All around protection
April 21, 2022

All around protection

Mike Zukerman | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Modules Used

  • Rubrik Cloud Data Management
  • Rubrik Polaris

Overall Satisfaction with Rubrik

Using Rubrik CDM and Polaris. We are also using Radar, Sonar and APPFLOWS. These extra applications come with the Enterprise license. Rubric CDM is an ideal product for protecting your multivendor virtual environment. Radar is great at identifying and preventing ransomware. Sonar addresses the sensitive data classification and security. APPFLOWS addresses the DR orchestration.
  • VMs backup
  • NAS shares backup
  • ransomeware detection, protection.
  • Sensitive data classified.
  • VMware DR orchestration.
  • SQL Server high transactions backup.
  • Rubrik SQL Server backup using Microsoft VSS, which is causing the the database issues and delays for the very high transaction rate.
  • better file filtering - file sets concept is not very intuitive.
  • Expansive backup product, but provide you with the easy managed and reliable protection.
  • There is no price tag on ransom attacks, and Rubrik Radar will give you the way to recover.
Not using NDMP, better hardware.
Also Rubrik is easier to setup and manage.
Enterprise Edition has the full range of products to protect your data.
Polaris daily reports help us to see the Anomalies and react accordingly. We haven’t had a ransomware attack.
n/a - we are not using this feature yet.
granular permissions, SSO, dual authentication.

Do you think Rubrik delivers good value for the price?

Yes

Are you happy with Rubrik's feature set?

Yes

Did Rubrik live up to sales and marketing promises?

Yes

Did implementation of Rubrik go as expected?

Yes

Would you buy Rubrik again?

Yes

Good for the VMs backup.
Improves the CIFS and NFS shares backups, as it’s not relying on NDMP.
Great data protection from ransomware and classified data security.

Rubrik Feature Ratings

Universal recovery
9
Live recovery
10
Recovery verification
9
Business application protection
9
Multiple backup destinations
10
Incremental backup identification
9
Backup to the cloud
9
Deduplication and file compression
8
Snapshots
9
Flexible deployment
8
Management dashboard
9
Platform support
10
Retention options
9
Encryption
9