Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!

Deployment

  • Cloud-based
  • On-premises

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Deployment

  • Cloud-based
  • On-premises

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.8 /5
(74)

Ease of Use

4.7/ 5

Features

4.6/ 5

Customer Service

4.7/ 5

Value for Money

4.5/ 5

Overall rating

4.6 /5
(51)

Ease of Use

4.7/ 5

Features

4.6/ 5

Customer Service

4.8/ 5

Value for Money

4.6/ 5

Total features 69

  • "What If" Scenarios
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Action Management
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Query
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anti Virus
  • Application Management
  • Approval Workflow
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Automated Containment
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Bare-Metal Restore
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Business Continuity Exercising
  • Business Impact Analysis
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Capacity Planning
  • Charting
  • Cloud Backup
  • Cloud Encryption
  • Collaboration Tools
  • Compliance Management
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Continuous Backup
  • Continuous Monitoring
  • Credential Management
  • Crisis Management
  • Customer Database
  • Customizable Reports
  • Dashboard Creation
  • Data Analysis Tools
  • Data Classification
  • Data Connectors
  • Data Discovery
  • Data Integration
  • Data Loss Prevention Software
  • Data Management
  • Data Migration
  • Data Quality Control
  • Data Recovery
  • Data Replication
  • Data Retention Management
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Data Visualization
  • Database Support
  • Deduplication
  • Deletion Management
  • Differential Backup
  • Disaster Recovery
  • Duplicate Detection
  • Email Alerts
  • Emergency Notification Software
  • Encryption
  • Event Logs
  • File Quarantining
  • HIPAA Compliant
  • Incident Management
  • Incident Response Checklists
  • Incremental Backup
  • Indexing
  • Information Governance
  • Insider Threat Protection
  • Intellectual Property Protection
  • Intrusion Detection System
  • Local Server Options
  • Maintenance Scheduling
  • Master Data Management
  • Match & Merge
  • Metadata Management
  • Monitoring
  • Multi-Cloud Management
  • Multi-Factor Authentication
  • Multi-Location
  • Multi-OS
  • Multi-User Collaboration
  • Multimedia Archiving
  • Multiple Data Sources
  • Multiple Format Support
  • Multiple Programming Languages Supported
  • NOSQL Database Management
  • Password Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Monitoring
  • Personally Identifiable Information Protection
  • Plan Development
  • Policy Management
  • Predictive Analytics
  • Process Management
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-Time Updates
  • Relational Database Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Scenario Planning
  • Scheduled/Automated Reports
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Status Tracking
  • Storage Management
  • Tagging
  • Task Management
  • Task Scheduling
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Interface
  • User Management
  • VM Backup
  • Version Control
  • Virtual Machine Monitoring
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Access/Restoration
  • Workflow Management
  • eDiscovery

Total features 156

  • "What If" Scenarios
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Action Management
  • Activity Dashboard
  • Activity Tracking
  • Ad hoc Query
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anti Virus
  • Application Management
  • Approval Workflow
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Automated Containment
  • Automated Scheduling
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Bare-Metal Restore
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Business Continuity Exercising
  • Business Impact Analysis
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Capacity Planning
  • Charting
  • Cloud Backup
  • Cloud Encryption
  • Collaboration Tools
  • Compliance Management
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Continuous Backup
  • Continuous Monitoring
  • Credential Management
  • Crisis Management
  • Customer Database
  • Customizable Reports
  • Dashboard Creation
  • Data Analysis Tools
  • Data Classification
  • Data Connectors
  • Data Discovery
  • Data Integration
  • Data Loss Prevention Software
  • Data Management
  • Data Migration
  • Data Quality Control
  • Data Recovery
  • Data Replication
  • Data Retention Management
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Data Visualization
  • Database Support
  • Deduplication
  • Deletion Management
  • Differential Backup
  • Disaster Recovery
  • Duplicate Detection
  • Email Alerts
  • Emergency Notification Software
  • Encryption
  • Event Logs
  • File Quarantining
  • HIPAA Compliant
  • Incident Management
  • Incident Response Checklists
  • Incremental Backup
  • Indexing
  • Information Governance
  • Insider Threat Protection
  • Intellectual Property Protection
  • Intrusion Detection System
  • Local Server Options
  • Maintenance Scheduling
  • Master Data Management
  • Match & Merge
  • Metadata Management
  • Monitoring
  • Multi-Cloud Management
  • Multi-Factor Authentication
  • Multi-Location
  • Multi-OS
  • Multi-User Collaboration
  • Multimedia Archiving
  • Multiple Data Sources
  • Multiple Format Support
  • Multiple Programming Languages Supported
  • NOSQL Database Management
  • Password Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Monitoring
  • Personally Identifiable Information Protection
  • Plan Development
  • Policy Management
  • Predictive Analytics
  • Process Management
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-Time Updates
  • Relational Database Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Server Options
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Scenario Planning
  • Scheduled/Automated Reports
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Status Tracking
  • Storage Management
  • Tagging
  • Task Management
  • Task Scheduling
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Interface
  • User Management
  • VM Backup
  • Version Control
  • Virtual Machine Monitoring
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Access/Restoration
  • Workflow Management
  • eDiscovery