OVERVIEW

Top of Mind for Your Business

Are you at risk for a data breach?

Can you manage data privacy at scale?

Is all your data secure & compliant?

Where is your sensitive data?

What is the time and cost of audits?

O'REILLY DIGITAL BOOK

Strategies for Building an Enterprise Data Lake

Data-driven decision making is changing how we work and live. Get an introduction to data lakes, tips for creating a successful data lake, common data lake architectures, and how to take advantage of big data.

BENEFITS

Automate Data Governance

Polaris Sonar is a new SaaS application to discover, classify, and protect sensitive data, such as credit card numbers, social security numbers, or ITIN, across data sources and locations.

Simplify with ML and Policy-Driven Automation

Eliminate manual tagging or yearly cleanups. Use predefined policy templates or custom rules for automated alerts on the location of the data.

Reduce Sensitive Data Exposure

Identify potential policy violations or overexposed sensitive content. Prioritize remediation efforts to address high risk incidents.

Assist Ongoing Compliance

Drive consistent processes, reduce the risk of fines, or help comply with access requests, such as GDPR’s Right to be Forgotten.

Why Rubrik

How We Are Different

  1. No additional infrastructure
  2. No install or agents
  3. No impact to production
  4. No learning curve
  5. No operational overhead

USE CASES

Business Applications

Identify Business Risk

Discover the current state of your environment. Scan and quickly identify what kinds of sensitive data exists and where it is located. Proactively identify where data may be overexposed to minimize risk.

Easily Search for Data

Search for information by keywords or custom patterns (e.g. name, social security number, credit card number) via on-demand search to comply with GDPR’s Right to be Forgotten, Subject Access Requests, or on-demand audits.

Assist with Regulatory or Audit Compliance

Simplify compliance with common regulations and standards, such as GDPR, PCI/DSS, HIPAA, and CCPA, with a policy-driven approach. Gain insights into types of classifications processed with pre-defined policy templates.

How It Works

  1. Configure role-based access controls to assign permissions on data access.
  2. Create a policy to identify common data types from a custom or pre-defined template. Specify what objects and types of sensitive information to search for, such as social security number, healthcare NPI, or credit card number.
  3. With agentless, incremental scanning, quickly classify new and modified data for performance efficiencies and minimal impact to production.
  4. Automatically receive alerts on policy violations. Drill-down to a folder or file for granular insights. Whitelist locations where sensitive information is allowed to minimize false alerts.
  5. Audit with an easy-to-use dashboard and reporting.