As enterprise customers across industry verticals accelerate their digital transformation journeys, they are aggressively developing new modern customer-centric applications  and deploying these on next generation distributed data platforms such as MongoDB, DataStax, Cassandra, Couchbase, Apache Hadoop, Amazon DynamoDB, Google BigTable.  As a result, , security is becoming an increasing concern. There have been several large scale incidents of publicly acknowledged ransomware attack recently. No enterprise wants to be on that list where hackers can get access to sensitive IT data or organization data or the worse of all – your customer data.  Controlling access and encrypting data communications has become a key concern of business compliance and data security standards for every IT organization.

Backup and recovery is a critical component to weather through ransomware attacks and of an overall enterprise security strategy (edge to core data center to devices to employee data). To ensure complete security, an enterprise backup and recovery solution must integrate seamlessly with various standard security protocols and mechanisms used by enterprises. To enable enterprises to leverage strict security best practices, while running their mission critical applications on next-generation database platforms such as Apache Cassandra and MongoDB, we are introducing enhanced enterprise security capabilities in RecoverX 2.5:

Authentication

  • Kerberos Authentication – Kerberos is a widely adopted and a standard secure protocol for network authentication between trusted hosts across an untrusted network or insecure network. RecoverX now integrates with Kerberos centralized authentication technology. This enables RecoverX to work seamlessly in a highly secure environment to access protected data sources that use Kerberos authentication.

Authorization

  • LDAP Authorization – LDAP (Lightweight Directory Access Protocol) is a widely adopted secure protocol for Identity Management of authenticated systems. Authorization of roles and privileges is controlled using LDAP. With LDAP support RecoverX integrates with secure Identity Management of the data sources it is protecting.  This extends RecoverX support for enterprise authorization – RecoverX is already integrated with cloud-native identity management tools such as IAM roles in Amazon Web Services (AWS) and OAuth2.0 in Google Cloud Platform (GCP).

Encryption

  • TLS/SSL Encryption – TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are encryption protocols that provide secure communications between systems over a computer network. These protocols provide privacy and data integrity between applications. With TLS/SSL support RecoverX utilizes a secure transfer protocol to communicate with the data sources (such as Cassandra, DataStax, MongoDB, and other databases) it is protecting for backup and recovery needs.

Strong authentication, authorization and encryption is the base of enterprise security for business critical applications and data – more so as enterprises accelerate their adoption of public cloud resources. With support for these enterprise security protocols, RecoverX 2.5 integrates seamlessly in any highly secure enterprise data center and extends it leadership as the industry leading backup and recovery solution for modern cloud applications and databases running on-premises or in public cloud environments.

For additional insight on all of these new features check out our new RecoverX 2.5 product page and register to watch product webinar. You can also check out all of our customer case studies here.

If you’re ready to try Datos IO for  yourself, simply register here for a free trial.  Take The Tesla Of The Backup on a ride on Amazon Web Services (AWS) platform, on all us!