Rubrik vs Veeam
When the onus of security falls on your shoulders, can you even call it a data security solution? Find out why Rubrik is a better alternative to Veeam.
![]() | Veeam | |
---|---|---|
![]() Secure your data from threats | Rubrik runs on an immutable, append-only file system that is immutable at the time the cluster is created. | Veeam requires an additional component, a hardened Linux repository, or object storage for data immutability. |
Rubrik has no Windows dependencies and stores backups in a proprietary format on hyperconverged storage. | Rubrik has no Windows dependencies and stores backups in a proprietary format on hyperconverged storage. | |
Backup expiration based on Monotonic Clock prevents NTP changes or poisioning from expiring backups. | Backup expiration based on Monotonic Clock prevents NTP changes or poisioning from expiring backups. | |
Rubrik supports AD/LDAP integration as well as SSO via SAML, 2FA, and Native TOTP. | Uses Windows AD for authentication and does not support customized RBAC. | |
Hyperconverged platform with software, storage, and compute all in one. | Segmented architecure with the need of a 3rd party storage device used as a backup repository. | |
![]() Backup expiration based on system time is vulnerable to NTP changes or poisioning to expire your backups | Uses multi-phased, adaptive machine learning intelligence to detect anomalous activity and encryption. | Uses separate application to provide broad, static, user-set thresholds to determine when to alert users. |
Comprehensive model training uses simulations and real-world attacks to ensure high-confidence alerting. | Frequent false positives can lead users to disregard alarms. | |
Fully integrated sensitive data discovery. | No built-in sensitive data classification features. | |
Rubrik Threat Hunting finds malware activity in current and historical copies of data. | No threat hunting capability. | |
![]() Rapidly recover your data | Integrated DR Orchestration with single-click application recovery. | Utilizes a separate application for DR Orchestration with no single pane of glass management. |
SLA-based backups are applied at an object level, allowing for granular assignment regardless of workload. | Restrictive job-based approach that creates unneccessary job sprawl as the environment grows. | |
Rubrik can detect malware in backups and provide a blast radius, allowing recovery of the last known good copy of data. | Unable to detect malware without the use of a 3rd party antivirus scanner. Does not provide a blast radius or any indication of last known good backup without manual scanning of each backup. |