Rubrik
  • Products
  • Solutions
  • Knowledge Hub
  • About Us
  • CXO
  • Partners
  • Support
  • Contact Sales
Rubrik
LinkedInTwitterFacebookYouTubeInstagram

Call us at 1-844-478-2745

Submit Interest

ABOUT RUBRIK

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog

NEW TO RUBRIK

Why RubrikProductsSolutionsPartnersCustomersResources

POPULAR LINKS

Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog
Why RubrikProductsSolutionsPartnersCustomersResources
Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog
Why RubrikProductsSolutionsPartnersCustomersResources
Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups
  • Cookie Policy
  • Legal
  • Privacy Policy
  • Terms of Use
  • Trust
  • CA Residents only: Do not sell or share my personal information | Do not share my sensitive information

© 2026 Rubrik – Zero Trust Data Security™

Background
Technical Blog Hub

Test only -Rubrik 1 Apr Extends Cyber Resilience to Oracle Linux Virtualization Manager

Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Rubrik Community Blog1
Share

Table of Contents

section title 1

Viverra volutpat varius gravida ultrices pulvinar. Hyperlink facilisis risus, quisque imperdiet pellentesque cursus etiam porttitor. Diam, feugiat facilisis congue lectus neque, risus. Integer id suscipit ut quis in hendrerit placerat nisi a. Volutpat at vitae vitae luctus ut odio. Felis vel risus elementum, sagittis. Mattis et faucibus diam quis risus. Odio vel viverra nulla consectetur varius tellus integer ultrices.

 

  1. tetest123st123
  2. test1233345
  3. test123arreyeyeue

 

  • testa
  • testb
  • testc3

 

 

Introduction & The Challenge

When we began the journey to migrate our data protection infrastructure, our core goal was shifting from a reactive backup mentality to a proactive cyber resilience posture. This required consolidating 5PB of data across 12 global data centers and building an automated disaster recovery environment in the cloud.

This article covers the technical architecture we chose, focusing specifically on how the Rubrik Security Cloud (RSC) enables automated recovery and validation steps that helped reduce our Financial Database Recovery Time Objective (RTO) from 16 hours to just 2 hours.

 

1. Hybrid Architecture Overview: On-Prem to AWS

Our environment relies on a hybrid architecture, securing core business systems like VMware and Microsoft 365. The critical design decision was utilizing Rubrik appliances on-premises for fast local recovery, while integrating them tightly with the Rubrik Security Cloud (RSC) in AWS for cloud-based disaster recovery.
By leveraging RSC's cloud capabilities, we achieved two key technical wins:

  • Eliminating Third-Party DR Sites: We no longer require a separate, costly third-party DR data center for VMware workloads. The cloud acts as our DR target.
  • Unified Management: The 5PB of data across 12 global data centers is managed from a single control plane, consolidating three legacy backup tools into one.

Practitioner Tip Placeholder

This section is reserved for a short, impactful tip related to optimizing hybrid architecture, such as network latency considerations or best practices for cloud-based replication policies.

 

 

Orchestrating Cloud DR (OAR) for Sub-Hour RTOs

The biggest time saving came directly from the deployment of Orchestrated Application Recovery (OAR). OAR is essential for any high-risk application because it validates that a group of interdependent services (e.g., Application, Web, and Database servers) can fail over together in a verifiable, automated sequence. This move transformed our ability to guarantee business continuity.

The shift in mindset, as Zatarain noted, was profound: "We've gone from a backup restore solution to a complete cyber-resilient solution!"

Zero-Trust Security: Threat Hunting & Validation

In a true cyber-resilience model, restoration speed is useless if you reintroduce malware. The Enterprise Edition features we use are focused on ensuring the recovery point is clean:

  • Anomaly Detection: This continuously scans for indicators of compromise (IOCs) like mass deletions or encryption patterns. If triggered, it immediately flags the clean recovery points.
  • Threat Monitoring & Hunting: We use the built-in Mandiant feed intelligence to scan recovery snapshots for known malware signatures. This is the non-negotiable step that ensures we restore clean data and eliminate malware recurrence.
  • Sensitive Data Monitoring: For compliance purposes (GDPR, PII, Internal IP), the platform helps us monitor where regulated data resides and determine the precise magnitude of a breach for regulatory reporting.

Deep Dive Example: Ansible Code or OAR Diagram

This section is a placeholder for a technical asset (e.g., an Ansible code snippet, a detailed API call workflow, or a flowchart of the OAR process) to further illustrate the complexity of the deployment.

Automating Cyber Resilience and Next Steps

By integrating immutable backups with orchestrated recovery and automated validation, we moved our focus from simply hoping we had a backup to guaranteeing a clean, fast recovery. The resulting 87.5% reduction in RTO for our financial databases is the most visible outcome of adopting a genuine Zero Trust Data Security posture.

Key Technical Results:

By integrating immutable backups with orchestrated recovery and automated validation, we moved our focus from simply hoping we had a backup to guaranteeing a clean, fast recovery. The resulting 87.5% reduction in RTO for our financial databases is the most visible outcome of adopting a genuine Zero Trust Data Security posture.

METRICBEFORE RUBRIKAFTER OAR IMPLEMENTATION
Financial DB Recovery Time (RTO)16 Hours2 Hours
Protected Data FootprintDisparate, Not Unified5 PB across 12 global data centers
TesttableBEFORE RUBRIKAFTER OAR IMPLEMENTATION
Financial DB Recovery Time (RTO)16 Hours2 Hours
Protected Data FootprintDisparate, Not Unified5 PB across 12 global data centers

 

 

Related Blogs

View all Posts
GraphQL 101 for Rubrik Security Cloud
MAR 29, 2026

GraphQL 101 for Rubrik Security Cloud

This technical blog provides a foundational overview of using GraphQL with Rubrik Security Cloud (RSC). It explains the shift from REST to a unified GraphQL endpoint, detailing the functional differences between queries and mutations, the use of variables, and the "Connection-Node" pattern for consistent data retrieval. The page also offers practitioner tips for using the RSC API Playground and Chrome DevTools to accelerate automation workflows.

5 min read

Frederic Lhoest

Frederic Lhoest

Senior Technology Architect

fi2
White paper
MAR 26, 2026

For test only-Migrating vSphere Belts

test-A step-by-step guide to modernizing your virtualization backup strategy to the cloud.

3 min read

Ruby Garg

Ruby Garg

Senior Technical Product Manager

t2
Technical Blog
MAR 26, 2026

test-Sovereignty in an Age of Uncertainty: Why You Must Gain Complete Control Over Your Data

Zero-Touch Protection: Automating Lifecycle Management for Google Workspace

3 min read

TH

Test hybrid user

Network Engineer

View all Posts
Background

Share Your Insights

Have a fun story about your technical journey? Want to co-author a blog with your latest findings? We want to hear from you! Reach out to share your submission.

Dig In Deeper

Our learning and certifications pathways offer structured, relevant learning environments. Advance your career with an industry-recognized certification.

Explore coursesNext