New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions. Credit: gorodenkoff / Getty Images Data management and SaaS protection company Redstor has launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. The firm has added support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, giving partners the ability to scale customer backups and removing the need to rely on disparate, ununified solutions.Extension unifies backups for container-based applicationsTraditionally, backups are not designed for modern, container-based applications, forcing service providers to deploy separate Kubernetes solutions to backup not only applications, but configurations, Redstor said. With its new extension, the company seeks to unify such processes and eliminate the need to bolt together multiple solutions.“Unlike other highly complex services that require error-prone scripting and aren’t multi-tenanted, our backup empowers users with easy scalability and ongoing management,” stated Redstor chief product officer, James Griffin. “There’s not even a need to switch between interfaces. This all provides MSPs with the increased potential to make high margins fast at scale.” Services providers will benefit from being able to recover a Kubernetes environment by quickly injecting data back into an existing cluster for fast resolution of ransomware, accidental or malicious deletion, or misconfiguration while managing multiple accounts with a single solution purpose-built for cloud partners, Redstor added. Disparate backup solutions a significant container security issueSpeaking to CSO, cybersecurity consultant Harman Singh says that disparate solutions are indeed a significant challenge with regards to backing up container environments. “There is a major disconnect between data protection strategies across container-based apps and individual apps,” he says. “A backup solution selected a few years ago may not work well in the agile environment of containers. The most important reason for this is the lack of backup data reference frameworks because inventory of metadata related to the applications can’t be aligned.” Related content news NIST is finally getting help with the National Vulnerability Database backlog NIST is paying Analygence $865,657 to help process incoming CVEs. By Paul Barker Jun 04, 2024 3 mins Threat and Vulnerability Management Vulnerabilities news Major service tag security problems reported in Microsoft Azure Microsoft has opted not to fix the issue reported by Tenable Research, but many defend that decision, arguing that this should be decided by CISOs based on their environment. By Evan Schuman Jun 04, 2024 5 mins Cloud Security Security Practices Vulnerabilities news Atlassian’s Confluence hit with critical remote code execution bugs The input validation bug enables an authenticated attacker to exploit the privileges to inject malicious codes. By Shweta Sharma Jun 04, 2024 3 mins Vulnerabilities feature Breach and attack simulation tools: Top vendors, key features, how to choose BAS products simulate attacks to test a company’s defenses against threat vectors. The following guide can help you make the right choice for your organization. By Maria Korolov Jun 04, 2024 13 mins Cyberattacks Penetration Testing Data and Information Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe