Rubrik

Palo Alto, CA, USA
2014
Dec 3, 2021   |  By Prudhvi Dharmana
Following up on our Simulating Filesystem Tree with Billions of Files series, let's imagine that we want to create a filesystem with 1 billion inodes in memory. At this scale, every single byte used to represent the inode will use 1GB of memory. Just with the inode numbers, each with 8 bytes, will use at least 8GB of memory. If we consider, conservatively, that each inode will use approximately 50 bytes of space, it will not be feasible to store this information in memory.
Nov 29, 2021   |  By Jeffrey Phelan
The real risk of business disruption, brand damage, and potential liabilities caused by ransomware attacks has elevated cybersecurity from a technical or operational issue normally handled by security teams, to a major Board level priority and discussion. Even the most sophisticated and mature organizations that once believed their cybersecurity defenses were robust are now rethinking their preparedness and response capabilities required to address the imminent threat of ransomware attacks.
Nov 29, 2021   |  By Murthy Mathiprakasam
At our recent Data Security Summit, Bipul Sinha sat down with author and award-winning The New York Times cybersecurity journalist Nicole Perlroth to discuss learnings from her research and thousands of interviews with security leaders, government officials, hackers, spies, and more.
Nov 17, 2021   |  By Adam Eckerle
The air gap, a cybersecurity countermeasure that isolates digital assets to put them out of reach of malicious actors, is the subject of many industry myths. Are you confused by all the myths around air gaps? Does it seem odd that logical air gaps are not considered air gaps in spite of their ability to defend against attacks? If you answered “yes” to these questions, you're likely not alone.
Nov 16, 2021   |  By Kim Lambert
When organizations are attacked by ransomware, only a little more than half are able to recover their data using a backup. This begs the question, “What about the rest? Why might they be unable to recover?” One reason may be that their backup data has been compromised. Backups are a hot target for hackers. If they can get to an organization’s backup data, they have far more leverage.
Nov 15, 2021   |  By Adam Gee
Hackathons vary in sizes and shapes, but ours has typically been a 24-hour sprint, with teams submitting a five-minute video presenting their project. This year was our biggest hackathon yet, with almost 90 teams registering across a multitude of departments including Support, Sales, Product, Technical Writing, and, of course, Engineering! We crowdsource the first-round judging by asking anyone at Rubrik to participate in evaluating projects.
Nov 12, 2021   |  By Vigyan Jain
Oracle databases are an integral part of modern technological infrastructure for organizations globally. They underpin high-volume digital business, perform thousands of transactions, and house an organization’s critical and sensitive information. Today’s business requirements and data-driven applications are expanding the definition of “data loss” to include data that is inaccessible to the business for a period to significantly and negatively impact it.
Nov 9, 2021   |  By Brian Mislavsky
The SaaS-based Rubrik platform is built to protect and recover a wide variety of cloud-native workloads. For Microsoft Azure, this commonly equates to protecting Azure Virtual Machines and Managed Disks, where recovery options can range from entire resource replacement, in-region or cross-region exports (clones), and now file/folder recovery.
Nov 3, 2021   |  By Aubrey Champagne
It was 4:00 in the morning, May 20, 2021. Matthew Day, CIO of Langs Building Supplies (Langs) was excited for a long-anticipated holiday after 14 months of lockdown due to COVID-19. His wife was thrilled. His friends, ecstatic. But the day took an unexpected turn. Instead of waking up delighted to leave for his getaway, Day woke up to every CIO’s worst nightmare, the dreaded phone call: “We’ve been hacked.”
Oct 20, 2021   |  By Prudhvi Dharmana
Rubrik can gracefully backup hosts with petabyte-scale filesystems containing around a billion files. It took us focused effort and innovation, both in scaling existing systems and verifying the changes work before shipping to our customers. One of the innovative systems that helped us achieve this scalability is the FileSystem Simulator.
Sep 23, 2021   |  By Rubrik
Hear from Former Director of the Cybersecurity and Infrastructure Security Agency (CISA), Chris Krebs, about his experiences and insights into the priorities companies should be focusing on to combat the growing threat of Ransomware.
Sep 23, 2021   |  By Rubrik
Join Nicole Perlroth, acclaimed reporter at The New York Times cybersecurity and author of “This is How They Tell Me the World Ends” and Bipul Sinha, Rubrik CEO, for a captivating fireside chat on emerging cybercrime and what you need to prioritize in order to fight back.
Sep 23, 2021   |  By Rubrik
The first 24 hours after a major security incident are critical to keeping your business up and running. What can you do to protect your organization’s valuable data and critical IT assets in the event of a ransomware attack? Come listen to Kevin Mandia, Mandiant CEO and security expert to learn best practices that IT leaders can put into practice today. Hear about the successes (and failures) of other organizations, and how your team can avoid being a victim.
Sep 16, 2021   |  By Rubrik
Is your data safe from ransomware attacks? Hear from security leaders from both the private and public sectors to learn why network, perimeter, and application security isn’t enough. Learn about new cyber/ransomware threats, how ransomware impacts every layer of your organization from board decisions to shareholder value, and how you can survive an attack without paying the ransom.
