6. Prevention
• Firewall
• IAM
• CASB
• Email Security
Detection
• XDR
• Intrusion Detection
• Endpoint Security
Investigation
• Digital Forensics
• SIEM
• SOAR
6
Businesses are Under Attack
Data
Enterprise Cloud SaaS
Infrastructure Security
7. Why are organizations stuck paying ransoms?
Ransomware locks down data
PAY RANSOM
Can Risks Be
Identified and
Investigated?
Option 1: Pay ransom
Can We Recover
Quickly?
Engage
SecOps
Is Data
Resilient?
Engage
IT Ops
Option 2: Attempt to recover
7
8. Prevention
It's Time For A New Approach
+
Infrastructure Security
Detection Investigation
Data Security
Data Resilience Data Observability Data Recovery
Zero Trust Security
8
10. 10
Is My Data Truly Secure?
Is my backup data immune
from malicious encryption?
Can bad actors snoop
or steal my data?
Can anyone manipulate
my backups?
Can attackers find my backups?
Are admin accounts safe from
compromise?
11. Our Approach
11
Enterprise Data
Protection
M365 Protection
Cloud Data
Protection
Safeguard your data so it can always be available for
recovery
• Immutable from the first copy
• Append Only File System
• Logical Air Gap – No Open Protocols
• Encryption Everywhere
• Zero Trust by Design (MFA)
• Retention Locks and Two-Person Integrity
Data Resilience
Rubrik Data
Production
Major attack is now
a recoverable event
Logical airgap
Production
13. 13
Can I Monitor Data to Find the Biggest Risks?
Was sensitive data
affected by an attack?
Are there indicators of
compromise?
Has there been unusual activity
and what kinds?
What files and applications were
affected in an attack?
14. 14
Sensitive Data
Discovery
Threat Hunting
Ransomware
Investigation
Monitor data risks continuously and remediate threats
quick
• High Fidelity ML Model using Data Time-Series
• Full data view User/App/Content over time
• Anomaly and encryption detection vs baseline
• Data Insights integrate into your SecOps tools
Data Observability
Our Approach
16. 16
How Easy is it to Recover?
How quickly can I recover after a massive attack?
How do I get my most critical
apps back immediately?
How can I test that
everything works?
How do I know if malware is
hiding, and can I isolate it?
How do I plan for recovering
an entire site?
17. 17
Threat Containment
Mass Recovery
Quarantine malware and automate recovery
so business operations can be restored quickly
• In-Place Recovery-of only changes
• Instant Recovery / Live Mount gracefully migrates back to
production storage
• Automated Orchestrated recovery of VMs (War Time for sub
10 min recovery)
• Peace time isolated recovery testing for proactive testing
• Surgical Recovery Malware Free “Last Known Good Copy”
Data Recovery
Our Approach
Orchestrated App
Recovery
18. 18
Threat Containment
Mass Recovery
Orchestrated App
Recovery
Sensitive Data Discovery
Threat Hunting
Ransomware Investigation
M365 Protection
Cloud Data Protection
Enterprise Data Protection
Data Resilience Data Observability Data Recovery
Data Security Command Center
Detection and Analysis Containment Eradication
and Recovery
Preparation
NIST Security Standards
20. 20
Your data is
defended
against cyber
threats
Cyber threats are
monitored
continuously and
analyzed quickly
Your business
operations are
recovered
within hours
Data Recovery
Data Resilience Data Observability
Zero Trust Data Security