AUTOMATED DEVELOPMENT OF RECOVERY PLANS
    11.
    发明申请

    公开(公告)号:US20190266058A1

    公开(公告)日:2019-08-29

    申请号:US16287087

    申请日:2019-02-27

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: An automated system monitors network traffic to determine dependencies between different machines. These dependencies can be used to automatically develop a recovery plan for the machines, for example restoring servers in a certain order. This approach can also automatically adjust the recovery plan for changes in system configuration, for example as different servers come online or are taken offline or change their roles.

    INTELLIGENT SCHEDULING OF BACKUPS
    12.
    发明申请

    公开(公告)号:US20190266056A1

    公开(公告)日:2019-08-29

    申请号:US16287130

    申请日:2019-02-27

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: Normal virtual machine operation is observed to automatically determine patterns of resource utilization. Backup activities are then scheduled, taking into account these utilization patterns. For example, if a normally scheduled backup would occur during a busy period, it may be rescheduled to a less busy period. As another example, backups made by made opportunistically during less busy periods even if not required by the normal backup schedule, in order to alleviate backup demands during more busy periods.

    Facilitating analysis of software vulnerabilities

    公开(公告)号:US11599643B2

    公开(公告)日:2023-03-07

    申请号:US16668910

    申请日:2019-10-30

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: Systems and methods for facilitating an analysis of software vulnerabilities are described. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The system receives a first request to present software vulnerabilities of a virtual machine on a production machine. The first request includes a first selection including a virtual machine identifier identifying the virtual machine on the production machine. The software vulnerabilities include a first software vulnerability. The system presents a first electronic user interface including software vulnerabilities for the virtual machine. The system receives a second request including a second selection identifying a first software vulnerability. The system presents a second electronic user interface including presenting recovery point identifiers corresponding to snapshot images stored on a database. The snapshot images being of the production machine and including the virtual machine and the first software vulnerability.

    Database recovery time objective optimization with synthetic snapshots

    公开(公告)号:US11561999B2

    公开(公告)日:2023-01-24

    申请号:US16264628

    申请日:2019-01-31

    Applicant: RUBRIK, INC.

    Abstract: Methods and systems for reducing the amount of time to restore a database or other application by dynamically generating and storing synthetic snapshots are described. When backing up a database, an integrated data management and storage system may acquire snapshots of the database at a snapshot frequency and acquire database transaction logs at a frequency that is greater than the snapshot frequency. In response to detecting that the database is unable to provide a database snapshot, the integrated data management and storage system may generate a synthetic snapshot of the database by instantiating a compatible version of the database locally, acquiring a previously stored snapshot of the database, applying data changes from one or more database transaction logs to the previously stored snapshot to generate the synthetic snapshot, and storing the synthetic snapshot of the database within the integrated data management and storage system.

    ANOMALY AND RANSOMWARE DETECTION
    18.
    发明申请

    公开(公告)号:US20210042411A1

    公开(公告)日:2021-02-11

    申请号:US16534486

    申请日:2019-08-07

    Applicant: Rubrik, Inc.

    Abstract: Some examples relate generally to computer architecture software for information security and, in some more particular aspects, to machine learning based on changes in snapshot metadata for anomaly and ransomware detection in a file system.

    DATABASE RECOVERY TIME OBJECTIVE OPTIMIZATION WITH SYNTHETIC SNAPSHOTS

    公开(公告)号:US20200250046A1

    公开(公告)日:2020-08-06

    申请号:US16264628

    申请日:2019-01-31

    Applicant: RUBRIK, INC.

    Abstract: Methods and systems for reducing the amount of time to restore a database or other application by dynamically generating and storing synthetic snapshots are described. When backing up a database, an integrated data management and storage system may acquire snapshots of the database at a snapshot frequency and acquire database transaction logs at a frequency that is greater than the snapshot frequency. In response to detecting that the database is unable to provide a database snapshot, the integrated data management and storage system may generate a synthetic snapshot of the database by instantiating a compatible version of the database locally, acquiring a previously stored snapshot of the database, applying data changes from one or more database transaction logs to the previously stored snapshot to generate the synthetic snapshot, and storing the synthetic snapshot of the database within the integrated data management and storage system.

    RANSOMWARE INFECTION DETECTION IN FILESYSTEMS

    公开(公告)号:US20200034537A1

    公开(公告)日:2020-01-30

    申请号:US16049574

    申请日:2018-07-30

    Applicant: Rubrik, Inc.

    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.

Patent Agency Ranking