Rubrik vs Cohesity
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!
Deployment
- Cloud-based
- On-premises
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.
Deployment
- Cloud-based
- On-premises
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Cost
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.7/ 5Features
4.6/ 5Customer Service
4.7/ 5Value for Money
4.5/ 5Ease of Use
4.7/ 5Features
4.6/ 5Customer Service
4.8/ 5Value for Money
4.6/ 5Features
Total features 69
- "What If" Scenarios
- AI/Machine Learning
- API
- Access Controls/Permissions
- Action Management
- Activity Dashboard
- Activity Tracking
- Ad hoc Query
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anti Virus
- Application Management
- Approval Workflow
- Archiving & Retention
- Audit Management
- Audit Trail
- Automated Containment
- Automated Scheduling
- Automatic Backup
- Backup Log
- Backup Scheduling
- Backup and Recovery
- Bare-Metal Restore
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Business Continuity Exercising
- Business Impact Analysis
- CPU Monitoring
- Capacity Analytics
- Capacity Management
- Capacity Planning
- Charting
- Cloud Backup
- Cloud Encryption
- Collaboration Tools
- Compliance Management
- Compression
- Configurable Workflow
- Configuration Management
- Continuous Backup
- Continuous Monitoring
- Credential Management
- Crisis Management
- Customer Database
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Classification
- Data Connectors
- Data Discovery
- Data Integration
- Data Loss Prevention Software
- Data Management
- Data Migration
- Data Quality Control
- Data Recovery
- Data Replication
- Data Retention Management
- Data Security
- Data Storage Management
- Data Synchronization
- Data Verification
- Data Visualization
- Database Support
- Deduplication
- Deletion Management
- Differential Backup
- Disaster Recovery
- Duplicate Detection
- Email Alerts
- Emergency Notification Software
- Encryption
- Event Logs
- File Quarantining
- HIPAA Compliant
- Incident Management
- Incident Response Checklists
- Incremental Backup
- Indexing
- Information Governance
- Insider Threat Protection
- Intellectual Property Protection
- Intrusion Detection System
- Local Server Options
- Maintenance Scheduling
- Master Data Management
- Match & Merge
- Metadata Management
- Monitoring
- Multi-Cloud Management
- Multi-Factor Authentication
- Multi-Location
- Multi-OS
- Multi-User Collaboration
- Multimedia Archiving
- Multiple Data Sources
- Multiple Format Support
- Multiple Programming Languages Supported
- NOSQL Database Management
- Password Management
- Patch Management
- Performance Analysis
- Performance Management
- Performance Monitoring
- Personally Identifiable Information Protection
- Plan Development
- Policy Management
- Predictive Analytics
- Process Management
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Relational Database Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Scenario Planning
- Scheduled/Automated Reports
- Scheduling
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Monitoring
- Service Level Agreement (SLA) Management
- Single Sign On
- Status Tracking
- Storage Management
- Tagging
- Task Management
- Task Scheduling
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Interface
- User Management
- VM Backup
- Version Control
- Virtual Machine Monitoring
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Access/Restoration
- Workflow Management
- eDiscovery
Total features 156
- "What If" Scenarios
- AI/Machine Learning
- API
- Access Controls/Permissions
- Action Management
- Activity Dashboard
- Activity Tracking
- Ad hoc Query
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anti Virus
- Application Management
- Approval Workflow
- Archiving & Retention
- Audit Management
- Audit Trail
- Automated Containment
- Automated Scheduling
- Automatic Backup
- Backup Log
- Backup Scheduling
- Backup and Recovery
- Bare-Metal Restore
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Business Continuity Exercising
- Business Impact Analysis
- CPU Monitoring
- Capacity Analytics
- Capacity Management
- Capacity Planning
- Charting
- Cloud Backup
- Cloud Encryption
- Collaboration Tools
- Compliance Management
- Compression
- Configurable Workflow
- Configuration Management
- Continuous Backup
- Continuous Monitoring
- Credential Management
- Crisis Management
- Customer Database
- Customizable Reports
- Dashboard Creation
- Data Analysis Tools
- Data Classification
- Data Connectors
- Data Discovery
- Data Integration
- Data Loss Prevention Software
- Data Management
- Data Migration
- Data Quality Control
- Data Recovery
- Data Replication
- Data Retention Management
- Data Security
- Data Storage Management
- Data Synchronization
- Data Verification
- Data Visualization
- Database Support
- Deduplication
- Deletion Management
- Differential Backup
- Disaster Recovery
- Duplicate Detection
- Email Alerts
- Emergency Notification Software
- Encryption
- Event Logs
- File Quarantining
- HIPAA Compliant
- Incident Management
- Incident Response Checklists
- Incremental Backup
- Indexing
- Information Governance
- Insider Threat Protection
- Intellectual Property Protection
- Intrusion Detection System
- Local Server Options
- Maintenance Scheduling
- Master Data Management
- Match & Merge
- Metadata Management
- Monitoring
- Multi-Cloud Management
- Multi-Factor Authentication
- Multi-Location
- Multi-OS
- Multi-User Collaboration
- Multimedia Archiving
- Multiple Data Sources
- Multiple Format Support
- Multiple Programming Languages Supported
- NOSQL Database Management
- Password Management
- Patch Management
- Performance Analysis
- Performance Management
- Performance Monitoring
- Personally Identifiable Information Protection
- Plan Development
- Policy Management
- Predictive Analytics
- Process Management
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Relational Database Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Scenario Planning
- Scheduled/Automated Reports
- Scheduling
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Monitoring
- Service Level Agreement (SLA) Management
- Single Sign On
- Status Tracking
- Storage Management
- Tagging
- Task Management
- Task Scheduling
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Interface
- User Management
- VM Backup
- Version Control
- Virtual Machine Monitoring
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Access/Restoration
- Workflow Management
- eDiscovery