Download PDF version Contact company

As organisations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, cybersecurity company Rubrik, Inc. announces Rubrik Turbo Threat Hunting. This unprecedented new feature is designed to dramatically accelerate cyber recovery and enables organisations to locate clean recovery points across their entire data estate in seconds. 

Turbo Threat Hunting aims to allow customers to immediately identify clean recovery points and swiftly recover from cyber incidents with minimal operational disruption.

Rubrik Zero Labs report

Turbo Threat Hunting is Rubrik’s key, enabling corps up to 75,000 backups in less than 60 seconds

The most recent Rubrik Zero Labs report found that 60% of IT and security pioneers are extremely or very concerned about their organisation’s ability to maintain business continuity during a cyberattack.

The traditional process of identifying clean backups can take days or even weeks, leaving organisations vulnerable to prolonged outages and devastating financial outcomes. Turbo Threat Hunting is Rubrik’s solution, enabling organisations to scan up to 75,000 backups in less than 60 seconds.

Turbo Threat Hunting

This is the fastest way to recover from a cyberattack,” said Anneka Gupta, Chief Product Officer at Rubrik. “With Turbo Threat Hunting, we’re not just reducing recovery times — we’re redefining what’s possible in cyber resilience."

"No other platform on the market can match our speed and scale, giving enterprises the confidence to quickly resume operations and protect their bottom line.”

Rubrik’s metadata

Turbo Threat Hunting scans at scale by leveraging pre-computed hashes within Rubrik’s metadata

Unlike traditional methods that scan one object at a time or require navigating multiple panes of glass, Turbo Threat Hunting scans at scale by leveraging pre-computed hashes stored within Rubrik’s metadata.

This eliminates the need for file-by-file scanning, allowing organisations to rapidly pinpoint the exact recovery points free from malware or other threats within seconds — even in the most complex data environments.

Key features of Turbo Threat Hunting 

  • Pre-computed hashing: Use pre-computed hash values within Rubrik’s metadata to instantly locate malicious files without the need to mount and scan individual files.
  • Quarantine malicious files: Backup metadata is updated to include history and quantity of now-discovered malicious files, reducing risk of human error in selecting the most recent backup without indicators of compromise.
  • Multi-cluster scanning: Identify clean backups by scanning individual or multiple clusters and organisations’ entire environment with a single action, reducing complexity and pinpointing recovery points across all data simultaneously.
  • Full estate analysis without disruption: Turbo Threat Hunting is designed to minimise production impacts while performing IOC sweeps across all workloads.

Turbo Threat Hunting is available now through beta for all Rubrik Enterprise Edition and cloud customers. The feature is planned to be generally available by the end of January 2025.

Download PDF version Download PDF version

In case you missed it

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Quick poll
What is the most significant challenge facing smart building security today?