Intro to Rubrik Security Cloud
  • Welcome to Rubrik Explore!
  • Rubrik Security Cloud
  • Lab Environment
  • RSC User Interface
    • Navigation
      • Help Center
      • RSC Settings
      • App Tray
      • Global Search
    • Data Protection Dashboard
    • Summary: RSC User Interface
  • Zero Trust Data Security
    • Role-based Access Control (RBAC)
      • RBAC: Creating a New Role
      • RBAC: Applying a Role to a User
    • Multi-factor Authentication (MFA)
      • MFA: Getting Started
    • Summary: Zero Trust Data Security
  • Global SLA Domain Policy
    • Create a Global SLA Domain
    • Apply a Global SLA Domain
    • Summary: Global SLA Domain Policy
  • Conclusion
Powered by GitBook
On this page
  • Introduction
  • What you will learn

Rubrik Security Cloud

Secure your data, wherever it lives, across enterprise, cloud, and SaaS – making your business unstoppable.

PreviousWelcome to Rubrik Explore!NextLab Environment

Last updated 1 year ago

Introduction

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud (RSC), powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. Our platform automates policy management of data and enforcement of data security through the entire data lifecycle. We help organizations uphold data integrity, deliver data availability, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

From an operational perspective, Rubrik is designed upon four pillars:

  1. Data Protection: Preserve data integrity and keep data readily accessible to withstand cyberattacks, malicious insiders, and operational disruptions

  2. Data Threat Analytics: Reduce your data risks by continuously monitoring for emergent cyber threats proactive and passive threats such as IOCs and ransomware.

  3. Data Security Posture: Reduce your data risks by continuously monitoring for sensitive data exposure and user access.

  4. Cyber Recovery: Surgically and rapidly restore your impacted apps, files, or objects by containing threats and orchestrating recoveries while avoiding malware reinfection

Each of the four pillars is delivered through the unified architecture of RSC. By connecting to physical and virtual Rubrik clusters, public cloud services, and SaaS services, RSC provides a centralized control plane and a single interface where an administrator can protect, detect, and recover data.

What you will learn

In this hands-on lab, we will explore the foundational topics of RSC, including:

  • RSC User Interface

    • Navigation

    • Data Protection Dashboard

  • Zero Trust Data Security

    • Role-based Access Control (RBAC)

    • Multi-factor Authentication (MFA)

  • Global SLA Domain Policy

    • Create a Global SLA Domain

    • Apply a Global SLA Domain

Let's take a look at the details of the lab environment and get started!

Rubrik Security Cloud