
Summary
Rackspace and Rubrik have partnered to offer a new cyber recovery service for businesses. This service helps companies recover quickly from cyberattacks, minimizing downtime and ensuring business continuity. The partnership combines Rubrik’s data protection software with Rackspace’s cloud expertise.
Ensure your data remains safe and accessible with TrueNASs self-healing technology.
** Main Story**
Rackspace and Rubrik Enhance Enterprise Cyber Resilience
In today’s digital landscape, cyberattacks are a constant threat, and businesses need robust solutions to protect their data and ensure business continuity. Rackspace Technology and Rubrik have announced a strategic partnership to address this growing need, launching the Rackspace Cyber Recovery Cloud powered by Rubrik. This fully managed isolated recovery service offers a modern approach to cyber resilience, enabling businesses to recover from cyberattacks faster and more securely than traditional methods.
The Growing Need for Enhanced Cyber Resilience
The frequency and sophistication of ransomware attacks are increasing, making traditional backup and recovery solutions insufficient. Studies reveal that 92% of ransomware victims experience data encryption, and 60% suffer data theft. Legacy solutions often require weeks or months to restore business operations, resulting in significant financial losses and reputational damage. The Rackspace Cyber Recovery Cloud tackles these challenges by providing a streamlined, efficient recovery process. This is particularly crucial for regulated industries like banking, financial services, insurance, and healthcare, where continuous operations and data integrity are paramount.
Rackspace Cyber Recovery Cloud: A New Standard in Cyber Resilience
The Rackspace Cyber Recovery Cloud, powered by Rubrik, offers a fully managed, subscription-based isolated recovery environment (IRE). This solution leverages Rubrik’s advanced data protection and cyber recovery technology and combines it with Rackspace Technology’s expertise in hybrid cloud environments, 24/7 support, and a global data center footprint.
How It Works
The service enables customers to replicate validated backups to a secure, isolated environment. In the event of a cyberattack, Rubrik swiftly identifies clean backup data, while Rackspace restores critical workloads within hours to this separate recovery environment. This “air-gapped” approach ensures that backup data remains safe and untainted, even if production systems are compromised. The solution offers two options:
-
On-Demand Option: This flexible and cost-effective solution offers pre-allocated capacity, ready to activate during a cyber incident. Businesses pay a monthly subscription fee for access to the standby infrastructure and usage charges for replicated backups, with additional weekly charges if the recovery environment is activated. This eliminates the need for maintaining an always-on infrastructure while providing rapid provisioning using pre-built recovery templates.
-
Dedicated Option: Designed for regulated industries or businesses with strict recovery time and recovery point objectives (RTOs/RPOs), this option provides an always-on, physically isolated recovery infrastructure. It involves a three-year minimum commitment for dedicated resources, with a monthly fee for backup replication and additional fees during recovery events. Businesses gain full control over their cyber recovery strategy, with optional dedicated storage to meet compliance and audit demands.
Benefits of the Partnership
This strategic partnership between Rackspace and Rubrik offers several benefits to enterprises:
- Faster Recovery: The solution drastically reduces recovery time from weeks or months to mere hours, minimizing downtime and its associated costs.
- Enhanced Security: The isolated recovery environment ensures that backups are protected from cyberattacks, guaranteeing data integrity.
- Simplified Management: The fully managed service frees up internal IT resources, allowing them to focus on other critical tasks.
- Proactive Threat Management: The service incorporates proactive measures to identify and mitigate threats, reducing the risk of successful attacks.
Implementing the Solution
Rackspace recommends a phased approach to implementing the Cyber Recovery Cloud. First, a Cyber Recovery Readiness Assessment helps identify critical applications, map dependencies, and prioritize workloads based on business impact. Then, the Cyber Recovery Cloud Onboarding service provides hands-on configuration and validation of the IRE solution, including developing recovery templates, executing test recovery scenarios, and delivering a finalized business continuity plan.
The Rackspace and Rubrik partnership is a significant development in the cyber resilience landscape, offering businesses a comprehensive and efficient way to protect themselves from evolving cyber threats. As ransomware attacks become more sophisticated, solutions like the Rackspace Cyber Recovery Cloud are essential for ensuring business continuity and maintaining a strong security posture.
Given the On-Demand option’s cost-effectiveness, what are the key considerations for businesses to accurately forecast their potential usage charges for replicated backups and activated recovery environments during a cyber incident?
That’s a great point! Accurately forecasting usage charges for the On-Demand option is crucial. Key considerations should include regularly assessing data volume growth, understanding the potential scope of a cyber incident, and factoring in the frequency of recovery environment testing. A pilot project or simulation can help establish a baseline for potential costs.
Editor: StorageTech.News
Thank you to our Sponsor Esdebe
The “air-gapped” approach offers a compelling security advantage. How do you see this solution integrating with existing security frameworks and incident response plans within organizations, particularly concerning automation and orchestration of recovery processes?
That’s a great question! The “air-gapped” environment allows organizations to integrate with existing incident response plans by providing a clean, isolated space for restoration. Automation and orchestration tools can be configured to replicate and validate data within this environment, streamlining the recovery process without compromising existing security frameworks. This ensures a coordinated and efficient response to cyber incidents.
Editor: StorageTech.News
Thank you to our Sponsor Esdebe
So, if I understand correctly, I can now tell my boss that downtime isn’t an excuse anymore? Rackspace and Rubrik are like the dynamic duo of data security. Maybe they can lend their expertise to my personal laptop—it seems to attract viruses like a magnet!
You got it! Downtime is definitely less excusable now with robust solutions like these. Rackspace and Rubrik working together bring a powerful defense against disruptions. I hear you on the personal laptop woes, though – maybe a scaled-down version for home use is in order!
Editor: StorageTech.News
Thank you to our Sponsor Esdebe
Considering the benefits of faster recovery, how does this solution handle the complexities of restoring applications with dependencies across different environments (cloud, on-premise)?
That’s an important consideration! The Rackspace Cyber Recovery Cloud addresses cross-environment dependencies through careful planning during the initial Cyber Recovery Readiness Assessment. This assessment maps application dependencies across various environments (cloud, on-premise) to build effective recovery templates. Testing and validation ensures dependencies are properly restored during an actual event.
Editor: StorageTech.News
Thank you to our Sponsor Esdebe
So, the “air-gapped” approach makes backups safe… does this mean I can finally ditch my tinfoil hat for data protection? Asking for a friend!
Haha, love the analogy! While air-gapping provides a strong layer of security, I’d say keep the tinfoil hat handy for particularly sensitive data. Think of it as defense in depth – the more layers, the better!
Editor: StorageTech.News
Thank you to our Sponsor Esdebe
Given the “air-gapped” approach, what mechanisms are in place to ensure consistent data integrity during the replication of validated backups to the isolated recovery environment, especially concerning potential data corruption during transfer?