-
公开(公告)号:US10901859B2
公开(公告)日:2021-01-26
申请号:US16287087
申请日:2019-02-27
Applicant: Rubrik, Inc.
Inventor: Di Wu
Abstract: An automated system monitors network traffic to determine dependencies between different machines. These dependencies can be used to automatically develop a recovery plan for the machines, for example restoring servers in a certain order. This approach can also automatically adjust the recovery plan for changes in system configuration, for example as different servers come online or are taken offline or change their roles.
-
公开(公告)号:US20200250305A1
公开(公告)日:2020-08-06
申请号:US16263297
申请日:2019-01-31
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
IPC: G06F21/55 , G06F16/174 , G06N20/20 , G06F16/17 , G06F9/448
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
公开(公告)号:US20190268216A1
公开(公告)日:2019-08-29
申请号:US16287167
申请日:2019-02-27
Applicant: Rubrik, Inc.
Inventor: Di Wu
Abstract: A system for validating a recovery plan for machines in a compute infrastructure is provided. In some examples, a system includes processors and a memory storing instructions that, when executed by at least one processor among the processors, cause the system to perform certain operations. The operations may include collecting statistics on network connections between machines in the compute infrastructure, based on the collected statistics, determining dependencies between the machines in the compute infrastructure, and identifying inconsistencies between the dependencies and an order of recovery for the machines specified in an existing recovery plan for the machines.
-
公开(公告)号:US12143407B2
公开(公告)日:2024-11-12
申请号:US16534479
申请日:2019-08-07
Applicant: Rubrik, Inc.
Inventor: Oscar Annen , Di Wu , Ajay Saini
Abstract: Some examples relate generally to computer architecture software for information security and, in some more particular aspects, to machine learning based on changes in snapshot metadata for anomaly and ransomware detection in a file system.
-
公开(公告)号:US20240061930A1
公开(公告)日:2024-02-22
申请号:US18497474
申请日:2023-10-30
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
IPC: G06F21/55 , G06F9/448 , G06F16/17 , G06F16/174 , G06F21/56
CPC classification number: G06F21/552 , G06F9/4498 , G06F16/1734 , G06F16/1748 , G06F21/56
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
公开(公告)号:US11709932B2
公开(公告)日:2023-07-25
申请号:US16263297
申请日:2019-01-31
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
IPC: G06F21/55 , G06F16/174 , G06F9/448 , G06F16/17 , G06N20/20
CPC classification number: G06F21/552 , G06F9/4498 , G06F16/1734 , G06F16/1748 , G06N20/20
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
公开(公告)号:US20230153322A1
公开(公告)日:2023-05-18
申请号:US18151401
申请日:2023-01-06
Applicant: Rubrik, Inc.
Inventor: Christopher Wong , Joshua Duncan Hight , Biswaroop Palit , Di Wu
IPC: G06F16/27
CPC classification number: G06F16/27 , G06F11/1451
Abstract: Methods and systems for reducing the amount of time to restore a database or other application by dynamically generating and storing synthetic snapshots are described. When backing up a database, an integrated data management and storage system may acquire snapshots of the database at a snapshot frequency and acquire database transaction logs at a frequency that is greater than the snapshot frequency. In response to detecting that the database is unable to provide a database snapshot, the integrated data management and storage system may generate a synthetic snapshot of the database by instantiating a compatible version of the database locally, acquiring a previously stored snapshot of the database, applying data changes from one or more database transaction logs to the previously stored snapshot to generate the synthetic snapshot, and storing the synthetic snapshot of the database within the integrated data management and storage system.
-
公开(公告)号:US20230078496A1
公开(公告)日:2023-03-16
申请号:US18055251
申请日:2022-11-14
Applicant: Rubrik, Inc.
Inventor: Di Wu , Chenyang Zhou , Shanthi Kiran Pendyala
Abstract: Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.
-
公开(公告)号:US11526371B2
公开(公告)日:2022-12-13
申请号:US16527377
申请日:2019-07-31
Applicant: Rubrik, Inc.
Inventor: Di Wu , Chenyang Zhou , Shanthi Kiran Pendyala
Abstract: Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.
-
公开(公告)号:US20220222236A1
公开(公告)日:2022-07-14
申请号:US17705836
申请日:2022-03-28
Applicant: Rubrik, Inc.
Inventor: Di Wu , Matthew E. Noe , Biswaroop Palit
IPC: G06F16/22 , G06F16/2457
Abstract: Described herein is a system that processes personal data in databases. The system samples data stored in columns of data tables and analyzes the sampled data to determine whether the sampled data includes personal data. Based on the analysis, the system marks which data tables and which columns of the data tables store personal data. The system receives a request to process personal data for a subject. From data tables that are marked as storing personal data, the system identifies records storing personal data for the subject. The system additionally identifies other data tables marked as storing personal data that reference or are referenced by the data tables including the records referencing the subject. The system processes the data stored in the columns that are marked as storing personal data.
-
-
-
-
-
-
-
-
-