Rubrik Data Protection Platform Upgrade Offers Speedier Threat Hunting

Data security specialist Rubrik is upgrading its data protection platform to offer quicker recoveries in the familiar backup & recovery process. The new Turbo Threat Hunting functionality more quickly scans an enterprise network to find clean recovery points after malware attacks, according to the company.

The new approach changes the current method that requires mounting and scanning data on a file-by-file basis to find signs of tampering, instead leveraging other techniques — including pre-computed hash values within Rubrik's metadata — that significantly speed up the process.

"Traditional recovery methods involve manually scanning each backup file, which can take an excruciatingly long time. Imagine having to sift through hundreds of thousands of backups to locate clean recovery points. For many organizations, that process can take days or even weeks, leaving them vulnerable to ongoing disruption and significant financial losses," the company said in a blog post. By contrast, the new tech reduces the time to find a backup that is free from Indicators of Compromise (IOCs) "from days to mere seconds."

In addition to those pre-computed hashes for instant scanning, other highlights of the upgrade include:

  • Automated Threat Hunts: During an incident, users input known malware indicators, and Rubrik's Turbo Threat Hunting feature will scan an entire backup environment to find unaffected recovery points.
  • Cluster-Level Scanning: Instead of tediously selecting individual servers or backups, users can scan entire clusters with a single click, speeding up the search for clean recovery points.
  • Quick Results: In a recent internal test, Turbo Threat Hunting scanned an estimated 75,000 backups within 60 seconds, identifying the one affected server and enabling a quick path to recovery.
  • Quarantining: Automatically quarantine impacted files and backups to ensure the attacker is not re-introduced into the environment.
  • Recovery Orchestration: Mass-recovery orchestration of all backups from the most recent non-anomalylous, non-quarentined backup in just a few clicks to massively reduce the recovery time objective of the data and applications.

The upgrade is being rolled out automatically around the end of January to Enterprise Edition and cloud customers.

For more information, go to the Rubrik blog.

About the Author

David Ramel is an editor and writer at Converge 360.

Featured

  • hand holding globe and environmental icons in front of a green background

    CoSN, SETDA, UDT Release Guidelines for Environmentally Responsible Technology Purchasing

    CoSN and SETDA, in partnership with IT and telecommunications solution provider UDT, recently released a set of Sustainability Procurement Guidelines designed to help K-12 school and district leaders, procurement officers, and technology directors make purchasing decisions that are both environmentally responsible and operationally effective.

  • businessmen shaking hands behind digital technology imagery

    Microsoft, OpenAI Restructure Partnership

    Microsoft and OpenAI have announced they are redefining their partnership as part of a major recapitalization effort aimed at preparing for the arrival of artificial general intelligence (AGI).

  • teacher typing on a computer in a classroom on the left and a smiling parent using a smartphone on the right

    4 Keys to Building Stronger School Home Connections

    K–12 leaders know that strong family engagement drives student success. It leads to better achievement, fewer behavior issues, stronger relationships between schools and families, and a more positive learning environment.

  • Digital clouds with data points and network connections

    Microsoft's Windows 365 Cloud Apps Available in Public Preview

    Microsoft has announced that its Windows 365 Cloud Apps are now available in public preview. This allows IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.