architecture, such as network latency considerations or best practices for cloud-based replication policies.

Orchestrating Cloud DR (OAR) for Sub-Hour RTOs
The biggest time saving came directly from the deployment of Orchestrated Application Recovery (OAR). OAR is essential for any high-risk application because it validates that a group of interdependent services (e.g., Application, Web, and Database servers) can fail over together in a verifiable, automated sequence. This move transformed our ability to guarantee business continuity.
The shift in mindset, as Zatarain noted, was profound: "We've gone from a backup restore solution to a complete cyber-resilient solution!"
Zero-Trust Security: Threat Hunting & Validation
test1234
Contributed by

Ruby Garg
Senior Technical Product Manager

Nikita Bhuma
Customer Advocacy Specialist

Boomchi Kumar
Director Security Consulting


