Rubrik Data Protection Platform Upgrade Offers Speedier Threat Hunting

Data security specialist Rubrik is upgrading its data protection platform to offer quicker recoveries in the familiar backup & recovery process. The new Turbo Threat Hunting functionality more quickly scans an enterprise network to find clean recovery points after malware attacks, according to the company.

The new approach changes the current method that requires mounting and scanning data on a file-by-file basis to find signs of tampering, instead leveraging other techniques — including pre-computed hash values within Rubrik's metadata — that significantly speed up the process.

"Traditional recovery methods involve manually scanning each backup file, which can take an excruciatingly long time. Imagine having to sift through hundreds of thousands of backups to locate clean recovery points. For many organizations, that process can take days or even weeks, leaving them vulnerable to ongoing disruption and significant financial losses," the company said in a blog post. By contrast, the new tech reduces the time to find a backup that is free from Indicators of Compromise (IOCs) "from days to mere seconds."

In addition to those pre-computed hashes for instant scanning, other highlights of the upgrade include:

  • Automated Threat Hunts: During an incident, users input known malware indicators, and Rubrik's Turbo Threat Hunting feature will scan an entire backup environment to find unaffected recovery points.
  • Cluster-Level Scanning: Instead of tediously selecting individual servers or backups, users can scan entire clusters with a single click, speeding up the search for clean recovery points.
  • Quick Results: In a recent internal test, Turbo Threat Hunting scanned an estimated 75,000 backups within 60 seconds, identifying the one affected server and enabling a quick path to recovery.
  • Quarantining: Automatically quarantine impacted files and backups to ensure the attacker is not re-introduced into the environment.
  • Recovery Orchestration: Mass-recovery orchestration of all backups from the most recent non-anomalylous, non-quarentined backup in just a few clicks to massively reduce the recovery time objective of the data and applications.

The upgrade is being rolled out automatically around the end of January to Enterprise Edition and cloud customers.

For more information, go to the Rubrik blog.

About the Author

David Ramel is an editor and writer at Converge 360.

Featured

  • tutors helping young students with laptops against a vibrant abstract background

    K12 Tutoring Earns ESSA Level II Validation

    Online tutoring service K12 Tutoring recently announced that it has received Level II validation underneath the Every Student Succeeds Act (ESSA). The independently validated study provides evidence of K12 Tutoring's role in creating positive student outcomes through effective academic intervention and research-based solutions.

  • elementary school boy using a laptop with a glowing digital brain above his head and circuit lines extending outward

    The Brain Drain: How Overreliance on AI May Erode Creativity and Critical Thinking

    Just as sedentary lifestyles have reshaped our physical health, our dependence on AI, algorithms, and digital tools is reshaping how we think, and the effects aren't always positive.

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation in Education

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education, from preschool through higher education.

  • a cloud, an AI chip, and a padlock interconnected by circuit-like lines

    CrowdStrike Report: Attackers Increasingly Targeting Cloud, AI Systems

    According to the 2025 Threat Hunting Report from CrowdStrike, adversaries are not just using AI to supercharge attacks — they are actively targeting the AI systems organizations deploy in production. Combined with a surge in cloud exploitation, this shift marks a significant change in the threat landscape for enterprises.