Rubrik
  • Products
  • Solutions
  • Knowledge Hub
  • About Us
  • CXO
  • Partners
  • Support
  • Contact Sales
Rubrik
LinkedInTwitterFacebookYouTubeInstagram

Call us at 1-844-478-2745

Submit Interest

ABOUT RUBRIK

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog

NEW TO RUBRIK

Why RubrikProductsSolutionsPartnersCustomersResources

POPULAR LINKS

Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog
Why RubrikProductsSolutionsPartnersCustomersResources
Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups

CompanyLeadershipInvestor RelationsNewsroom & Press ReleasesCareersBlog
Why RubrikProductsSolutionsPartnersCustomersResources
Cyber RecoveryBackup & RecoveryRansomware Recovery Cloud Disaster RecoveryCloud Database Backup and Recovery ServiceSaaS Backups
  • Cookie Policy
  • Legal
  • Privacy Policy
  • Terms of Use
  • Trust
  • CA Residents only: Do not sell or share my personal information | Do not share my sensitive information

© 2026 Rubrik – Zero Trust Data Security™

Technical Blog Hub

Test only -Rubrik 1 Apr Extends Cyber Resilience to Oracle Linux Virtualization Manager.w

Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Rubrik Community Blog1
Share
Background
Technical Blog Hub

Test only -Rubrik 1 Apr Extends Cyber Resilience to Oracle Linux Virtualization Manager.w

Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Technical Case StudyFederal GovernmentThreat Hunting & Monitoring
APR 1, 20264 min read
Rubrik Community Blog1
Share

Table of Contents

section title 1

I’ve been the Infrastructure Administrator at Mount St. Mary’s University for over 13 years, and in that time I’ve seen a lot of backup tools promise simplicity and then turn into a part‑time job to manage.

Before Rubrik, we were on a Dell backup solution that was fine on paper, but too convoluted for a small higher ed team with no dedicated FTE just for backup. It did the job, but it constantly needed care and feeding.

When we evaluated Rubrik back in 2017, what immediately clicked for me was how appliance‑like it felt. My joke at the time was: “It’s like a toaster – once it works, it works.” That sounded like a throwaway line back then. It stopped being a joke during the LA fires.

Our infrastructure is split across two campuses, each running a different hypervisor platform. For data protection, we use two Rubrik appliances, covering both our on-premises Virtual Machines (VMs) and critical Microsoft 365 workloads.

Nothing exotic, but enough complexity that DR can’t just be “we’ll figure it out on the day.” Cross‑site replication and clear runbooks became table stakes for us once we moved to this dual‑campus model.

Practitioner Tip:

Dual‑site higher ed environments tend to accumulate complexity over time – mixed hypervisors, different storage, and a growing M365 footprint. A consistent protection layer across those pieces is usually the first step toward practical DR

Introduction & The Challenge

When we began the journey to migrate our data protection infrastructure, our core goal was shifting from a reactive backup mentality to a proactive cyber resilience posture. This required consolidating 5PB of data across 12 global data centers and building an automated disaster recovery environment in the cloud.

This article covers the technical architecture we chose, focusing specifically on how the Rubrik Security Cloud (RSC) enables automated recovery and validation steps that helped reduce our Financial Database Recovery Time Objective (RTO) from 16 hours to just 2 hours.

 

1. Hybrid Architecture Overview: On-Prem to AWS

Our environment relies on a hybrid architecture, securing core business systems like VMware and Microsoft 365. The critical design decision was utilizing Rubrik appliances on-premises for fast local recovery, while integrating them tightly with the Rubrik Security Cloud (RSC) in AWS for cloud-based disaster recovery.
By leveraging RSC's cloud capabilities, we achieved two key technical wins:

  • Eliminating Third-Party DR Sites: We no longer require a separate, costly third-party DR data center for VMware workloads. The cloud acts as our DR target.
  • Unified Management: The 5PB of data across 12 global data centers is managed from a single control plane, consolidating three legacy backup tools into one.

Practitioner Tip Placeholder

This section is reserved for a short, impactful tip related to optimizing hybrid architecture, such as network latency considerations or best practices for cloud-based replication policies.

 

 

Orchestrating Cloud DR (OAR) for Sub-Hour RTOs

The biggest time saving came directly from the deployment of Orchestrated Application Recovery (OAR). OAR is essential for any high-risk application because it validates that a group of interdependent services (e.g., Application, Web, and Database servers) can fail over together in a verifiable, automated sequence. This move transformed our ability to guarantee business continuity.

The shift in mindset, as Zatarain noted, was profound: "We've gone from a backup restore solution to a complete cyber-resilient solution!"

