Trilio Introduces Comprehensive Ransomware Protection and Recoverability for Cloud-Native Applications
Retrieved on:
Wednesday, September 15, 2021
Internet, Security, Data Management, Technology, Software, Zero, Microsoft, NIST, IDC, IAM, Ransomware, TVK, CEO, Efficiency, OIDC, NIST Cybersecurity Framework, OpenStack, Identity management, Ecosystem, Electronic Key Management System, Data integrity, Disaster, National Cybersecurity Center of Excellence, KMS, LinkedIn, Red, Sound, Solution, WannaCry ransomware attack, Data, Red Hat Virtualization, Twitter, Mitigation, LUKS, AWS, LDAP, Organization, Research, OpenShift, Time, National Institute, National Cybersecurity Center, National Institute of Standards and Technology, Metadata, Medical device, Risk management, Computer data storage, Mobile phone, Video game console, TrilioVault for Kubernetes, Trilio, TRILIOVAULT FOR KUBERNETES, TRILIO
Trilio , a leading provider of cloud-native data protection, today announced the release of TrilioVault for Kubernetes (TVK) v2.5, which offers a comprehensive approach to ransomware protection and recoverability in alignment with the National Institute of Standards and Technology (NIST) Cybersecurity Framework and in support of Zero-Trust architectures.
Key Points:
- Trilio , a leading provider of cloud-native data protection, today announced the release of TrilioVault for Kubernetes (TVK) v2.5, which offers a comprehensive approach to ransomware protection and recoverability in alignment with the National Institute of Standards and Technology (NIST) Cybersecurity Framework and in support of Zero-Trust architectures.
- All TVK ransomware protection features today and beyond will align to this framework.
- Today, Trilio announced the following capabilities with TVK v2.5 to provide comprehensive ransomware protection:
Backup Immutability: Ability to create immutable backups to protect against any malicious attempts to modify or delete the backups. - Trilio is a leader in cloud-native data protection for Kubernetes, OpenStack and Red Hat Virtualization environments.