Aug 24, 2021   |  By Rubrik
With Zero Trust Data Management™, you can now turn major attacks into recoverable events. Zero Trust Data Management is the idea that no one is trustworthy - not users, endpoints, or applications.
Aug 4, 2021   |  By Rubrik
Langs Building Supplies was hit with #ransomware. Hear from their CIO, Matthew Day, and IT Systems Analyst, Aaron Pritchard, as they share their gritty, authentic perspective on what it’s like to be hit, and how to respond when everything feels like it’s in disarray.
Jul 14, 2021   |  By Rubrik
Deploying a Rubrik Cloud Cluster on AWS has never been easier! Watch this video to learn how you can utilize the AWS Marketplace to easily deploy a fully configured 4 node Rubrik cluster in the cloud. Running Rubrik data management software in the cloud enables many features such as backup of Cloud Native NAS filesystems, VMC on AWS protection, point-in-time recovery of SQL, Oracle or SAP Hana and much more...
Jul 6, 2021   |  By Rubrik
Microsoft 365 provides tools to assist with compliance, but they don’t provide native backup and recovery - they recommend customers backup their data with third-party applications. Rubrik’s SaaS-based approach to data protection for Microsoft 365 ensures critical data is secured, easily discoverable, and always accessible.
Jul 6, 2021   |  By Rubrik
Backup job scheduling doesn’t need to be time-consuming. With Rubrik’s policy-driven platform you can easily align SLAs with your business needs and eliminate the manual process—reducing time spent by 90%.
Jul 6, 2021   |  By Rubrik
Today, data is growing faster than ever, and so should your business plans! Learn about the benefits of cloud storage and how with Rubrik you can seamlessly manage and protect your data while accelerating your cloud adoption, simplifying archival, streamlining app migration, and unifying data protection across multi-cloud and hybrid migration. Rubrik will help your enterprise drive resiliency at the point of data and give back control and visibility.
Nov 3, 2021   |  By Rubrik
Rubrik is the world's first Cloud Data Management platform that delivers data protection, search, analytics, and copy data management to hybrid cloud enterprises.
Nov 3, 2021   |  By Rubrik
Ransomware Recovery For Dummies introduces a sensible approach to recovering quickly from ransomware attacks that you can't avoid. After exploring the ransomware basics, we'll cover the important role backup solutions play in protecting your data, as well as what features you need to recover from ransomware. By the end of this ebook, you will learn how to build a recovery plan that makes sense and keeps your organization safe. We also include the top ten tips for building the most effective ransomware recovery plan.
Oct 1, 2021   |  By Rubrik
We understand that a ransomware attack is one of the worst-case recovery scenarios that you can face. In the event of an attack, you'll likely be dealing with widespread business and logistics issues.
Oct 1, 2021   |  By Rubrik
Backups are one of the most, if not the most, important defenses against ransomware. If compromised, however, attackers can use them against you, forcing you to choose between losing your data and paying the ransom. Businesses should be able to recover quickly and reliably with as little data loss and financial impact as possible. To do so, organizations must first develop a strong ransomware remediation plan.
Sep 1, 2021   |  By Rubrik
Most of the collective data fueling today's technological and scientific advances consists of unstructured data files - trillions of them. Large files, medium files, and small files are stored on NAS systems, Unix servers, Windows servers, and public cloud platforms. And the number of individual files behind these innovations continue to increase at an exponential rate. Download this ebook and learn how to enhance visibility, protection, and mobility at petabyte scale for your unstructured data.
Sep 1, 2021   |  By Rubrik
Let's face it, recent ransomware attacks have caught many IT professionals off guard. Reason being is they honestly didn't have adequate plans in place. And it's not totally their fault. The ransomware attacks of today are far more sophisticated. Which means you need an equally sophisticated, yet easy to implement plan in place to survive and recover. In this whitepaper, Framework for a Comprehensive Ransomware Recovery Plan, we give you the tools to develop your own ransomware recovery playbook.

Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

With Rubrik Enterprise Edition, you can now turn major attacks into recoverable events. Your organization can take advantage of Zero Trust data protection, Ransomware Investigation, Sensitive Data Discovery, Incident Containment and Orchestrated Application Recovery on a single SaaS platform.

Why Rubrik?

  • Operational Excellence: Stop managing backups. Automate data operations and cut management time by 70-90%.
  • Ransomware-proof Backups: Don’t let ransomware consume your backups. Rubrik offers the only backup solution that is immutable and secure by design.
  • Never Pay for Hardware Again: Run our software in the cloud or on a qualified hardware platform of your choice.
  • Lower TCO: Break free from legacy solutions with expensive renewals and save 30-50%.
  • Fast Path to the Cloud: Unlock the cloud for long term data retention and better cloud economics. Easily archive to the cloud. Migrate applications to the cloud. Protect cloud-native applications.
  • Proactive Support: Our Support Engineers have your back, even before issues surface. That’s why we’ve achieved an audited NPS of 82.

Protect your data and applications from ransomware, rogue employees, natural disasters, and operational failures.