New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions. Credit: gorodenkoff / Getty Images Data management and SaaS protection company Redstor has launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. The firm has added support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, giving partners the ability to scale customer backups and removing the need to rely on disparate, ununified solutions.Extension unifies backups for container-based applicationsTraditionally, backups are not designed for modern, container-based applications, forcing service providers to deploy separate Kubernetes solutions to backup not only applications, but configurations, Redstor said. With its new extension, the company seeks to unify such processes and eliminate the need to bolt together multiple solutions.“Unlike other highly complex services that require error-prone scripting and aren’t multi-tenanted, our backup empowers users with easy scalability and ongoing management,” stated Redstor chief product officer, James Griffin. “There’s not even a need to switch between interfaces. This all provides MSPs with the increased potential to make high margins fast at scale.” Services providers will benefit from being able to recover a Kubernetes environment by quickly injecting data back into an existing cluster for fast resolution of ransomware, accidental or malicious deletion, or misconfiguration while managing multiple accounts with a single solution purpose-built for cloud partners, Redstor added. Disparate backup solutions a significant container security issueSpeaking to CSO, cybersecurity consultant Harman Singh says that disparate solutions are indeed a significant challenge with regards to backing up container environments. “There is a major disconnect between data protection strategies across container-based apps and individual apps,” he says. “A backup solution selected a few years ago may not work well in the agile environment of containers. The most important reason for this is the lack of backup data reference frameworks because inventory of metadata related to the applications can’t be aligned.” Related content news Dropbox Sign hack exposed user data, raises security concerns for e-sign industry The names and email addresses of those customers were also exposed who had never created an account with Dropbox Sign but had “received or signed a document through Dropbox Sign.” By Gyana Swain May 02, 2024 5 mins Data Breach news UnitedHealth hack may impact a third of US citizens: CEO testimony Despite paying a $22 million ransom in Bitcoin to regain access to encrypted files, the company cannot confirm whether copies of the data were made or published online. By Prasanth Aby Thomas May 02, 2024 4 mins Data Breach Ransomware Hacking news Most interesting products to see at RSAC 2024 Tools, platforms, and services that the CSO team recommends 2024 RSA Conference attendees check out. By CSO Staff May 02, 2024 6 mins RSA Conference Security news analysis Biden delivers updated take on security for critical infrastructure Building on previous efforts, the Biden administration's new National Security Memorandum reflects a more modern approach to protecting US critical infrastructure, giving CISA a better-defined and expanded role as the agency coordinating everyth By Cynthia Brumfield May 02, 2024 7 mins Government Threat and Vulnerability Management Critical Infrastructure PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe