Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Backup

Top 6 Reasons to Choose CloudCasa over Kasten by Veeam

If you are considering Kasten today and wondering what alternatives exist for Kubernetes backup, you are at the right place where we will make our case for why CloudCasa should be your choice instead. Kasten K10 is one of the first products built to address the data protection gap in Kubernetes environments. Veeam is a market leader in data protection, and they acquired Kasten in 2021. Together, Kasten by Veeam presents a strong combination of innovation and go-to-market chops.

6 Steps to Complete a Kubernetes Backup Using CloudCasa

We are excited to have Saiyam Pathak, Director of Technical Evangelism at Civo, sign up for CloudCasa and blog the simple steps required to complete a backup and restore of a Kubernetes cluster. For those that don’t know Saiyam, he has a passion for writing and talking about Kubernetes and cloud native technologies to make them more accessible for developers. Saiyam is a CNCF ambassador and a cloud native blogger with his own Cloud Native Simplified YouTube channel.

8 Data Protection Best Practices for Data Backup Day, and Every Day

Originally created when a journalist had his digital livelihood ruined by a cyber-attacker in 2012, World Backup Day has gained commercial significance as organizations manage ever-larger data volumes and face a higher risk of data breaches.

World Backup Day: Simplicity and Patience is Key

A few months ago, a popular cybersecurity news organization posted an urgent notice on social media seeking help to recover their data after their blog was deleted. They announced that they had no backups and they were desperately trying to contact the site administrator to restore their blog collection. This was as maddening as it was embarrassing for the same reasons.

How CloudCasa Helps Organizations Address Data Protection Weaknesses in Kubernetes

In a recent episode of TFiR Let’s Talk, Swapnil Bhartiya sat down with Sathya Sankaran, Chief Operating Officer at CloudCasa by Catalogic, to discuss how the Kubernetes ecosystem is shifting and how CloudCasa is helping organizations address the data protection weaknesses in Kubernetes and cloud-native infrastructure and adopt these new technologies.

Cross-Account and Cross-Cluster Restore of Kubernetes Demonstrated on Amazon EKS

Cross-Account and Cross-Cluster Restore of Kubernetes Applications Using CloudCasa on Amazon EKS. Users can now browse and map the available storage classes in the source and destination cluster across different AWS accounts and different Cloud Providers such as AKS, GKE, DO, IBM Cloud etc.

Cross-Account and Cross-Cluster Restore of Kubernetes Applications

Cross-Account and Cross-Cluster Restore of Kubernetes Applications Using CloudCasa. Users can now browse and map the available storage classes in the source and destination cluster when restoring. When performing cross-account Kubernetes restores in AWS, the system will now automatically handle changing volume IDs for PVs. Additionally, when creating an EKS cluster on restore, CloudCasa now allows customization of the IAM role, security group, VPC group etc. to be used in the new account.

CloudCasa Adds AWS Cloud Security Posture to Kubernetes Security Posture Reviews

Continuing with our security-first approach to Kubernetes data protection, in addition to Kubernetes Security Posture Reviews to scan your environment for vulnerabilities and misconfigurations, CloudCasa also added Cloud Security Posture Management for Amazon Web Services (AWS). Most attacks on cloud are the result of misconfigurations and mistakes, per industry analyst, Gartner. The research firm went on to forecast that through 2025, 99% of such attacks would be the customer’s fault.

CloudCasa Adds to Cyber Resilience with Kubernetes Security Posture Reviews

CloudCasa was built to provide data protection services for Kubernetes and cloud native workloads. As a SaaS backup solution for Kubernetes, CloudCasa was designed from the ground up to be a secure, well-architected, SaaS platform that improves a customer’s security posture against sophisticated cyber-attacks.