Don’t pay the ransom: Rubrik’s Zero Trust Data Management

Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.
As Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.

With the hostile cybersecurity climate, zero trust is no longer just ’a nice thing to have,’ but a necessity in protecting an organization’s most precious asset: its data. To further illustrate this, Rubrik reports that an attacker launches a ransomware attack every 11 seconds. For many organizations, a speedy ‘out of the box’ solution is exactly the requirement in mitigating against these attacks. With this in mind, we take a look at  Rubrik’s Zero Trust Data Management software.

The issue of paying a ransom 

Rubrik emphasizes, “a payout isn’t the way out,” a sentiment that may seem redundant to organizations who have lost their backups to hackers. However, even if hackers provide a decryption key, the recovery process may take days or even weeks, and paying a ransom doesn’t always guarantee the return of data. Hackers may retain some of the data and only return parts of it. Once a hacker knows that an organization will pay for the return of its data, nothing stops them from drip-feeding the data back for a further price, creating even more disruption to its operations and bottom line.

Immune to ransomware 

Rubrik promises an immutable service. Once information is ingested, neither internal or external companies can alter the data, making it immune to ransomware. This means that attackers cannot overwrite data, and infected data can’t infect other existing files and data. “You’ll always have weaknesses,” says Matthew Day, CIO, Rubrik, “That’s why you need rock-solid data management. You always have to be moving forward instead of looking back. Since we plan for these failures, this threat was reduced to a minor inconvenience. The next day, it was like nothing happened.”

How does it work? 

Rubrik integrates with SecOps systems to ensure that an organization can immediately shift into attack forensics mode if required. The victim organization can then locate any sensitive or regulated data efficiently and discover whether it was in the range of the attack. There are three ways in which an organization can recover the information instantly: 

1. Full restore: All data can be recovered instantly using the mass recovery wizard. 

2. Granular: Eliminate unnecessary data loss by surgically recovering just the infected data. 

3. App Level: Organizations can recover single apps or groups of apps along with dependencies and restart priorities with AppFlows Blueprints.

This solution allows organizations to analyze backup metadata for unusual behavior to identify which data was encrypted and where it resides. A company can locate personally identifiable information (PII) that may have been compromised during an exfiltration attack. Lastly, it can enforce compliance by automatically protecting new workloads and lock retention to prohibit backup data from being deleted.

READ MORE:

Competitive edge 

Rubrik is reputed for its operational excellence, as it can support organizations in cutting management time by 70-90%. Furthermore, this management service provides a fast path to the cloud for organizations, as data is stored long-term. Organizations can archive to the cloud and migrate applications to the cloud, and for companies that still have their journey to the cloud ahead of them, they can run this software on a qualified hardware platform of their choice. In addition, Rubrik has a team of support engineers to support the software implementation and achieve an audited NPS of 82.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...