Rubrik Identity Resilience protects vulnerable authentication infrastructure


Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data.

Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) – to help organizations maintain operations with minimal downtime.

Identity Resilience aims to address a blindspot in enterprise security. A critical piece of infrastructure utilized by a vast majority of organizations, identity remains a consistent target for hackers. When compromised, these identity systems grant attackers access to critical data and credentials, and their disruption can prevent cyber recovery. Rubrik’s solution is designed to secure this vulnerable authentication infrastructure that powers virtually every major enterprise.

“Identity systems are not only complex and hard to manage, but they have also become the primary gateway for attackers aiming to access an organization’s valuable data,” said Mike Tornincasa, Chief Business Officer at Rubrik. “Today, we signal our commitment to identity protection, to address our customers’ needs by detecting threats that target identities and proactively reduce identity risks, just as we have successfully done with data security.”

Why this matters: Identity is how hackers get inside

Rubrik’s identity business safeguards millions of identities globally. It’s easy to see why: A recent CISA report found that 90% of cyber attacks on critical infrastructure begin with an identity compromise, often leading to privilege escalations and lateral movement into valuable corporate data.

These threats usually unfold gradually, making it essential to understand not just the “who” and “what” but also the “when” – how privilege or access patterns shift over time. By leveraging time-series data, Rubrik’s solution is designed to provide continuous visibility into identity changes, enabling earlier detection of suspicious activity.

Similar to how Rubrik monitors and sustains data, the company’s anticipated capabilities are designed to identify, monitor, and safeguard critical, sensitive, and active identities, including non-human identities (NHIs) such as machines using service accounts and access tokens.

NHIs, which outnumber their human counterparts, are complex to manage and introduce vulnerabilities that are increasingly targeted by attackers who compromise and escalate privileges. Current identity security approaches fail to provide enterprises the capability to assess NHI risk, view data access, and track suspicious activity over time.

A holistic approach drives cyber resiliency

Too often, identity management, identity protection, and data security are siloed as different products run by different teams in an organization. In contrast, Rubrik uniquely aims to combine these capabilities to provide new capabilities, and a holistic view of identity and data.

Identity Recovery & Identity Resilience – Accelerating Recovery. Advancing Resilience

Rubrik offers extensive coverage for identities across hybrid environments. New capabilities aim to empower organizations to thwart attacks earlier and restore systems more quickly to ensure cyber resilience:

  • Hybrid protection for Active Directory (AD) and Entra ID: With automated and orchestrated recovery workflows, organizations can restore complex hybrid identity environments – like Active Directory forests and full Entra ID tenants – faster and with greater confidence than before. Active Directory recovery can involve up to 22 manual steps. Rubrik reduces that with an easy-to-use wizard, dramatically cutting complexity and time to recovery. As a result, these capabilities are among the fastest-growing in Rubrik’s history, safeguarding millions of identities and the sensitive data they access.
  • Comprehensive risk analysis for human and non-human identities: With a unified view across identity providers showing human and non-human identities who have access to sensitive data, organizations can identify dormant or orphaned accounts, detect risky privilege escalations, and expose problematic combinations of access that traditional tools often miss. Beyond visibility, organizations can track the risk associated with identities and target remediation by revoking identity access, data access, or both. This approach enforces the least privilege, shrinks their attack surface, and proactively shuts down potential identity-based threats.
  • Complete identity and data context: Instead of working with limited context from identity providers, organizations can tie identity-based information with sensitive data (e.g., healthcare, financial) context, privilege, and activity. This critical context can reduce remediation work while strengthening risk posture before a cyber attack, thereby speeding up threat hunting and remediation during and after an attack.



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Astronomers have discovered a strikingly unusual exoplanet: one which orbits its host stars in a totally new way. The planet 2M1510 (AB) b orbits two stars — like Luke Skywalker’s home planet of Tatooine, for the Star Wars fans — but it does so in a highly unusual way.

Most planets that orbit two stars do so in a fairly simple way: the two stars orbit in a ring structure, and the planet orbits in a ring which is further out. But this newly discovered planet is different. The pair of stars orbit in a ring structure, and the planet orbits them around the poles. Known as a polar orbit, this is the first time a planet has been observed orbiting two stars in this way.

Astronomers had predicted that such an orbit was possible, but it had never been seen in reality before it was discovered using the European Southern Observatory’s Very Large Telescope (VLT). “I am particularly excited to be involved in detecting credible evidence that this configuration exists,” said lead researcher Thomas Baycroft of the University of Birmingham, UK.

The pair of stars that the planet is orbiting are a type called brown dwarfs. Sometimes known as failed stars, these objects are halfway between planets and stars as they are too big to be planets but not large enough to sustain fusion in their cores. That makes the planet even more unusual.

“A planet orbiting not just a binary, but a binary brown dwarf, as well as being on a polar orbit is rather incredible and exciting,” said co-author Amaury Triaud of the University of Birmingham. “The discovery was serendipitous, in the sense that our observations were not collected to seek such a planet, or orbital configuration. As such, it is a big surprise.”

The researchers were able to work out that a planet must be present in this system because of the unusual movements of the stars, which were being pushed and pulled by the planet’s gravity. They tried to understand what was causing the stars to behave in this way, and the presence of a planet in this unusual orbit was the only thing that made sense.

“Overall, I think this shows to us astronomers, but also to the public at large, what is possible in the fascinating universe we inhabit,” said Triaud.

The research will be published in the journal Science Advances.








Source link