IMMUTABLE OBJECT LOCKING FOR SNAPSHOT MANAGEMENT

    公开(公告)号:US20240202162A1

    公开(公告)日:2024-06-20

    申请号:US18081673

    申请日:2022-12-14

    Applicant: Rubrik, Inc.

    CPC classification number: G06F16/128 G06F11/1448 G06F2201/84

    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may receive an indication of a storage configuration for an object storage location within a cloud environment. The DMS may generate a snapshot of a computing system in accordance with a backup policy associated with the computing system. The DMS may cause one or more data objects corresponding to the snapshot to be stored in the object storage location within the cloud environment in accordance with the storage configuration. The DMS may apply immutable object locks to the one or more data objects within the object storage location. The DMS may execute, in accordance with the backup policy associated with the computing system, one or more jobs that cause the respective immutable object locks for the one or more data objects to be extended one or more times during a retention period for the snapshot.

    EFFICIENT VULNERABILITY ANALYSIS OVER BACKUPS

    公开(公告)号:US20230376605A1

    公开(公告)日:2023-11-23

    申请号:US17748834

    申请日:2022-05-19

    Applicant: Rubrik, Inc.

    CPC classification number: G06F21/577 G06F2221/033

    Abstract: A storage appliance or system may support backup and recovery for virtual machines that support various applications. The storage appliance or system may process a backup snapshot of the virtual machine to identify security vulnerabilities in the virtual machine. The storage appliance may generate an index of software packages installed on the virtual machine and software versions of the software packages. The index of software packages may be compared to a list of security vulnerabilities to identify the security vulnerability at the virtual machine. A notification may be triggered, and the notification may indicate a result of comparing the index of software packages and the software versions to the list of vulnerabilities. In some examples, a set of network configurations implemented by the virtual machines may be determined by processing the backup snapshot and used to identify security vulnerabilities.

Patent Agency Ranking