Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

03:45 PM
Dark Reading
Dark Reading
Products and Releases

Zerto Announces General Availability of Zerto for Kubernetes and New Public Cloud Capabilities

Unlocking continuous cloud protection for hybrid, public, and native cloud workloads.

ZertoCON 2021 Virtual – [April 21, 2021] – Zerto, an industry leader in cloud data management and protection, has announced the availability of Zerto for Kubernetes (Z4K) and previewed Zerto 9.0 at ZertoCON 2021 Virtual. Zerto’s Z4K applies its leading continuous data protection (CDP) technology to next-generation, containerized applications, enabling a new paradigm for backup and disaster recovery of applications and data across cloud and on-premises deployments. Additionally, Zerto 9.0, to be released in July, will build on Zerto’s track record of leadership in delivering cloud data management and protection solutions by adding backup to S3-compatible storage such as Cloudian, introducing cloud tiering for AWS and Azure and immutability in public cloud.

Zerto for Kubernetes is the only solution to provide continuous data protection-based backup and disaster recovery to integrate into the application deployment lifecycle for containerized applications to enable data protection as code. Z4K supports Microsoft Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), IBM Cloud Kubernetes Service, and Red Hat OpenShift.

As every organization strives to accelerate application development, the reliance on a microservice architecture, typically running in containers, is becoming the new normal. By adding Zerto’s continuous data protection to the Kubernetes control plane, they will be protected from data loss and downtime even in cases of user errors, malicious activity, or infrastructure failures without having to worry about backup windows or external services.

The solution is designed for Kubernetes running on-premises or in the cloud as part of its cloud data management and protection platform. It enables users to easily protect and recover any Kubernetes application and its persistent data for accelerated delivery and deployment.

In a recent ESG survey, it is clear that there is a widespread adoption of containers. The survey found that 71% of respondents have deployed or plan to deploy container-based applications in a hybrid-cloud strategy*. This survey and other analyst reports supporting the growing adoption of containers, including “VM data protection veteran Zerto sets its sights on Kubernetes-based stateful apps” written by Liam Rogers, 451 Research. A part of S&P Market Intelligence, can be viewed, here.

Zerto 9.0 will introduce new public cloud backup platforms and capabilities for complete data protection flexibility. Zerto 9.0 introduces backup to S3-compatible storage such as Cloudian, cloud tiering for AWS and Azure, and immutability for public cloud.

Specifically, cloud tiering for AWS and Azure tiers cloud data into Amazon S3 Glacier and Azure Archive. Users can define retention policies in Zerto for storing and migrating long-term retention backups from online frequent access storage classes into more cost-effective in-frequent access storage classes all the way through to archive storage in both Azure and AWS. This leverages cloud native APIs for tiering the backups without consuming compute resources to maximize cost saving capabilities.

In addition, immutability settings for backups in AWS can now be managed within the Zerto user interface. Zerto users can set how long backups can remain unaltered in order to safeguard cloud backups from malicious deletion or modification of data, such as from ransomware.

Zerto 9.0 will also offer a range of other new features including Enhanced Backup Management, Instant VM Restore From journal and File Restore from LTR. Each of these capabilities help users to maximize cloud data management and protection. Zerto 9.0 will be available in July 2021.

“Cloud-native and containerized apps and infrastructure are quickly coming down the pike – if they are not already the reality. As these resources become business critical, enterprise IT must be prepared to protect them. Additionally, the pandemic has increased usage of cloud infrastructure – including for immutable long-term retention storage to combat ransomware. Zerto 9.0 is an important step forward for the company in providing capabilities that help customers address these needs,” commented Krista Macomber, senior analyst, Evaluator Group**.

“These significant announcements play an important role in unlocking continuous protection and extend Zerto’s position at the forefront of innovation for cloud data management and protection,” commented Deepak Verma, vice president, product, Zerto. “Organizations that are building their future around cloud native architectures need to have full confidence in the integrity of their infrastructure, resilience, and their ability to recover from issues such as cyberattacks and technology failures without delay. These solutions both deliver on those objectives.”

To learn more, go to the ZertoCON 2021 Virtual page to access all sessions.

Premier sponsors of ZertoCON 2021 Virtual are AWS, Google, IBM, and Microsoft.

*Source: ESG Survey, Data Protection Trends and Strategies for Containers, September 2020.

** Access Evaluator Group’s Product Brief on Zerto on evaluatorgroup.com

About Zerto

Zerto helps customers accelerate IT transformation through a single, scalable platform for cloud data management and protection. Built for enterprise scale, Zerto’s simple, software-only platform uses continuous data protection to converge disaster recovery, backup, and data mobility and eliminate the risks and complexity of modernization and cloud adoption. Zerto enables an always-on customer experience by simplifying the protection, recovery, and mobility of applications and data across private, public, and hybrid clouds. Zerto is trusted by over 9,000 customers globally and is powering offerings for Microsoft Azure, IBM Cloud, AWS, Google Cloud, Oracle Cloud, and more than 450 managed service providers.

Derrick Shannon
Touchdown PR
[email protected]


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.