Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Migrating & Securing Apps on Red Hat OpenShift with Kasten

Veeam
03/13/2026
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Traditional backup solutions cannot properly protect Kubernetes applications due to fundamental platform differences, requiring purpose-built solutions like Veeam Kasten that understand cloud-native architecture and operations.
  • Veeam Kasten 7.0 delivers enterprise-grade Kubernetes data protection with FIPS 140-3 compliance, ransomware defense through immutable backups, and seamless multi-cloud migration capabilities across hybrid environments.
  • The live demonstration proves Kasten can migrate applications between OpenShift on Azure and ROSA on AWS with automated transformation policies that handle storage class changes and networking reconfiguration without manual intervention.
  • OpenShift Virtualization support enables organizations to protect both traditional cloud-native applications and virtual machines with a single solution, addressing the growing market demand for VMware alternatives.
  • Kasten deploys via Red Hat OperatorHub or Helm charts, supports air-gapped environments, and offers consumption-based licensing through Azure Marketplace with per-worker-node hourly billing for cloud deployments.

Kubernetes Data Protection Challenges

The session opens with critical market context: 74% of organizations mistakenly believe traditional and container-based applications can be backed up the same way, while 85% have experienced ransomware attacks in the past year. Alexandre Ivec-Arnec, Global Manager of Kasten Pre-Sales, addresses the fundamental challenge that Kubernetes platforms require purpose-built data protection solutions distinct from traditional VM backup approaches. The presentation emphasizes that while Kubernetes adoption in production environments is accelerating, many organizations lack the specialized skills needed for effective backup and recovery operations in cloud-native environments. This skills gap is compounded by the fact that backup teams, traditionally responsible for data protection, often have limited Kubernetes expertise.

Multi-Cloud Strategy and OpenShift Focus

The webinar establishes that 97% of businesses require a mix of cloud and on-premise resources, with 50% planning to increase their number of cloud providers. Veeam Kasten positions itself as the solution for managing Kubernetes data protection across hybrid and multi-cloud environments, with particular emphasis on Red Hat OpenShift deployments. The demonstration specifically showcases Red Hat OpenShift on AWS (ROSA), highlighting how Kasten enables seamless application migration between different cloud environments while maintaining data integrity. The presentation addresses the growing market interest in OpenShift Virtualization as a VMware alternative, demonstrating Kasten's ability to protect both traditional cloud-native applications and virtual machines running on OpenShift.

Kasten 7.0 Capabilities and Live Migration Demo

The technical demonstration walks through a complete application migration scenario using Veeam Kasten 7.0, the latest major release featuring FIPS 140-3 compliance, Azure Blob immutability support, and enhanced OpenShift integration. The live demo shows backing up a Pacman application with MongoDB from OpenShift on Azure and restoring it to ROSA on AWS, including the use of transformation policies to handle storage class changes and networking reconfiguration. Key features highlighted include the Kasten operator available in Red Hat's OperatorHub, support for OpenShift Virtualization workloads, ImageStream backup capabilities, and the transformation engine that enables seamless cross-cloud migrations. The demonstration proves that Kasten can protect diverse workload types—from stateful applications to virtual machines—with consistent, policy-driven automation across different Kubernetes distributions and cloud providers.

Chapters

0:00 - Introduction and Session Overview
1:40 - Market Context and Challenges
4:47 - Hybrid and Multi-Cloud Strategy
8:01 - Kubernetes Stateful Applications
21:45 - Cloud-Native Application Differences
22:48 - Veeam Kasten 7.0 Features
24:58 - OpenShift Integration Capabilities
28:28 - Demo Setup and Environment
50:44 - Transformation Policies Configuration
52:49 - Application Restore Process
54:15 - Verification and Testing
56:53 - Session Wrap-up and Resources

Key Quotes

2:20 "... 74% of organizations are still thinking that traditional and container based applications can be backed up the same way. Obviously, you will see during this presentation that they cannot be backed up the same way, simply because between the platform running virtual machines or bar metal servers and Kubernetes platform running applications, the platform itself is just completely different."
2:43 "... 85% of companies that have experienced at least one ransomware attack in the past year. The thing that is interesting when you start digging into Kubernetes, especially when it comes to talk about Kubernetes environment in production, still a lot of customers right now are at the beginning of the adoption of Kubernetes in production."
4:32 "... 75% of organizations indicate a skills shortage on their Kubernetes backup and recovery chain. This is one of the very difficult topics that we have right now."
6:40 "... 97% of customers on the market agreed their business requires a mix of cloud and on-premise resources. This one is right now really a kind of standard situation that we are seeing on a daily basis."
23:48 "We used to release almost every six months a major version of Kasten. On a regular basis, we release every two weeks a new version of our product because we are capable to provide enhancement, fix bug, fix security issue, add additional features in a very fast way."
24:53 "Since the 7.0 release, Kasten K10 can be deployed in a such type of environment."
25:27 "OpenShift virtualization is simply the way to not only run regular cloud native application on OpenShift, but also virtual machines."
27:43 "The licensing model of Kasten is based on the number of worker nodes that you have in a given cluster. And if you need to leverage the public cloud for the scalability, and if you have a huge spike for a couple of hours in your cluster, you will be capable to pay Kasten just for the few hours based on the number of worker nodes that you will consume."
29:27 "One of the hottest topic right now with OpenShift is the support of OpenShift virtualization. As you can probably see on the market, there is a lot of discussions and topics ongoing about alternatives to VMware, Red Hat OpenShift virtualization is one of them."
51:15 "We can leverage the transformation engine that is available on the Vimkasten platform. And I have created in advanced two specific transform actions. One that is going to change the name of the storage class in the definition of the PVC. And the second one that will let the route that will be restored by Kasten to fetch the proper DNS name from the Rosa cluster on AWS."

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Data Protection
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Technical Deep Dive
  • Demo
  • Best Practices
  • Kubernetes Data Protection
  • Red Hat OpenShift
  • Multi-Cloud Migration
  • OpenShift Virtualization
  • Ransomware Defense
  • Cloud-Native Backup
  • ROSA
  • Red Hat OpenShift on AWS
  • Container Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Migrating & Securing Apps on Red Hat OpenShift with Kasten

              Upcoming Webinar Calendar

              • 05/06/2026
                02:00 AM
                05/06/2026
                Harnessing AI to Identify Attacks Before They Escalate into Breaches
                https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-attacks-before-they-escalate-into-breaches/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Existing Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Next Steps for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-next-steps-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Insights
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-insights/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Across All Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-across-all-phases/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Illusion into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-illusion-into-purposeful-mastery/

              Upcoming Events

              • May
                06

                Harnessing AI to Identify Attacks Before They Escalate into Breaches

                05/06/202602:00 AM ET
                • May
                  06

                  World Password Day: Strategies for Managing Your Existing Passwords

                  05/06/202610:00 PM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Passwords Effectively

                    05/07/202605:00 AM ET
                    • May
                      07

                      World Password Day: Next Steps for Managing Your Passwords Effectively

                      05/07/202601:00 PM ET
                      • May
                        12

                        Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                        05/12/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version