Welcome to the quarterly product blog series! At Druva, we are committed to product innovation that aligns with customer feedback and needs. Our 100% SaaS offering allows us to innovate faster and make these features instantly available to our customers—no more downloads, updates, or waiting for patches. In this blog series, we will cover some of the key products and features that we have recently launched or enhanced. For more details and information on additional features not covered here, be sure to check out our product documentation.
Airgapped Data Protection for Amazon RDS
At the time of recovery, your backups need to be available. The 3-2-1 rule ensures availability with 3 copies, 2 locations, and 1 offsite, air-gapped copy. Druva takes this a step further with air-gapped data protection for Amazon RDS, offering:
Fully decoupled backups - Protect against breaches and ransomware by isolating backups from your AWS organization.
Immutable backups - Tamper-proof and guaranteed recoverable with advanced data lock features.
Simplified backup management - Manage RDS and AWS workloads like EC2 from a single SaaS-based console—no infrastructure setup needed.
Broader AWS coverage - Secure not just Amazon RDS but also Amazon DocumentDB and Amazon Neptune with the same air-gapped protection.
Cost-efficiency - Eliminate redundant copies and reduce cross-region transfer fees with Druva’s streamlined solution.
With Druva’s air-gapped solution, businesses can achieve peace of mind knowing their critical Amazon RDS backups are securely isolated and always ready for restoration. More information.
Threat Hunting for Amazon EC2
Druva introduces Threat Hunting for Amazon EC2 Backups—an advanced solution to detect and address threats in your backup data. This feature adds value to Druva’s AWS customers by ensuring compromised backup data is never restored. It supports both incident response and proactive IOC scanning to address complex security challenges and complements cybersecurity tools like SIEM and XDR. Here are a few benefits of this feature:
IOC scanning - Proactively scans backup data for hidden threats that may bypass traditional cybersecurity tools. Threat hunting identifies, quarantines, and removes compromised files, eliminating reinfection risks.
Customizable threat scanning - Define scope, IOC parameters, scan depth, and frequency to tailor threat hunts to your needs.
Rapid incident response - Threat hunting bridges the gap between IT and security teams by providing critical backup data insights. It allows security teams to assess breach scope and timeline, enabling faster response and clean recovery.
Centralized threat management - Eliminate threats across your entire data environment by quickly identifying suspicious patterns, file types, or IOCs.