Zero-Trust Security: Threat Hunting & Validation

In a true cyber-resilience model, restoration speed is useless if you reintroduce malware. The Enterprise Edition features we use are focused on ensuring the recovery point is clean:

  • Anomaly Detection: This continuously scans for indicators of compromise (IOCs) like mass deletions or encryption patterns. If triggered, it immediately flags the clean recovery points.
  • Threat Monitoring & Hunting: We use the built-in Mandiant feed intelligence to scan recovery snapshots for known malware signatures. This is the non-negotiable step that ensures we restore clean data and eliminate malware recurrence.
  • Sensitive Data Monitoring: For compliance purposes (GDPR, PII, Internal IP), the platform helps us monitor where regulated data resides and determine the precise magnitude of a breach for regulatory reporting.

Deep Dive Example: Ansible Code or OAR Diagram

This section is a placeholder for a technical asset (e.g., an Ansible code snippet, a detailed API call workflow, or a flowchart of the OAR process) to further illustrate the complexity of the deployment.

Automating Cyber Resilience and Next Steps

By integrating immutable backups with orchestrated recovery and automated validation, we moved our focus from simply hoping we had a backup to guaranteeing a clean, fast recovery. The resulting 87.5% reduction in RTO for our financial databases is the most visible outcome of adopting a genuine Zero Trust Data Security posture.

Key Technical Results:

By integrating immutable backups with orchestrated recovery and automated validation, we moved our focus from simply hoping we had a backup to guaranteeing a clean, fast recovery. The resulting 87.5% reduction in RTO for our financial databases is the most visible outcome of adopting a genuine Zero Trust Data Security posture.

METRICBEFORE RUBRIKAFTER OAR IMPLEMENTATION
Financial DB Recovery Time (RTO)16 Hours2 Hours
Protected Data FootprintDisparate, Not Unified5 PB across 12 global data centers
TesttableBEFORE RUBRIKAFTER OAR IMPLEMENTATION
Financial DB Recovery Time (RTO)16 Hours2 Hours
Protected Data FootprintDisparate, Not Unified5 PB across 12 global data centers

 

 

Contributed by

Ravi Ramaraj
Test Ravi2

CIO, Microsoft

Test 2- Stage bio tech blog details page .. Technicak Blog Detail Info ...
Ravi Ramaraj
Test Ravi

CIO, Microsoft

Test bio tech blog details page
Yew Jin Kang
Test Yew2

CTO, PLUS Malaysia

test yew Author Bio for Blog Detail page dummy text
Ranjit Nair | Staff Product Manager
Ranjit Nair

Chief Director, Information Technology, Rubrik

test123
Nikita Bhuma
Nikita Bhuma

Chief Strategy Officer, Operational Services

Nikita Bhuma is a Customer Advocacy Specialist at Rubrik with over a decade of experience across IT, networking, cybersecurity, and enterprise software industries. She leads the Reference Concierge program, amplifying customer voices through technical storytelling that highlights real practitioner insights and measurable outcomes.
Frederic Lhoest
Frederic Lhoest

CIO, Health Systems, CrowdStrike

Frederic is an automation expert and veteran architect with over 25 years of experience in streamlining data center operations and seamless workflows. He is a VMware and Nutanix AHV expert, with a proven track record of turning complex operational obstacles into efficient, automated systems. Beyond his technical role, he is a prominent speaker and leader in the Rubrik practitioner community, dedicated to fostering collaborative environments where real-world challenges meet innovative solutions.

Related Blogs

View all Posts
Identity Is the New Perimeter: Can You Actually Recover Your Active Directory?
Technical Blog
MAR 29, 2026

Identity Is the New Perimeter: Can You Actually Recover Your Active Directory?

This article addresses the critical vulnerabilities in modern identity infrastructure, specifically focusing on Active Directory (AD) and Entra ID. It breaks down the mechanics of a "Golden Ticket" attack and outlines the "Identity Resilience" run-book: containing the blast radius, identifying clean restore points, and rebuilding trusted identity planes. The post highlights how moving from manual 150-page recovery manuals to Rubrik’s automated, orchestrated blueprints can turn a catastrophic identity blackout into a manageable recovery event.

6 min read

Nikita Bhuma

Nikita Bhuma

Chief Strategy Officer

Operational Services

View all Posts

Share Your Insights

Have an interesting story or technical findings to share? Reach out to create a blog with us.

Submit InterestNext

Learning & Certifications

Access free and instructor-led training and certification paths to master Rubrik products and maximise your data security expertise.

Explore coursesNext
Background

Share Your Insights

Have an interesting story or technical findings to share? Reach out to create a blog with us.

Submit InterestNext

Learning & Certifications

Access free and instructor-led training and certification paths to master Rubrik products and maximise your data security expertise.

Explore coursesNext