logo
#

Latest news with #RubrikZeroLabs

Derailing ransomware - today's great train robbery
Derailing ransomware - today's great train robbery

The Advertiser

time16 hours ago

  • Business
  • The Advertiser

Derailing ransomware - today's great train robbery

It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach.

80% of Indian organisations paid ransom to recover data, stop attack in 2024: Study
80% of Indian organisations paid ransom to recover data, stop attack in 2024: Study

Time of India

time23-04-2025

  • Business
  • Time of India

80% of Indian organisations paid ransom to recover data, stop attack in 2024: Study

NEW DELHI: In 2024, 80% of the Indian organisations that experienced a ransomware attack paid a ransom to recover their data or to stop the attack, according to the latest findings of a survey by Wakefield Research, which Rubrik Zero Labs commissioned. Significantly, 52% of Indian organisations paid a ransom due to data extortion threats while 44% reported that cyber attacks successfully affected their backup and recovery options, as per the findings. Given the ever-present threat of cyberattacks, the survey found that 65% of organisations in India store their sensitive data in up to three environments (including on-premises, cloud, or software-as-a-service or SaaS), but 38% of the respondents stated that one of their biggest challenges is securing their sensitive data across multiple environments. As a consequence of these attacks, 29% of the respondents reported financial losses, while 31% suffered from reputational damage and loss of customer confidence, and 36% experienced a forced leadership change following a cyber incident. 'Many organisations that move to the cloud assume their providers will handle security,' said Joe Hladik, head of Rubrik Zero Labs. 'The persistence of ransomware attacks, coupled with the exploitation of hybrid cloud vulnerabilities, shows that threat actors are always one step ahead.' Hladik added that companies must take action and protect their most valuable data before 'it's too late'. The findings are based on a survey of over 1,600 IT and security leaders across 10 countries, including the US, the UK, France, Germany, Italy, Netherlands, Japan, Australia, Singapore and India. From India, 125 IT respondents participated in the survey. 'The latest RZL (Rubrik Zero Labs) report serves as a wake-up call for Indian IT leaders, this highlights the urgent need for data resilience and security in today's complex hybrid environments—where data is increasingly spread across on-premises infrastructure, public clouds, and SaaS platforms,' said Ashish Gupta, managing director (India) & head of engineering, Rubrik.

Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year
Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year

Scoop

time23-04-2025

  • Business
  • Scoop

Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year

Press Release – Rubrik Data sprawl drives spike in cyber incidents across AI, cloud, SaaS, and on-premise environments, according to Rubrik Zero Labs Report Sydney, April 23, 2025 – New research from Rubrik Zero Labs finds that organizations are facing a wave of cyberattacks, with 90 per cent of IT and security leaders reporting cyberattacks in the past year. The report, ' The State of Data Security in 2025: A Distributed Crisis,' reveals the hazards that hybrid environments are creating, leading to a cloud security crisis that organisations are unprepared to address. 'Many organisations that move to the cloud assume their providers will handle security,' said Joe Hladik, Head of Rubrik Zero Labs. 'The persistence of ransomware attacks, coupled with the exploitation of hybrid cloud vulnerabilities, shows that threat actors are always one step ahead. Companies must take action and adopt an attacker's mindset by identifying – and protecting – the most valuable data before it's too late. The need for a data-centric security strategy that prioritises visibility, control, and quick recovery has never been more urgent.' The Frequency and Impact of Cyberattacks Accelerate Cyberattacks are a constant threat: Nearly one fifth of organisations globally experienced more than 25 cyberattacks in 2024 alone, according to IT and security leaders – an average of at least one breach every other week. The most common attack vectors cited were data breaches (30 per cent), malware on devices (29 per cent), cloud or SaaS breaches (28 per cent), phishing (28 per cent), and insider threats (28 per cent). Consequences of these attacks include: 40 per cent of respondents reported increased security costs. 37 per cent noted reputational damage and loss of customer confidence. 33 per cent experienced a forced leadership change following a cyber incident. AI, Cloud Adoption and Greater Data Complexity Create New Challenges Protecting sensitive data across multiple systems has become increasingly nuanced as the widespread adoption of AI has significantly exacerbated the challenge of data sprawl. An overwhelming 90 per cent of IT and security leaders report managing hybrid cloud environments, and half of IT leaders say the majority of their workloads are now cloud-based. As a result, ' The State of Data Security in 2025: A Distributed Crisis ' found: 35 per cent of respondents cite securing data across these varied ecosystems as their top challenge, followed by a lack of centralised management (30 per cent), and a lack of visibility and control over cloud-based data (29 per cent). 36 per cent of sensitive files in the cloud are classified as high risk and are largely composed of Personally Identifiable Information (PII), such as Social Security numbers and phone numbers; followed by digital data and business data, such as intellectual property and source code. (Rubrik telemetry data) Ransomware and Identity Threats Evolve in Tandem Ransomware remains a persistent and evolving threat: Of the organisations that experienced a successful ransomware attack last year, 86 per cent admitted they paid a ransom to recover their data. Nearly three-quarters (74 per cent) said threat actors were able to partially compromise backup and recovery systems, while 35 per cent said their systems were completely compromised. Identity threats are intensifying, fueled by the complexity of today's hybrid environments: With 92 per cent of organisations using between two and five cloud and SaaS platforms, attackers are exploiting weak points in identity and access management to move laterally and escalate ransomware attacks. Insider threats – often driven by compromised credentials – were cited by 28 per cent of IT leaders, underscoring the growing difficulty of maintaining strong access controls across distributed systems. Rubrik telemetry reveals that 27 per cent of high-risk sensitive files contain digital data such as API keys, usernames, and account numbers – exactly the kind of information threat actors seek to hijack identities and infiltrate critical systems. To read the full report, visit For more information, register for the webinar, Notions Behind the Numbers: Viewpoints on Rubrik Zero Labs Latest Report, taking place May 14, 2025 at 9 a.m. PT. Methodology 'The State of Data Security in 2025: A Distributed Crisis' is based on insights from over 1,600 IT and security leaders across 10 countries (half of whom were CIOs or CISOs), conducted in partnership with Wakefield. The findings are amplified by Rubrik telemetry data, including an analysis of 5.8 billion total files across cloud and SaaS environments, with over 175 million sensitive files classified across customer environments. Data covers the period from January 1, 2024, through December 31, 2024. About Rubrik Rubrik (NYSE: RBRK) is on a mission to secure the world's data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year
Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year

