Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Migrating & Securing Apps on Red Hat OpenShift with Kasten

Veeam
03/13/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Traditional backup solutions cannot properly protect Kubernetes applications due to fundamental platform differences, requiring purpose-built solutions like Veeam Kasten that understand cloud-native architecture and operations.
  • Veeam Kasten 7.0 delivers enterprise-grade Kubernetes data protection with FIPS 140-3 compliance, ransomware defense through immutable backups, and seamless multi-cloud migration capabilities across hybrid environments.
  • The live demonstration proves Kasten can migrate applications between OpenShift on Azure and ROSA on AWS with automated transformation policies that handle storage class changes and networking reconfiguration without manual intervention.
  • OpenShift Virtualization support enables organizations to protect both traditional cloud-native applications and virtual machines with a single solution, addressing the growing market demand for VMware alternatives.
  • Kasten deploys via Red Hat OperatorHub or Helm charts, supports air-gapped environments, and offers consumption-based licensing through Azure Marketplace with per-worker-node hourly billing for cloud deployments.

Kubernetes Data Protection Challenges

The session opens with critical market context: 74% of organizations mistakenly believe traditional and container-based applications can be backed up the same way, while 85% have experienced ransomware attacks in the past year. Alexandre Ivec-Arnec, Global Manager of Kasten Pre-Sales, addresses the fundamental challenge that Kubernetes platforms require purpose-built data protection solutions distinct from traditional VM backup approaches. The presentation emphasizes that while Kubernetes adoption in production environments is accelerating, many organizations lack the specialized skills needed for effective backup and recovery operations in cloud-native environments. This skills gap is compounded by the fact that backup teams, traditionally responsible for data protection, often have limited Kubernetes expertise.

Multi-Cloud Strategy and OpenShift Focus

The webinar establishes that 97% of businesses require a mix of cloud and on-premise resources, with 50% planning to increase their number of cloud providers. Veeam Kasten positions itself as the solution for managing Kubernetes data protection across hybrid and multi-cloud environments, with particular emphasis on Red Hat OpenShift deployments. The demonstration specifically showcases Red Hat OpenShift on AWS (ROSA), highlighting how Kasten enables seamless application migration between different cloud environments while maintaining data integrity. The presentation addresses the growing market interest in OpenShift Virtualization as a VMware alternative, demonstrating Kasten's ability to protect both traditional cloud-native applications and virtual machines running on OpenShift.

Kasten 7.0 Capabilities and Live Migration Demo

The technical demonstration walks through a complete application migration scenario using Veeam Kasten 7.0, the latest major release featuring FIPS 140-3 compliance, Azure Blob immutability support, and enhanced OpenShift integration. The live demo shows backing up a Pacman application with MongoDB from OpenShift on Azure and restoring it to ROSA on AWS, including the use of transformation policies to handle storage class changes and networking reconfiguration. Key features highlighted include the Kasten operator available in Red Hat's OperatorHub, support for OpenShift Virtualization workloads, ImageStream backup capabilities, and the transformation engine that enables seamless cross-cloud migrations. The demonstration proves that Kasten can protect diverse workload types—from stateful applications to virtual machines—with consistent, policy-driven automation across different Kubernetes distributions and cloud providers.

Chapters

0:00 - Introduction and Session Overview
1:40 - Market Context and Challenges
4:47 - Hybrid and Multi-Cloud Strategy
8:01 - Kubernetes Stateful Applications
21:45 - Cloud-Native Application Differences
22:48 - Veeam Kasten 7.0 Features
24:58 - OpenShift Integration Capabilities
28:28 - Demo Setup and Environment
50:44 - Transformation Policies Configuration
52:49 - Application Restore Process
54:15 - Verification and Testing
56:53 - Session Wrap-up and Resources

Key Quotes

2:20 "... 74% of organizations are still thinking that traditional and container based applications can be backed up the same way. Obviously, you will see during this presentation that they cannot be backed up the same way, simply because between the platform running virtual machines or bar metal servers and Kubernetes platform running applications, the platform itself is just completely different."
2:43 "... 85% of companies that have experienced at least one ransomware attack in the past year. The thing that is interesting when you start digging into Kubernetes, especially when it comes to talk about Kubernetes environment in production, still a lot of customers right now are at the beginning of the adoption of Kubernetes in production."
4:32 "... 75% of organizations indicate a skills shortage on their Kubernetes backup and recovery chain. This is one of the very difficult topics that we have right now."
6:40 "... 97% of customers on the market agreed their business requires a mix of cloud and on-premise resources. This one is right now really a kind of standard situation that we are seeing on a daily basis."
23:48 "We used to release almost every six months a major version of Kasten. On a regular basis, we release every two weeks a new version of our product because we are capable to provide enhancement, fix bug, fix security issue, add additional features in a very fast way."
24:53 "Since the 7.0 release, Kasten K10 can be deployed in a such type of environment."
25:27 "OpenShift virtualization is simply the way to not only run regular cloud native application on OpenShift, but also virtual machines."
27:43 "The licensing model of Kasten is based on the number of worker nodes that you have in a given cluster. And if you need to leverage the public cloud for the scalability, and if you have a huge spike for a couple of hours in your cluster, you will be capable to pay Kasten just for the few hours based on the number of worker nodes that you will consume."
29:27 "One of the hottest topic right now with OpenShift is the support of OpenShift virtualization. As you can probably see on the market, there is a lot of discussions and topics ongoing about alternatives to VMware, Red Hat OpenShift virtualization is one of them."
51:15 "We can leverage the transformation engine that is available on the Vimkasten platform. And I have created in advanced two specific transform actions. One that is going to change the name of the storage class in the definition of the PVC. And the second one that will let the route that will be restored by Kasten to fetch the proper DNS name from the Rosa cluster on AWS."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Technical Deep Dive
  • Demo
  • Best Practices
  • Kubernetes Data Protection
  • Red Hat OpenShift
  • Multi-Cloud Migration
  • OpenShift Virtualization
  • Ransomware Defense
  • Cloud-Native Backup
  • ROSA
  • Red Hat OpenShift on AWS
  • Container Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Migrating & Securing Apps on Red Hat OpenShift with Kasten

              Upcoming Webinar Calendar

              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Unpacking Insights from the Keepit Annual Data Report 2026 on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/unpacking-insights-from-the-keepit-annual-data-report-2026-on-saas-data-protection/

              Upcoming Events

              • Mar
                18

                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                03/18/202601:00 PM ET
                • Mar
                  19

                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                  03/19/202611:00 AM ET
                  • Mar
                    19

                    Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                    03/19/202601:00 PM ET
                    • Mar
                      26

                      Reclaim Network Clarity and Accountability with Netskope DEM

                      03/26/202601:00 AM ET
                      • Mar
                        26

                        ITDR's Role in Strengthening Critical Security Architecture

                        03/26/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version