Product

Quarterly Product Pulse: October to December 2024 Product Updates

Rahul Deshmukh, VP of Product Marketing

Welcome to the quarterly product blog series! At Druva, we are committed to product innovation that aligns with customer feedback and needs. Our 100% SaaS offering allows us to innovate faster and make these features instantly available to our customers—no more downloads, updates, or waiting for patches. In this blog series, we will cover some of the key products and features that we have recently launched or enhanced. For more details and information on additional features not covered here, be sure to check out our product documentation.

Airgapped Data Protection for Amazon RDS

At the time of recovery, your backups need to be available. The 3-2-1 rule ensures availability with 3 copies, 2 locations, and 1 offsite, air-gapped copy. Druva takes this a step further with air-gapped data protection for Amazon RDS, offering:

  • Fully decoupled backups - Protect against breaches and ransomware by isolating backups from your AWS organization.  

  • Immutable backups - Tamper-proof and guaranteed recoverable with advanced data lock features.  

  • Simplified backup management - Manage RDS and AWS workloads like EC2 from a single SaaS-based console—no infrastructure setup needed.   

  • Broader AWS coverage - Secure not just Amazon RDS but also Amazon DocumentDB and Amazon Neptune with the same air-gapped protection.  

  • Cost-efficiency - Eliminate redundant copies and reduce cross-region transfer fees with Druva’s streamlined solution. 

With Druva’s air-gapped solution, businesses can achieve peace of mind knowing their critical Amazon RDS backups are securely isolated and always ready for restoration. More information.

Threat Hunting for Amazon EC2

Druva introduces Threat Hunting for Amazon EC2 Backups—an advanced solution to detect and address threats in your backup data. This feature adds value to Druva’s AWS customers by ensuring compromised backup data is never restored. It supports both incident response and proactive IOC scanning to address complex security challenges and complements cybersecurity tools like SIEM and XDR. Here are a few benefits of this feature:

  • IOC scanning - Proactively scans backup data for hidden threats that may bypass traditional cybersecurity tools. Threat hunting identifies, quarantines, and removes compromised files, eliminating reinfection risks.

  • Customizable threat scanning - Define scope, IOC parameters, scan depth, and frequency to tailor threat hunts to your needs.

  • Rapid incident response - Threat hunting bridges the gap between IT and security teams by providing critical backup data insights. It allows security teams to assess breach scope and timeline, enabling faster response and clean recovery.   

  • Centralized threat management - Eliminate threats across your entire data environment by quickly identifying suspicious patterns, file types, or IOCs.  

New threat hunt

Proactively safeguard your enterprise with Druva's flexible and integrated threat-hunting capabilities. More information.

Support for Microsoft 365 Backup Storage

Druva is excited to announce support for Microsoft 365 Backup Storage, bringing enhanced flexibility, ultra-fast recovery, and centralized management to your Microsoft 365 environments. Here’s what this update means:

  • Enhanced data protection - Back up SharePoint, OneDrive, and Exchange data within the trusted Microsoft 365 boundary, ensuring security and compliance.    

  • Lightning-fast recovery speeds - Recover data at speeds of 1–3 TB per hour, ideal for large-scale environments.   

  • Microsoft Entra ID support - Never lose access to essential user credentials. Protect and recover Microsoft Entra ID objects, keeping your business resilient against identity-related disruptions. More importantly, Druva for Entra ID is FREE for all Druva customers.

  • Unified management - Manage all backups, from SaaS apps to hybrid workloads, through a single console for maximum efficiency.  

With Druva, you get secure Microsoft 365 storage and advanced features like ultra-fast recovery and simplified management—all in one solution. More information

Get Better Insights with Power BI Integration for Tenant Consumption Reporting

Predictability and transparency in pricing are among our key objectives. To ensure smooth operations and precise billing, we have introduced Power BI integration with the Consumption Dashboard. The Power BI integration now supports dynamic data retrieval through APIs. That means no more static, outdated reports—access the most current consumption data when you need it, all automated and at your fingertips!  Here are the key benefits of this integration:

  • Detailed consumption insights: Get automated, comprehensive overviews of tenant consumption with zero manual effort required.
  • Granular Consumption Unit (CU) distribution: Break down usage across various products, including Hybrid Workloads, Endpoints, and SaaS Applications like Google Workspace and Microsoft 365.
  • Improved billing processes: Use precise consumption data to enhance billing workflows and accuracy, streamlining operations from end to end.
Power BI integration


By eliminating inefficiencies and providing real-time data, your organization can not only save time but also ensure highly accurate customer billing—turning consumption reporting into a smoother, faster, and more transparent process. More information

Simplified User Management with Automated AD/LDAP Sync in inSync

Administrators can now automatically sync users added to inSync manually or through API, as long as those users exist in your Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). Once defined, inSync can schedule automatic updates for user details at predefined intervals. This includes syncing key user information like:

  • inSync user names 

  • Email addresses 

  • AD/LDAP usernames 

With automated synchronization, inSync now handles several critical tasks, including: 

  • Importing new users from AD/LDAP who match your mapping criteria into inSync. 