Scoop

time22-04-2025

  • Business
  • Scoop

Rubrik Reveals 90 Per Cent Of Global IT And Security Executives Report Cyberattacks In The Past Year

Sydney, April 23, 2025 – New research from Rubrik Zero Labs finds that organizations are facing a wave of cyberattacks, with 90 per cent of IT and security leaders reporting cyberattacks in the past year. The report, ' The State of Data Security in 2025: A Distributed Crisis,' reveals the hazards that hybrid environments are creating, leading to a cloud security crisis that organisations are unprepared to address. 'Many organisations that move to the cloud assume their providers will handle security,' said Joe Hladik, Head of Rubrik Zero Labs. 'The persistence of ransomware attacks, coupled with the exploitation of hybrid cloud vulnerabilities, shows that threat actors are always one step ahead. Companies must take action and adopt an attacker's mindset by identifying – and protecting – the most valuable data before it's too late. The need for a data-centric security strategy that prioritises visibility, control, and quick recovery has never been more urgent.' The Frequency and Impact of Cyberattacks Accelerate Cyberattacks are a constant threat: Nearly one fifth of organisations globally experienced more than 25 cyberattacks in 2024 alone, according to IT and security leaders – an average of at least one breach every other week. The most common attack vectors cited were data breaches (30 per cent), malware on devices (29 per cent), cloud or SaaS breaches (28 per cent), phishing (28 per cent), and insider threats (28 per cent). Consequences of these attacks include: 40 per cent of respondents reported increased security costs. 37 per cent noted reputational damage and loss of customer confidence. 33 per cent experienced a forced leadership change following a cyber incident. AI, Cloud Adoption and Greater Data Complexity Create New Challenges Protecting sensitive data across multiple systems has become increasingly nuanced as the widespread adoption of AI has significantly exacerbated the challenge of data sprawl. An overwhelming 90 per cent of IT and security leaders report managing hybrid cloud environments, and half of IT leaders say the majority of their workloads are now cloud-based. As a result, ' The State of Data Security in 2025: A Distributed Crisis ' found: 35 per cent of respondents cite securing data across these varied ecosystems as their top challenge, followed by a lack of centralised management (30 per cent), and a lack of visibility and control over cloud-based data (29 per cent). 36 per cent of sensitive files in the cloud are classified as high risk and are largely composed of Personally Identifiable Information (PII), such as Social Security numbers and phone numbers; followed by digital data and business data, such as intellectual property and source code. (Rubrik telemetry data) Ransomware and Identity Threats Evolve in Tandem Ransomware remains a persistent and evolving threat: Of the organisations that experienced a successful ransomware attack last year, 86 per cent admitted they paid a ransom to recover their data. Nearly three-quarters (74 per cent) said threat actors were able to partially compromise backup and recovery systems, while 35 per cent said their systems were completely compromised. Identity threats are intensifying, fueled by the complexity of today's hybrid environments: With 92 per cent of organisations using between two and five cloud and SaaS platforms, attackers are exploiting weak points in identity and access management to move laterally and escalate ransomware attacks. Insider threats – often driven by compromised credentials – were cited by 28 per cent of IT leaders, underscoring the growing difficulty of maintaining strong access controls across distributed systems. Rubrik telemetry reveals that 27 per cent of high-risk sensitive files contain digital data such as API keys, usernames, and account numbers – exactly the kind of information threat actors seek to hijack identities and infiltrate critical systems. To read the full report, visit For more information, register for the webinar, Notions Behind the Numbers: Viewpoints on Rubrik Zero Labs Latest Report, taking place May 14, 2025 at 9 a.m. PT. Methodology 'The State of Data Security in 2025: A Distributed Crisis' is based on insights from over 1,600 IT and security leaders across 10 countries (half of whom were CIOs or CISOs), conducted in partnership with Wakefield. The findings are amplified by Rubrik telemetry data, including an analysis of 5.8 billion total files across cloud and SaaS environments, with over 175 million sensitive files classified across customer environments. Data covers the period from January 1, 2024, through December 31, 2024. About Rubrik Rubrik (NYSE: RBRK) is on a mission to secure the world's data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Rubrik's new capabilities set to transform cyber resilience across cloud, Hypervisor and SaaS platforms
Rubrik's new capabilities set to transform cyber resilience across cloud, Hypervisor and SaaS platforms

Zawya

time05-03-2025

  • Business
  • Zawya

Rubrik's new capabilities set to transform cyber resilience across cloud, Hypervisor and SaaS platforms

New Identity Recovery for Active Directory and Entra ID addressing the key vulnerability to business operational recovery. Powerful new cyber resilience capabilities for faster operational recovery from cyber incidents, including machine-learning detection, orchestrated recovery, and Turbo Threat Hunting Dubai - UAE – In its ongoing commitment to deliver comprehensive cyber resiliency, Rubrik (NYSE: RBRK) today announced significant innovations designed to enhance protection for cloud, SaaS, and on-premises environments. The innovations aim to provide customers with even more ability to anticipate breaches, detect potential threats, and recover with speed and efficiency no matter where their data lives. These new capabilities will be on display during the company's annual Cyber Resilience Summit on March 5. Find out more at Rubrik's Cyber Resilience Summit on March 5th. Register now. 'Cyber criminals won't stop innovating, and neither will we. Our utmost priority is the security, safety, and appropriate accessibility of our customer's data, regardless of where the data lives,' said Arvind Nithrakashyap, Chief Technology Officer and Co-Founder of Rubrik. 'We are seamlessly integrating new technologies across the world's major cloud platforms, SaaS offerings, and on-premises so our customers can better detect compromised data, enhance the speed of identifying affected data, and accelerate the discovery of clean entry points.' Cloud and Platform Support For Where Critical Business Operations Live, from DevOps to Production Expanding cloud adoption and recent hypervisor industry consolidation are driving broad re-platforming of business-critical operations. Rubrik is meeting customers at their platform of choice, delivering unified management, advanced cyber resilience capabilities, and enhanced visibility across more cloud, SaaS, and enterprise apps. Cloud Posture Risk Management (CPR): CPR addresses the lack of data visibility by automatically discovering and inventorying cloud data assets and identifying unprotected or sensitive data. CPR helps organizations make informed backup decisions and strengthen their overall backup posture by protecting only what truly matters, reducing risk and unnecessary costs. Oracle Cloud Protection: Rubrik Security Cloud (RSC) is planned to support data protection for Oracle Cloud Infrastructure (OCI) —beginning with Oracle Cloud VMWare (OCVS) workloads and self-managed Oracle DB workloads operating OCI VMs. The solution is designed to enable customers to safeguard their cloud-based environments with the same robust, unified backup and recovery capabilities they rely on for other cloud and on-premises data. Expanding Data Protection to PostgreSQL: Rubrik recognizes the critical importance of fortifying data defenses across all platforms. According to a recent Rubrik Zero Labs report, attackers are targeting backups in 96% of cyberattacks. By extending coverage to PostgreSQL, Rubrik ensures that one of the world's most popular open-source databases thrives in the face of evolving digital threats. The comprehensive data security solution provides organizations with the assurance of maintaining data backup, availability, and recoverability. Red Hat OpenShift Virtualization Data Protection: Sixty-percent of enterprises have adopted Kubernetes, emphasizing the critical need for cyber resilience solutions for their critical workloads. Rubrik's new OpenShift support marks a significant step in securing these environments with comprehensive, automated, and immutable backups that deliver fast recovery from cyber incidents. Businesses have the flexibility to choose virtualization platforms for critical business processes without compromising manageability or cyber resilience. Azure DevOps and GitHub Backup: For organizations using continuous integration and continuous development to accelerate innovation, Rubrik now protects Azure DevOps and GitHub with cyber resilient automated backups, granular recovery, extended retention, and robust compliance coverage for critical data stores. Rubrik Cloud Vault (RCV) for Amazon Web Services, Inc. (AWS): RCV reduces the complexity and cost of managing a highly secure off-site archival location, with flexible policies and/or regions. RCV features immutable, isolated, logically air-gapped off-site backups combined with role-based access