As organisations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, cybersecurity company Rubrik, Inc. announces Rubrik Turbo Threat Hunting. This unprecedented new feature is designed to dramatically accelerate cyber recovery and enables organisations to locate clean recovery points across their entire data estate in seconds. 

Turbo Threat Hunting aims to allow customers to immediately identify clean recovery points and swiftly recover from cyber incidents with minimal operational disruption.

Rubrik Zero Labs report

Turbo Threat Hunting is Rubrik’s key, enabling corps up to 75,000 backups in less than 60 seconds

The most recent Rubrik Zero Labs report found that 60% of IT and security pioneers are extremely or very concerned about their organisation’s ability to maintain business continuity during a cyberattack.

The traditional process of identifying clean backups can take days or even weeks, leaving organisations vulnerable to prolonged outages and devastating financial outcomes. Turbo Threat Hunting is Rubrik’s solution, enabling organisations to scan up to 75,000 backups in less than 60 seconds.

Turbo Threat Hunting

This is the fastest way to recover from a cyberattack,” said Anneka Gupta, Chief Product Officer at Rubrik. “With Turbo Threat Hunting, we’re not just reducing recovery times — we’re redefining what’s possible in cyber resilience."

"No other platform on the market can match our speed and scale, giving enterprises the confidence to quickly resume operations and protect their bottom line.”

Rubrik’s metadata

Turbo Threat Hunting scans at scale by leveraging pre-computed hashes within Rubrik’s metadata

Unlike traditional methods that scan one object at a time or require navigating multiple panes of glass, Turbo Threat Hunting scans at scale by leveraging pre-computed hashes stored within Rubrik’s metadata.

This eliminates the need for file-by-file scanning, allowing organisations to rapidly pinpoint the exact recovery points free from malware or other threats within seconds — even in the most complex data environments.

Key features of Turbo Threat Hunting 

  • Pre-computed hashing: Use pre-computed hash values within Rubrik’s metadata to instantly locate malicious files without the need to mount and scan individual files.
  • Quarantine malicious files: Backup metadata is updated to include history and quantity of now-discovered malicious files, reducing risk of human error in selecting the most recent backup without indicators of compromise.
  • Multi-cluster scanning: Identify clean backups by scanning individual or multiple clusters and organisations’ entire environment with a single action, reducing complexity and pinpointing recovery points across all data simultaneously.
  • Full estate analysis without disruption: Turbo Threat Hunting is designed to minimise production impacts while performing IOC sweeps across all workloads.

Turbo Threat Hunting is available now through beta for all Rubrik Enterprise Edition and cloud customers. The feature is planned to be generally available by the end of January 2025.

In case you missed it

How can physical security systems make schools safer?
How can physical security systems make schools safer?

Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students be...

DNAKE smart intercom elevates Dickensa 27 security
DNAKE smart intercom elevates Dickensa 27 security

Dickensa 27, a modern residential complex in Warsaw, Poland, sought to enhance its security, communication, and convenience for residents through advanced intercom solutions. ...

Anviz transforms traditional property management into a smart reality, making digitisation more than just talk
Anviz transforms traditional property management into a smart reality, making digitisation more than just talk

The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart securi...

Quick poll
How likely is it that companies will invest in cloud-based physical security solutions in the next 5 years?