  • Automatically updating details for users managed via AD/LDAP. 

  • Preserving user accounts based on their AD/LDAP status. 

  • Deleting preserved user accounts based on defined data retention policies. 

The automated sync for AD/LDAP feature makes managing users easier and more efficient than ever. More information.

Enhanced Whitelist Capability with Regex Support for Sensitive Data Governance

We have made a powerful upgrade to our Whitelist feature for Sensitive Data Governance by adding support for Regular Expression (Regex). This enhancement offers administrators greater flexibility and precision when creating whitelisting rules, helping significantly reduce false positives when scanning for compliance violations. 

With this update, you can now choose between two whitelisting options:

  • Keywords (existing option)

  • Regular Expressions (new addition)

This means you can tailor your compliance policies to skip specific keywords or patterns that might otherwise trigger unnecessary violations. For example, whitelist employee IDs or your organization's name to ensure smoother compliance scans. More information.

Introducing Support for Nutanix AHV on AWS GovCloud (US)

At Druva, we're always looking for ways to enhance our services and better meet the needs of our diverse range of customers. We're excited to announce that Druva now supports Nutanix AHV deployments on AWS GovCloud (US) for the us-gov-west-1 region! 

This update provides a secure, compliant cloud solution tailored to the needs of U.S. government agencies and their clients. Organizations can now confidently migrate sensitive data to the cloud while meeting regulatory and compliance requirements. More information.

Improved User and Device Filtering for Better Insights

We’re thrilled to announce a new enhancement to our reporting APIs—introducing the "isDeleted" filter! This feature empowers you to fine-tune your monitoring and troubleshooting efforts with greater precision and efficiency. 

The "isDeleted" filter allows you to filter reports based on the deletion status of users and devices. By leveraging this enhancement, you can quickly eliminate irrelevant data, ensuring more targeted and actionable reports. 

This new filter is now available on the following report endpoints:

  • Last Backup Status Report

  • User Provisioning Report

  • User Rollout Report

By enabling more precise filtering, this update will provide you a clearer visibility into your environment and help you make more informed decisions. More information.

Revamped Analytics Page Layout 

We have redesigned and enhanced the Analytics page for Enterprise Workloads users! This update is packed with improvements designed to make managing your data more intuitive, efficient, and centralized. Key enhancements include:

1. New Consumption Insights tab 

Gain a deeper understanding of your resource usage with the all-new Consumption Insights tab. This feature provides granular insights, including: 

  • Detailed Credits and Storage usage. 

  • Clear breakdowns of your Backup Sets information. 

No more guesswork—easily track and optimize your consumption with this improved visibility. 

2. Unified Cost & Credit Management 

We’ve integrated Cost Allocation and Credit Limits data from the Billing module directly into the Analytics page. This move provides you with a seamless, centralized hub where you can efficiently manage all your cost codes and credit limits. This means: 

  • A more streamlined experience—no need to switch between modules. 

  • A single location to track financial metrics, empowering you to stay on top of costs. 

The new layout will help you save time, reduce complexity, and enhance decision-making. From resource usage to cost management, everything you need is now in one organized place. More information

Revamped Analytics page

Auto-Configuration Rule - Handling of tag removal from VM

For VMs configured via auto-configuration rules, tag attributes applied to VMs are now periodically monitored for any changes. If you remove a tag from a VM—either in the VMware console or Druva's Management Console—our auto-configuration will kick in automatically. 

Here's what happens next:

  • Backup disabled automatically: Once a tag is removed, backup services for the VM will be automatically disabled, no manual intervention required.

  • Instant alerts: To keep you informed, you'll receive an alert notification about the tag removal and its impact on the VM backup status.

This streamlined process ensures consistent alignment between your backup configurations and your current VM setup without extra manual effort. More information.

Conclusion

This past quarter, we’ve taken significant strides to expand our capabilities, introducing features that safeguard an even broader range of workloads across diverse environments. Whether it’s strengthening ransomware recovery, improving observability, or supporting more workloads, these advancements are designed to provide seamless, uncompromising data protection.

By addressing the complex needs of modern businesses, we’re empowering you to build a more resilient strategy for managing and securing your data. Explore these new features, and see how Druva can help you protect what matters most, all within the simplicity and scalability of our cloud-native platform. Experience our product without any commitment, take a product tour.