Don’t pay the ransom: Rubrik’s Zero Trust Data Management

Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.
As Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.

With the hostile cybersecurity climate, zero trust is no longer just ’a nice thing to have,’ but a necessity in protecting an organization’s most precious asset: its data. To further illustrate this, Rubrik reports that an attacker launches a ransomware attack every 11 seconds. For many organizations, a speedy ‘out of the box’ solution is exactly the requirement in mitigating against these attacks. With this in mind, we take a look at  Rubrik’s Zero Trust Data Management software.

The issue of paying a ransom 

Rubrik emphasizes, “a payout isn’t the way out,” a sentiment that may seem redundant to organizations who have lost their backups to hackers. However, even if hackers provide a decryption key, the recovery process may take days or even weeks, and paying a ransom doesn’t always guarantee the return of data. Hackers may retain some of the data and only return parts of it. Once a hacker knows that an organization will pay for the return of its data, nothing stops them from drip-feeding the data back for a further price, creating even more disruption to its operations and bottom line.

Immune to ransomware 

Rubrik promises an immutable service. Once information is ingested, neither internal or external companies can alter the data, making it immune to ransomware. This means that attackers cannot overwrite data, and infected data can’t infect other existing files and data. “You’ll always have weaknesses,” says Matthew Day, CIO, Rubrik, “That’s why you need rock-solid data management. You always have to be moving forward instead of looking back. Since we plan for these failures, this threat was reduced to a minor inconvenience. The next day, it was like nothing happened.”

How does it work? 

Rubrik integrates with SecOps systems to ensure that an organization can immediately shift into attack forensics mode if required. The victim organization can then locate any sensitive or regulated data efficiently and discover whether it was in the range of the attack. There are three ways in which an organization can recover the information instantly: 

1. Full restore: All data can be recovered instantly using the mass recovery wizard. 

2. Granular: Eliminate unnecessary data loss by surgically recovering just the infected data. 

3. App Level: Organizations can recover single apps or groups of apps along with dependencies and restart priorities with AppFlows Blueprints.

This solution allows organizations to analyze backup metadata for unusual behavior to identify which data was encrypted and where it resides. A company can locate personally identifiable information (PII) that may have been compromised during an exfiltration attack. Lastly, it can enforce compliance by automatically protecting new workloads and lock retention to prohibit backup data from being deleted.

READ MORE:

Competitive edge 

Rubrik is reputed for its operational excellence, as it can support organizations in cutting management time by 70-90%. Furthermore, this management service provides a fast path to the cloud for organizations, as data is stored long-term. Organizations can archive to the cloud and migrate applications to the cloud, and for companies that still have their journey to the cloud ahead of them, they can run this software on a qualified hardware platform of their choice. In addition, Rubrik has a team of support engineers to support the software implementation and achieve an audited NPS of 82.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Author

How to move from CIO to Chief Customer Success Officer

Amber Donovan-Stevens • 21st October 2021

Dean Leung, Chief Customer Success Officer at iManage, reflects on his own path shifting from CIO to Chief Customer Success Officer (CCSO) and discusses both the similarities and differences of the two roles, and why it can be a natural progression when approached with the proper mindset.

The importance of edtech in the early years sector

Amber Donovan-Stevens • 18th October 2021

Technology has become an operational mainstay across a multitude of industries – helping businesses, education establishments, governments, and charities to streamline their processes and enhance communications. When it comes to the early years education sector, this is no different. Chris Reid, CEO and founder of Connect Childcare, shares his thoughts on the intrinsic link between...

A deep dive into the Scaled Agile Framework

Jeff Keyes • 14th October 2021

The Scaled Agile Framework (SAFe) was designed to help large organizations successfully adopt agile methodologies. In this article Jeff Keyes, VP of Product Marketing and Strategy at Plutora, discusses the four core values of this approach, and how and why businesses are using the SAFe framework to improve agility in software development.

How click fraud has worsened in the wake of Covid-19

Amber Donovan-Stevens • 05th October 2021

Stewart Boutcher, CTO and Data Lead at Beacon, examines how click fraud – which was already a serious threat to companies engaged in digital marketing prior to the pandemic – has worsened considerably in its wake. He seeks to provide a forecast on how the situation is likely to evolve overtime, and advice on what...

Join our webinar on 26th October: Intelligent Automation - Maintaining the competitive edge.

X