SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Rubrik brings power of AI to VMware customers to accelerate cyber recovery

22 Aug 2023

Rubrik brings power of AI to VMware customers to accelerate cyber recovery
Contact company
Contact Rubrik, Inc.
icon Add as a preferred source Download PDF version
Related Links
  • What missing skills among security integrators can cause problems?

Rubrik, the Zero Trust Data Security™ Company announced new generative AI capabilities for VMware customers through Rubrik AI-Powered Cyber Recovery.

Minimising data loss

Leveraging generative AI and large language models (LLMs), this new solution is designed to help administrators navigate difficult tradeoffs in the aftermath of cyberattacks to help minimise data loss and reduce downtime. 

The solution will enable backup administrators to leverage recommended task lists and guided workflows to ensure efficient data recovery and maintain cyber resilience. 

Maintaining cyber resilience

With legacy backup tools, recovery from cyberattacks often entails manual and time-consuming processes

Cyberattacks pose one of the most significant threats to organisations’ virtual machines. Maintaining cyber resilience in the face of cyberattacks requires the ability to quickly and safely recover critical data, like virtual machines.

With legacy backup tools, recovery from cyberattacks often entails manual and time-consuming processes that demand highly-skilled IT professionals. 

Cyberattack recovery

Despite these onerous processes, organisations still face incomplete restoration and data loss when restoring data from an early backup.

Even still, according to a recent Rubrik Zero Labs State of Data Security report only 16% of all external organisations recovered all of their data even after paying a ransomware demand.

Generative AI

Rubrik AI-Powered Cyber Recovery helps organisations take advantage of every second, empowering them"

“Cyberattacks can be highly unpredictable, and the complexity and sophistication of these threats make it challenging, if not impossible for organisations to recover data quickly, safely, and with minimal data loss,” said Anneka Gupta, Chief Product Officer of Rubrik.

“We understand that every minute counts when faced with a cyberattack, and Rubrik AI-Powered Cyber Recovery helps organisations take advantage of every second, empowering them to get their business-critical systems and data back up and running. As we continue our mission to secure the world’s data, generative AI will be a key that helps customers unlock true cyber resilience more effectively.”

Rubrik AI-Powered Cyber Recovery

Rubrik AI-Powered Cyber Recovery aims to minimise data loss and reduce downtime by utilising guided workflows and comprehensive task lists powered by generative AI, making it easier for IT professionals to navigate through the complexities of cyber recovery in the face of a cyber incident.

Rubrik AI-Powered Cyber Recovery is designed to empower organisations to:

  • Enhance Recovery Point Objective (RPO) With Cleanest, Most Recent Data: Get step-by-step guidance to recover unaffected files from the most recent snapshot and affected files from the snapshot before suspicious threat detection, all layered on top of a clean virtual machine built from a gold master template.
  • Eliminate Malware Reinfection Risks With Safer Virtual Machine Recovery: Identify vSphere templates to reconstruct clean and safe virtual machines and avoid introducing undetected vulnerabilities within the operating system.
  • Minimise Application Downtime With AI-Enabled Task Lists: Get clear recommendations on which snapshot or files to select for a clean and successful recovery through Rubrik’s data threat analytics integrated with Azure OpenAI.

Accelerating cyber recovery

This announcement follows Rubrik’s recent collaboration with Microsoft, announcing the integration of Rubrik Security Cloud with Microsoft Sentinel and Azure OpenAI Service to accelerate cyber recovery through the use of generative AI and Natural Language Processing (NLP).

Rubrik is committed to innovating new and practical ways to use AI to transform cyber recovery so organisations can reduce the time required to investigate and respond to cyberattacks, ultimately providing an overall boost in cyber resilience. Rubrik AI-Powered Cyber Recovery will be on display at booth #207 at VMware Explore 2023, taking place in Las Vegas.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Office surveillance
  • Remote video surveillance
  • Office security systems
  • Office security
  • Industrial security
  • Remote security
  • Commercial security
  • Security management
  • Security monitoring system
  • Radio frequency Identification
  • Facial recognition systems
  • Network monitoring
  • Video analytics
  • Remote video monitoring
  • Intrusion detection
  • Identity management
  • Industrial security systems
  • Security software
  • IP Surveillance
  • Industrial surveillance
  • Human area network
  • Visitor management systems
  • Indoor surveillance
  • IP security solutions
  • Integration software
  • Cyber security
  • Crowd Management
  • Corporate Security
  • Outdoor Security
  • Indoor Security
  • Central Monitoring
  • Data Security
  • IP transmission
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • GDPR
  • Smart home
  • Smart Cities
  • Machine Learning
  • Related links
  • VMware Explore 2023
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Corporate news
About this page

Discover Rubrik's AI-powered Cyber Recovery, offering generative AI capabilities for VMware users for reliable data protection. Navigate cyberattacks, minimise data loss, reduce downtime, and ensure efficient data recovery for enhanced cyber resilience.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec