Latest news with #Infinidat


Forbes
22-04-2025
- Business
- Forbes
Why Next-Generation Data Protection Has Ascended
Eric Herzog is the Chief Marketing Officer at Infinidat. When I attend the RSA 2025 conference in San Francisco at the end of April, I will be having a series of conversations with customers, partners and people who want to be customers or partners, and the one question I will ask all of them is: 'What are you doing about next-generation data protection?' If the answer is 'Nothing,' then they have a problem because cybercriminals will exploit this oversight. Traditional data protection is no longer enough for enterprises. Cybercriminals have figured out that the storage infrastructure is like a beachhead for them to launch cyberattacks, such as ransomware and malware, against a company. Cybercriminals are known to dwell within the data infrastructure of an enterprise for months, waiting for the optimal opportunity to inflict the most damage. These bad actors will take your organization's data hostage and give you a 'ransom' demand that is in the millions of dollars, if not the tens of millions of dollars. All because of the outdatedness or incompleteness of data protection capabilities and the lack of a cyber storage resilience and recovery strategy! If cybercriminals are patient enough to wait months for their 'opportunity' to strike, then anyone responsible for their company's cybersecurity efforts can take five minutes to learn the key elements of next-generation data protection. The scope of data protection has expanded over the past couple of years. It's no longer just about doing snapshots of data or being able to handle backup repositories. Those things are still needed, of course, but securing the data infrastructure has grown much wider with the addition of two key elements: cyber storage resilience and near-immediate cyber recovery. These elements are core to next-generation data protection, and they are built on being cyber-focused and recovery-first. This is a revolutionary way of thinking about your enterprise storage to support applications and workloads. What's the priority? It's the endpoint. You certainly want to use immutable snapshots for next-gen data protection so that data cannot be altered, corrupted or deleted, and you get a known clean copy of data. But you also need to get to a point of orchestration and deeper integration than what is common today. The capabilities that are required to ascend to next-gen data protection are automated cyber protection and cyber detection. They can make the difference between: • Option A, an enterprise paying $5 million, $10 million, $100 million (or more) to 'ransom' their data from cyber criminals. • Option B, an enterprise ignoring cybercriminals because the organization is able to simply recover and restore its data on its own—with no ransom payment at all—because of next-generation data protection. Automated cyber protection, or ACP, automates the taking of immutable snapshots of data as soon as a security alert from a data center-wide cybersecurity application is triggered. There is virtually no delay compared to the commonly used manual process. This is a step that helps advance your infrastructure from just being for backup to now being optimized for restore. Restoration can happen within minutes with ACP capabilities paving the way. Cyber detection that is integrated into primary storage is the key to determining whether data is clean or compromised. The last thing you want to do is restore corrupt data. Cyber detection uses machine learning (ML) to scan huge amounts of data to check for data integrity. This is vital in today's day and age. When you have a cyber-focused, recovery-first strategy that utilizes these next-generation data protection capabilities, you take steps to prevent your company's data from being held hostage. It gets rid of the cyber weak spots. To use a metaphor, think of it this way: Your data infrastructure is made up of the equivalent of what I like to call 'cyber steel,' which was unthinkable just a few years ago. If construction workers are going to build a skyscraper with a steel infrastructure for longevity, they would use the appropriate tools: heavy-duty cranes, welding equipment and specialized tools for steel work. Likewise, when you're going to build or revamp your enterprise storage infrastructure to be 'steel-like' cyber resilient, you need the right tools: immutable snapshots, logical air gapping, a fenced forensic environment, a near-instantaneous recovery capability, automated cyber protection and cyber detection. These tools enable a smart IT team to detect, contain and mitigate the impact of an attack on your data infrastructure. They make it possible to do lightning-fast recovery of data with integrity—and do it at scale. Last but not least: The culmination of next-generation data protection is that you are able to obtain a faster return on security investment (ROSI), a standard cybersecurity industry metric, because the money you save will far outweigh the IT investment in cyber resilient storage capabilities with integrated cyber detection and the revolutionary automated cyber protection. As an industry, we may be getting closer to needing to consider creating a new return on security and storage investment (ROSSI) metric because the financial benefits—and the ability to put a number on cyber recovery—are changing the conversations in C-suites of leading-edge enterprises. Instead of the classic Tony Bennett song 'I Left My Heart in San Francisco,' chief information security officers (CISOs) and cybersecurity decision-makers in attendance at the largest meeting of security experts in the world may be singing 'I Left My Traditional Data Protection in San Francisco.' After the conversations that will invariably take place across the community at the RSA conference in San Francisco, data protection cannot be viewed the same. With a cyber-focused, recovery-first strategy that delivers end-to-end cyber storage resilience, the best is yet to come for enterprises to safeguard their data and mitigate the effects of a cyberattack—powered by next-generation data protection. Forbes Communications Council is an invitation-only community for executives in successful public relations, media strategy, creative and advertising agencies. Do I qualify?


