Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Introducing Rubrik Ransomware Recovery Warranty

With the rapid growth of ransomware attacks, enterprises all share the same concern: “If we get hit by ransomware, can we recover?” The reality is, when traditional security products fail and data is compromised, the stakes are high, and IT and Security teams are often left on their own. So we asked ourselves, can we give them the ultimate assurance that Rubrik will be there for them?

Why the United States Federal Government Considers Ransomware a Critical Risk to Business

At the Rubrik Data Security Summit, leaders from both the public and private sectors discussed an important topic: ransomware. Cyber threats continue to expand in both volume and sophistication with attacks growing at a rate of 150% annually. As attackers increasingly target backups, it will be even more paramount for policies and guidance from government agencies to match the security innovation of private sector businesses to mitigate the risks of this cyber pandemic head-on.

Backing up 10,000 SQL Server Databases in a Lazy Afternoon

Customers using Microsoft SQL Server tend to grow horizontally in terms of the number of databases. For recent versions of SQL Server, the max number of databases you can have on a single instance is 32,767 and it is common to see customers push that limit. At Rubrik, we have run into several customers who approach 10,000 databases on a single host. As SQL Server accelerates the push into the enterprise segment, one needs to address the problem of managing and protecting these servers at scale.

Fork is The Way - Let's Make it Hurt Less

The Linux/UNIX process model creates a new process by cloning the currently running one using the fork() system call. Subsequently, exec()—or one of its variants—loads a new program image into the newly cloned child process. There are a variety of issues that stem from using this approach in modern systems. There are also various widely used techniques and APIs aiming to alleviate the issues in different ways with different degrees of success and quirks.

Rubrik's Customer Trust Portal Puts Transparency First

At Rubrik, we’re committed to delivering the best data management capabilities seamlessly to our customers and partners. Customer Trust was one of the first functions we focused on building, because Rubrik’s customer-first philosophy is founded on the core pillars of transparency and security. Our goal is to deliver the same, seamless service Rubrik expects from its own suppliers and vendors in every customer and partner interaction.

How To Protect Rubrik CDM with Microsoft Authenticator

Rubrik’s Cloud Data Management (CDM) code features the ability to protect all of your Rubrik login accounts with two-step verification by using the industry-standard time-based one-time-password (OTP) codes. The Microsoft Authenticator app has extended its functionality, recently adding Microsoft account-based autofill capabilities across platforms. Here is a step-by-step guide on how to set it up on Rubrik CDM.

Automate and Unify Protection of Your SAP HANA Databases

Enterprises are undergoing a dizzying pace of digital transformation. For many organizations, real-time analytics and insights are critical to the success of their transformation, and SAP HANA has become their database of choice, making their protection a must. While SAP HANA provides a rich ecosystem of native backup and recovery tools to specialist DBAs, they are often not accessible by the backup and infrastructure teams.

Introducing Orchestrated Disaster Recovery for VMware Applications and Data

Unplanned downtime and data loss caused by natural disasters and modern cyber threats represent some of the most challenging events facing organizations today. Maintaining capabilities to reduce or eliminate impact in these scenarios is critical to any business continuity plan. Organizational resilience depends upon being able to protect and ensure the recoverability of data and services wherever and whenever disaster strikes.

Mixing the Perfect Vodka Martini Can Teach Enterprises a lot about Data Protection

What do data protection and the perfect vodka martini have in common? Quite a bit. For one thing, they’re both comforting to have around when things go wrong. More importantly, they're both made up of multiple ingredients and need premium products to work well together. It doesn’t matter how much flair you bring to serving that cocktail – without high-quality products and the right technique, you’re essentially serving a few ounces of vodka and vermouth.

Hacking Pandemic Workplace Isolation to Enhance Collaboration

Since the onset of the pandemic, many workplaces were suddenly merged into home spaces. In my case, my bedroom became my office. In this new mode of working, what I missed the most is the office chatter and the water cooler conversations which often lead to some brilliant ideas for a new project or design solutions to a technical problem.