Don’t pay the ransom: Rubrik’s Zero Trust Data Management
As Rubrik emphasizes, “a payout isn’t the way out,” Top business Tech takes a closer look at Rubrik’s Zero Trust Data Management.
With the hostile cybersecurity climate, zero trust is no longer just ’a nice thing to have,’ but a necessity in protecting an organization’s most precious asset: its data. To further illustrate this, Rubrik reports that an attacker launches a ransomware attack every 11 seconds. For many organizations, a speedy ‘out of the box’ solution is exactly the requirement in mitigating against these attacks. With this in mind, we take a look at Rubrik’s Zero Trust Data Management software.
The issue of paying a ransom
Rubrik emphasizes, “a payout isn’t the way out,” a sentiment that may seem redundant to organizations who have lost their backups to hackers. However, even if hackers provide a decryption key, the recovery process may take days or even weeks, and paying a ransom doesn’t always guarantee the return of data. Hackers may retain some of the data and only return parts of it. Once a hacker knows that an organization will pay for the return of its data, nothing stops them from drip-feeding the data back for a further price, creating even more disruption to its operations and bottom line.
Immune to ransomware
Rubrik promises an immutable service. Once information is ingested, neither internal or external companies can alter the data, making it immune to ransomware. This means that attackers cannot overwrite data, and infected data can’t infect other existing files and data. “You’ll always have weaknesses,” says Matthew Day, CIO, Rubrik, “That’s why you need rock-solid data management. You always have to be moving forward instead of looking back. Since we plan for these failures, this threat was reduced to a minor inconvenience. The next day, it was like nothing happened.”
How does it work?
Rubrik integrates with SecOps systems to ensure that an organization can immediately shift into attack forensics mode if required. The victim organization can then locate any sensitive or regulated data efficiently and discover whether it was in the range of the attack. There are three ways in which an organization can recover the information instantly:
1. Full restore: All data can be recovered instantly using the mass recovery wizard.
2. Granular: Eliminate unnecessary data loss by surgically recovering just the infected data.
3. App Level: Organizations can recover single apps or groups of apps along with dependencies and restart priorities with AppFlows Blueprints.
This solution allows organizations to analyze backup metadata for unusual behavior to identify which data was encrypted and where it resides. A company can locate personally identifiable information (PII) that may have been compromised during an exfiltration attack. Lastly, it can enforce compliance by automatically protecting new workloads and lock retention to prohibit backup data from being deleted.
READ MORE:
- Zero trust architecture is not just ‘nice to have’
- The zero trust blindspot
- How can organizations adopt zero trust security principles?
- Securing the supply chain: why it’s time for a zero trust approach
Competitive edge
Rubrik is reputed for its operational excellence, as it can support organizations in cutting management time by 70-90%. Furthermore, this management service provides a fast path to the cloud for organizations, as data is stored long-term. Organizations can archive to the cloud and migrate applications to the cloud, and for companies that still have their journey to the cloud ahead of them, they can run this software on a qualified hardware platform of their choice. In addition, Rubrik has a team of support engineers to support the software implementation and achieve an audited NPS of 82.
For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!