Search
Close this search box.

System Recovery for
Rubrik

RBMR lets you perform a complete bare machine system recovery direct from a Rubrik backup. It also provides recovery assurance, as the software can be scheduled to run through a complete recovery process. This fully automates the creation of the recovered machine and then runs test scripts to verify integrity and functionality.

Extending Rubrik to provide System Recovery to Physical, Virtual or Cloud targets

Recover entire systems following a disaster or cyberattack​

Cristie RBMR software protects your critical servers by recovering them directly from your Rubrik backups.

Trust your DR environment with Cristie recovery simulation

Adding RBMR to your Rubrik environment allows recovery of operating systems, applications, user configuration and data to any point in time available in your Rubrik backup software. With our sandbox testing environment you can simulate system recovery with DR automation to verify that your recovery procedures will work when you need them most, and all without having to rely on manual intervention.

Comprehensive reports to meet compliance directives​

System DR process audits are a core component of many industry compliance directives. Our DR orchestration tools enable the automation of recovery simulation reports to simplify your regulatory compliance procedures.

Key features & benefits for Rubrik users

Rubrik Recommended

RBMR is re-sold globally by Rubrik and its channel partners as a recommended recovery solution and is available for both perpetual and subscription based licensing.

Broad OS and virtualization platform support

RBMR can recover systems from Windows, Linux, Solaris, AIX, VMware, Hyper-V and cloud platforms such as Azure, OCI and Amazon EC2

DR Automation and Recovery Sandbox testing

RBMR provides DR automation and orchestration capabilities, plus the ability to recover systems within a sandbox environment to validate recovery processes and RTO objectives.

Leverage existing Rubrik backups without extra infrastructure or management, to save you storage space, network bandwidth, processing power and management resource

How RBMR works

RBMR lets you perform a complete bare machine system recovery direct from a Rubrik backup. It also provides recovery assurance, as the software can be scheduled to run through a complete recovery process. This fully automates the creation of the recovered machine and then runs test scripts to verify integrity and functionality.

Schedules can be set up months in advance and planned so that the entire server infrastructure is tested over the course of the desired timeframe.

The recovery machines are held in an isolated network and can be released after every simulation, so storage is not permanently required. Detailed reporting highlights any problems encountered and provides an audit track of successful results.

Broad OS and virtualization platform support

  1. Install RBMR on the client system to be protected.
  2. License the software using a trial or full license. The software will then gather configuration parameters, including details about the hard disks, operating system, storage controller, network adapter and network settings. Some of these details can be tailored.
  3. Perform a standard Rubrik backup.
  4. Boot the recovery environment on the target system and monitor the automated restore process.

RBMR requires one license per system it protects and includes 12 months’ free support & maintenance. Find out more about our pricing here.

SiteLock

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Participation subject to availability.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.