New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions. Credit: gorodenkoff / Getty Images Data management and SaaS protection company Redstor has launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. The firm has added support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, giving partners the ability to scale customer backups and removing the need to rely on disparate, ununified solutions.Extension unifies backups for container-based applicationsTraditionally, backups are not designed for modern, container-based applications, forcing service providers to deploy separate Kubernetes solutions to backup not only applications, but configurations, Redstor said. With its new extension, the company seeks to unify such processes and eliminate the need to bolt together multiple solutions.“Unlike other highly complex services that require error-prone scripting and aren’t multi-tenanted, our backup empowers users with easy scalability and ongoing management,” stated Redstor chief product officer, James Griffin. “There’s not even a need to switch between interfaces. This all provides MSPs with the increased potential to make high margins fast at scale.” Services providers will benefit from being able to recover a Kubernetes environment by quickly injecting data back into an existing cluster for fast resolution of ransomware, accidental or malicious deletion, or misconfiguration while managing multiple accounts with a single solution purpose-built for cloud partners, Redstor added. Disparate backup solutions a significant container security issueSpeaking to CSO, cybersecurity consultant Harman Singh says that disparate solutions are indeed a significant challenge with regards to backing up container environments. “There is a major disconnect between data protection strategies across container-based apps and individual apps,” he says. “A backup solution selected a few years ago may not work well in the agile environment of containers. The most important reason for this is the lack of backup data reference frameworks because inventory of metadata related to the applications can’t be aligned.” Related content how-to Download the SASE and SSE enterprise buyer’s guide From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what SASE (Secure Access Service Edge) and SSE (Secure Service Edge) can do for their organizations and how t By Neal Weinberg May 13, 2024 1 min Remote Access Security Network Security Enterprise Buyer’s Guides news IntelBroker steals classified data from the Europol website The agency said core operations remain unaffected even as IntelBroker claimed to possess classified, law enforcement data. By Shweta Sharma May 13, 2024 3 mins Data Breach Hacker Groups feature Ridding your network of NTLM The path to eradicating this ancient protocol and security sinkhole won’t be easy, but the time has come for its complete eradication. By David Strom May 13, 2024 8 mins Authentication Windows Security Network Security news CISA inks 68 tech vendors to secure-by-design pledge — but will it matter? CISA’s pledge drew some big names, but the impact on software security could be limited. Meanwhile the org has extended its comment period on the CIRCIA cyberattack reporting law. By Jon Gold May 10, 2024 4 mins Regulation Technology Industry Security Practices PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe