Don’t pay the ransom: Rubrik’s Zero Trust Data Management

Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.
As Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.

With the hostile cybersecurity climate, zero trust is no longer just ’a nice thing to have,’ but a necessity in protecting an organization’s most precious asset: its data. To further illustrate this, Rubrik reports that an attacker launches a ransomware attack every 11 seconds. For many organizations, a speedy ‘out of the box’ solution is exactly the requirement in mitigating against these attacks. With this in mind, we take a look at  Rubrik’s Zero Trust Data Management software.

The issue of paying a ransom 

Rubrik emphasizes, “a payout isn’t the way out,” a sentiment that may seem redundant to organizations who have lost their backups to hackers. However, even if hackers provide a decryption key, the recovery process may take days or even weeks, and paying a ransom doesn’t always guarantee the return of data. Hackers may retain some of the data and only return parts of it. Once a hacker knows that an organization will pay for the return of its data, nothing stops them from drip-feeding the data back for a further price, creating even more disruption to its operations and bottom line.

Immune to ransomware 

Rubrik promises an immutable service. Once information is ingested, neither internal or external companies can alter the data, making it immune to ransomware. This means that attackers cannot overwrite data, and infected data can’t infect other existing files and data. “You’ll always have weaknesses,” says Matthew Day, CIO, Rubrik, “That’s why you need rock-solid data management. You always have to be moving forward instead of looking back. Since we plan for these failures, this threat was reduced to a minor inconvenience. The next day, it was like nothing happened.”

How does it work? 

Rubrik integrates with SecOps systems to ensure that an organization can immediately shift into attack forensics mode if required. The victim organization can then locate any sensitive or regulated data efficiently and discover whether it was in the range of the attack. There are three ways in which an organization can recover the information instantly: 

1. Full restore: All data can be recovered instantly using the mass recovery wizard. 

2. Granular: Eliminate unnecessary data loss by surgically recovering just the infected data. 

3. App Level: Organizations can recover single apps or groups of apps along with dependencies and restart priorities with AppFlows Blueprints.

This solution allows organizations to analyze backup metadata for unusual behavior to identify which data was encrypted and where it resides. A company can locate personally identifiable information (PII) that may have been compromised during an exfiltration attack. Lastly, it can enforce compliance by automatically protecting new workloads and lock retention to prohibit backup data from being deleted.

READ MORE:

Competitive edge 

Rubrik is reputed for its operational excellence, as it can support organizations in cutting management time by 70-90%. Furthermore, this management service provides a fast path to the cloud for organizations, as data is stored long-term. Organizations can archive to the cloud and migrate applications to the cloud, and for companies that still have their journey to the cloud ahead of them, they can run this software on a qualified hardware platform of their choice. In addition, Rubrik has a team of support engineers to support the software implementation and achieve an audited NPS of 82.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...

Custom Software Development

Natalia Yanchii • 03rd October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

Six ways to maintain compliance and remain secure

Patrick Spencer VP at Kiteworks • 16th September 2024

With approximately 3.4 billion malicious emails circulating daily, it is crucial for organisations to implement strong safeguards to protect against phishing and business email compromise (BEC) attacks. It is a problem that is not going to go away. In fact, email phishing scams continue to rise, with news of Screwfix customers being targeted breaking at...

Enriching the Edge-Cloud Continuum with eLxr

Jeff Reser • 12th September 2024

At the global Debian conference this summer, the eLxr Project was launched, delivering the first release of a Debian derivative that inherits the intelligent edge capabilities of Debian, with plans to expand these for a streamlined edge-to-cloud deployment approach. eLxr is an open source, enterprise-grade Linux distribution that addresses the unique challenges of near-edge networks...
The Digital Transformation Expo is coming to London on October 2-3. Register now!