controls, advanced encryption, and retention locks to provide unparalleled confidence in data recovery. Security and Resilience for Microsoft Dynamics 365: Rubrik's enhanced protection for Microsoft Dynamics 365 aims to ensure businesses can secure their critical operational and customer data within a unified platform. Sandbox Seeding for Salesforce: An intuitive user experience designed to allow users to select objects and records depending on specific criteria. This process aims to prevent seeding errors by thoroughly analyzing data selection size versus destination size availability before moving data to the sandbox environment. The goal of this solution, planned for 2025, is to save queries for future repetitive use, further expediting the sandbox seeding process. Rubrik Introduces Identity Recovery to Strengthen Cyber Resilience Identity is one of the most critical vulnerabilities today with the majority of cyberattacks involving compromised credentials and fifty percent of businesses having experienced an Active Directory attack in the last two years. Without resilient identity services, organizations risk operational paralysis following a cyber incident. With the introduction of Identity Recovery, Rubrik delivers the industry's most comprehensive, automated, and secure solution for protecting hybrid identity environments across Entra ID and Active Directory (AD). Identity Recovery includes orchestrated Active Directory Forest Recovery to rapidly and cleanly restore entire identity environments - eliminating manual complexity and reducing downtime. With Rubrik Identity Recovery, organizations can ensure fast, clean recovery of AD and Entra ID without reintroducing malware or misconfigurations, helping maintain business continuity and strengthen cyber resilience in the face of growing identity-based threats. More Advanced Cyber Resilience Capabilities for Faster and More Comprehensive Recovery of Business Operations Rubrik continues to position its customers ahead of the curve for cyber resilience by delivering market-defining capabilities to help customers detect, mitigate and recover from cyber threats faster. The goal is to keep businesses running by minimizing operational disruptions. Advanced Security Features for Azure & Amazon Web Services, Inc. (AWS): Leveraging advanced machine learning and automation, new capabilities available today include Anomaly Detection, Data Discovery and Classification, and soon, Threat Hunting and Threat Monitoring. These capabilities are designed to work together to proactively detect and mitigate cyber threats, accelerate recovery, and ensure sensitive data remains protected and compliant. Orchestrated Recovery for Azure VM: Rubrik is planning to extend its Orchestrated Recovery capabilities to the cloud beginning with Azure VM. By enabling customers to automate recovery sequences, schedule regular test recoveries, and generate comprehensive recovery reports, the solution is designed to reduce complexity and minimize the potential for human error. Turbo Threat Hunting: Unlike traditional methods that scan one object at a time or require navigating multiple panes of glass, Turbo Threat Hunting scans at scale by leveraging pre-computed hashes stored within Rubrik's metadata. This eliminates the need for file-by-file scanning, allowing organizations to rapidly pinpoint the exact recovery points free from malware or other threats within seconds — even in the most complex data environments. Internal testing found Turbo Threat Hunting scans 75,000 backups in less than 60 seconds. Enterprise Edition for Microsoft 365: Delivering enterprise-grade security and resilience for Microsoft 365, Rubrik expands its capabilities for organizations to rapidly detect, respond to, and recover from attacks. New capabilities available for Microsoft 365 include Sensitive Data Discovery, which identifies and protects high-risk data before an attack happens, and Prioritized Recovery, which restores critical data first for fast operational recovery. Coming soon, Rubrik's customers using Enterprise Edition for Microsoft 365 will also be able to add Anomaly Detection, Threat Monitoring, Threat Hunting, and Self-Service Recovery capabilities. About Rubrik Rubrik (NYSE: RBRK) is on a mission to secure the world's data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked. For more information please visit and follow @rubrikInc on X (formerly Twitter) and Rubrik on LinkedIn.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store