Channel Post MEA
13-03-2025
- Business
- Channel Post MEA
Veeam Launches Kasten For Kubernetes v7.5
Veeam Software has announced Veeam Kasten for Kubernetes v7.5, designed to deliver unmatched Kubernetes-native data resilience for enterprises. This latest release improves Kubernetes data protection with significant advancements in scalability, notable improvement in backup and restore times, and features to safeguard against emerging threats and simplify compliance with the latest industry regulations. In collaboration with industry leaders Infinidat and NetApp, the new Veeam Kasten release offers top-tier solutions that offer enhanced support for Red Hat OpenShift, showcasing its commitment to empowering customers to scale and safeguard their Kubernetes workloads. 'Looking ahead in 2025, we anticipate a significant expansion in Modern Virtualization options, both in terms of the variety of vendors and the CPU architectures supported, as well as the depth of capabilities offered. An example of this broadening is the enhanced support of Red Hat OpenShift Virtualization as well as initial support for SUSE Virtualization, being introduced in Kasten v7.5,' said Gaurav Rishi, Vice President of Product Management at Veeam. 'Additionally, we foresee advancements in Cyber Resilience, including proactive threat detection and secure self-service restore features, which will enhance overall data protection strategies for Kubernetes environments.' New Veeam Kasten v 7.5 Veeam Kasten v7.5 reinforces the industry's leading Kubernetes resilience, recovery and mobility platform. Significant advancements in scale, performance, security, and ecosystem coverage empower organizations with unmatched resilience for cloud-native apps and Virtual Machines (VMs) on Kubernetes. Key advancements include: Modern Virtualization: Kasten v7.5 addresses the evolving needs of virtualization by providing seamless protection for both VMs and containerized applications under a unified solution. Support extends to Red Hat OpenShift Virtualization and SUSE Virtualization, simplifying VM management and offering more efficient backup and recovery workflows. Kasten v7.5 addresses the evolving needs of virtualization by providing seamless protection for both VMs and containerized applications under a unified solution. Support extends to Red Hat OpenShift Virtualization and SUSE Virtualization, simplifying VM management and offering more efficient backup and recovery workflows. Enhanced Security and Compliance: This release introduces features that enhance security against emerging threats while simplifying compliance with industry regulations. Notably, it offers multi-cluster FIPS support to adhere to strict government benchmarks, immutable restore point visibility and expands support for object lock capabilities in Google Cloud Storage to strengthen ransomware protection. This release introduces features that enhance security against emerging threats while simplifying compliance with industry regulations. Notably, it offers multi-cluster FIPS support to adhere to strict government benchmarks, immutable restore point visibility and expands support for object lock capabilities in Google Cloud Storage to strengthen ransomware protection. Enterprise-Scale Resilience: Kasten v7.5 delivers the performance, control, and ease of use required for demanding Kubernetes environments, enabling protection of large application volumes and improving backup and restore times. For instance, users can experience a threefold improvement in backup time for volumes containing 10 million small files. Veeam is committed to meeting customers where they are with robust Modern Virtualization solutions. In an era where organizations seek unified, seamless management of VMs and containerized applications, Veeam Kasten emerges as a trusted partner, offering mature solutions that cater to diverse needs. Simultaneously, there is a growing demand from enterprises for Modern Virtualization built on Kubernetes, leveraging secure DevOps practices through platforms like Red Hat OpenShift. New Strategic Alliances In collaboration with industry leaders, including Infinidat and NetApp, Veeam Kasten brings best-of-breed solutions supported on Red Hat OpenShift, demonstrating dedication to enabling customers to scale and protect their Kubernetes workloads. The Veeam Kasten data management platform now integrates with Infinidat's high-performance InfiniBox® enterprise storage, facilitating seamless backup and recovery, disaster recovery, cyber resilience, and application mobility alongside Infinidat's well-established primary storage capabilities. The InfiniBox Storage Platform supports various storage protocols, such as NFS, iSCSI, and FC, as well as through the CSI abstraction layer with Kubernetes persistent disks/volumes. By leveraging Veeam Ready InfiniBox storage (both all-flash and hybrid) through the InfiniBox CSI driver, Kasten enables performant, secure and immutable backup solutions for stateful application workloads using Red Hat OpenShift Virtualization, and Relational and NoSQL databases. Veeam has joined forces with NetApp to pioneer innovative data protection and storage solutions for the ever-expanding universe of Kubernetes data services, modern virtualization, AI, and cloud-native applications. By uniting expertise and technologies, the collaboration aims to provide customers with the most advanced and comprehensive solutions available. This collaboration will deliver exceptional value and enable organizations to protect their critical data and applications with unparalleled reliability and efficiency. GigaOm Radar for Kubernetes Protection In addition, Veeam Kasten was recently named a clear Leader and Outperformer for the fifth time in the GigaOm Radar for Kubernetes Protection. Veeam was classified as an Outperformer, given its 'incredible pace of innovation across enterprise resilience, security and compliance, and modern virtualization.' Veeam Kasten was recognized for excelling in SaaS database-aware backups thanks to its application and database auto-discovery powered by the Kanister framework. Additionally, Veeam Kasten offers strong data integrity with advanced ransomware protection and deep integrations with various SIEM solutions. Recoverability verification allows Veeam Kasten to confirm recoverability in an isolated environment and enables instant recovery for workloads from that recovery environment. 0 0