Skip to content
Security Lock

We are excited to announce the general availability of Version 2.0 of K10, Kasten’s cloud-native data management platform. Already resonating with enterprise operations professionals interested in addressing critical Day 2 issues, K10 version 2.0 includes important new features that address two of the greatest pain points plaguing expanding Kubernetes deployments today: security and operational simplicity.

Security to Keep Your Data Safe

Arguably among your most precious resources, the safety of your corporate data is paramount, not only for regulatory compliance but also as a matter of sound, ethical business practice. With K10, customers can draw on a comprehensive set of enterprise security features so that the CISOs and CDOs can sleep easy. Key security features include:

K10 v2.0 Security Features

  • Kubernetes Authentication: out of the box support for K8s authentication so that K10 can fit in seamlessly with the Kubernetes security model. Examples include:

    • OpenID Connect (OIDC): you have the option to use secure, short-lived tokens and make use of this preferred method for authenticating in Kubernetes environments

    • Token Authentication: you can use Kubernetes account tokens

  • AWS Identity and Access Management (IAM) roles: AWS’ web service for secure access control (authentication and authorization), leveraging the same controls for all of your AWS resources

  • Role Based Access Control (RBAC): using Kubernetes’ own fine-grained role-based access control that helps ensure users only have access to what they need

  • Encryption: end-to-end encryption of application/ configuration/ data and associated metadata artifacts in-flight and at-rest

  • Customer-Managed Encryption Keys: management of encryption keys by customers protects their data by ensuring that only they (and not Kasten) have access to their data

Operational Simplicity

Backup and mobility are important Day 2 considerations when it comes to deploying Kubernetes applications in production. After all, in any environment of scale, there will be situations that call for reverting to earlier revisions, recovering from disasters and migrating workloads flexibly. Yet, no one in charge of operations wants to deal with more of the operational overhead to provide these capabilities. K10 has several features that help simplify operations from initial deployment through on-going operations:

K10 v2.0 Dashboard

  • Management Interface: easy-to-use, state-of-the-art, web-based user interface for global visibility, and establishing and managing policies

  • Kubernetes API: provides a Kubernetes-native API for programmatic control. This choice allows us to not only implement a desired-state system like the rest of Kubernetes, it also allows our APIs to be invoked by the native kubectl tool that you are already familiar with. Further, since most popular 3rd party software management tools (e.g. for CI/CD) have kubectl hooks, incorporating K10 into your environment is easy with Kubernetes-native Custom Resources (CRs) such as:

    apiVersion: config.kio.kasten.io/v1alpha1
    kind: Policy
    metadata:
      name: sample-policy
      namespace: kasten-io
    spec:
      comment: My sample backup policy
      frequency: '@daily'
      retention:
        hourly: 24
        daily: 7
      actions:
      - action: backup
      selector:
        matchLabels:
          k10.kasten.io/appNamespace: sampleApp
  • Auto-Discovery: automatically scans the environment upon deployment and identifies all applications and their components requiring protection; even as these applications change from day to day.

  • Policy-Driven: supports automated enforcement of protection policies to support SLAs and compliance needs

  • Multi-Tenancy: straightforward support for multiple customers or internal business units

  • Advanced Monitoring and Logging: to use with your preferred monitoring tool or advanced analytics system

An Ecosystem Rich Enough to Meet Your Needs

When it comes to enterprise environments, not only is scale a given, but so is the diversity of systems and platform options available to developers and operators. With K10 you have the flexibility to deploy with the confidence that you are not sacrificing choice or being restricted to only a few deployment models. To provide you with freedom of choice, K10 integrates with all major ecosystem options:

  • Kubernetes Distributions: including all major cloud-based managed Kubernetes offerings such as Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), IBM Kubernetes Service (IKS) and all leading on-prem distributions such as upstream Kubernetes, Rancher, Pivotal Container Service/VMware Tanzu, and Red Hat OpenShift.

  • Data Services: including support for Postgres, MongoDB, Elastic, AWS RDS, MySQL, and Cassandra.

  • Storage providers: including deep, native support for VMware First Class Disk (FCD), first-class integration for the Container Storage Interface (CSI), support for Ceph, NetApp Trident, all storage systems found in the major clouds, and a lot more.

Get Started Today!

You can try the fully-featured and free Starter Edition of K10 2.0 today. We are also available in the GKE (free trial option available) and the EKS marketplaces. To learn more about K10, please visit the product page, check out the K10 datasheet, watch our recent webinars, and read the documentation.

Download Free Kasten K10

logo-aws-color

logo-azure-color

logo-digital-ocean-color

logo-google-cloud-color

logo-kubernetes-color

logo-openshift-color

logo-suse-rancher-color

logo-k3s-color

logo-vmware-tanzu-color

For information about Kasten K10

Contact Us

For information about Kasten K10, please send us a message using the form on this page, or email us at contact@kasten.io

For product support: Open a case via Veeam
Community support: Veeam Community

Address:

Kasten, Inc. 
8800 Lyra Drive, Suite 450
Columbus, Ohio 43240

We value the critical role that the security community plays in helping us protect the confidentiality, integrity, and availability of our software, services, and information. If you have information about security vulnerabilities that affect Kasten software, services, or information, please report it to us via our HackerOne Vulnerability Disclosure Program, or anonymously via this form.

Please Send Us a Message