New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions. Credit: gorodenkoff / Getty Images Data management and SaaS protection company Redstor has launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. The firm has added support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, giving partners the ability to scale customer backups and removing the need to rely on disparate, ununified solutions.Extension unifies backups for container-based applicationsTraditionally, backups are not designed for modern, container-based applications, forcing service providers to deploy separate Kubernetes solutions to backup not only applications, but configurations, Redstor said. With its new extension, the company seeks to unify such processes and eliminate the need to bolt together multiple solutions.“Unlike other highly complex services that require error-prone scripting and aren’t multi-tenanted, our backup empowers users with easy scalability and ongoing management,” stated Redstor chief product officer, James Griffin. “There’s not even a need to switch between interfaces. This all provides MSPs with the increased potential to make high margins fast at scale.”Services providers will benefit from being able to recover a Kubernetes environment by quickly injecting data back into an existing cluster for fast resolution of ransomware, accidental or malicious deletion, or misconfiguration while managing multiple accounts with a single solution purpose-built for cloud partners, Redstor added. Disparate backup solutions a significant container security issueSpeaking to CSO, cybersecurity consultant Harman Singh says that disparate solutions are indeed a significant challenge with regards to backing up container environments. “There is a major disconnect between data protection strategies across container-based apps and individual apps,” he says. “A backup solution selected a few years ago may not work well in the agile environment of containers. The most important reason for this is the lack of backup data reference frameworks because inventory of metadata related to the applications can’t be aligned.” Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe