Rubrik: Threat Hunting: The Complete Demo

Rubrik: Threat Hunting: The Complete Demo

 CEST
Online

In the midst of a cyberattack recovery, identifying what systems were first affected by malicious threat actors - and when - can be challenging.

Rubrik Threat Hunting helps by analyzing backup snapshots and providing insights that help avoid malware reinfection during recovery.

During this demonstration you will learn:

  • How Rubrik’s threat hunting solution finds malware to avoid reinfection.
  • How to scan backups for indicators of compromise using file patterns, file hashes, or YARA rules.
  • How to analyze backups to surface clean snapshots and identify the earliest indicator of compromise.
  • How Rubrik Threat Hunting helps you quickly recover in the event of a cyber attack.