Menu

Kubernetes Data Protection – Addressing Ransomware Threats and Maintaining DevOps Agility

Kubernetes is here, and it is here to stay. According to Evaluator Group primary research, not only are most enterprises already using or planning to use Kubernetes, they are using Kubernetes for production workloads. We typically associate container environments and Kubernetes with cloud-native applications, and supporting these in production remains a leading use case. We are also seeing customers refactored VMware workloads for container infrastructures. No longer an infrastructure just for test/dev use cases, Kubernetes is now being used to support a range of business-critical workloads.

Unfortunately, because Kubernetes adoption is developer-driven, happening outside of the control of central IT, many organizations are delaying and neglecting protection of Kubernetes applications and their persistent data. Adoption is proceeding faster than enterprise-level protection, creating protection gaps that lead to the risk for data loss and downtime of business services. Proper management and protection is required as Kubernetes implementations support critical workloads, and as they operate at larger scale.

Why do Kubernetes workloads need to be protected? Evaluator Group consistently hears from customers that getting applications and business services back up and running as quickly as possible following an outage is a key concern, especially with how rampant ransomware has become. Like any platform, Kubernetes has vulnerabilities. For example, recently a vulnerability was found in CRI-O, a container runtime engine for Kubernetes, that allowed for root access to the host. Adding to its security risk posture, Kubernetes is an open-source platform, which means it carries the risk for code bugs and misconfigurations that require updates and patches to be addressed. It is difficult for IT to keep up these vulnerabilities because Kubernetes is on a quarterly update cadence.

The influence of DevOps on Kubernetes adoption and usage increases the need for automated data protection functionality. This includes not only applying protection policies that are set by IT, but also for recovery and failback operations. For example, disaster recovery plans can provide workflows to identify backups to recover from and to reconfigure metadata and namespace mappings. Developers need to operate as quickly as possible, making self-service recovery that is controlled with an intuitive user interface with strong access control capabilities such as role-based access control (RBAC) and multi-factor authentication (MFA) also important.

Kubernetes workloads require special efforts when it comes to data protection. They are architected differently and as a result introduce new requirements compared to virtual and physical machines. Additionally, in many cases there has not been enough coordination during the application delivery to ensure that protection meets enterprise requirements. Finding a data protection solution that meets these requirements while at the same time addresses DevOps teams’ need for agility is important.

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
Snowflake's SnowWork Targets the Gap Between Data Insight and Business Action
March 25, 2026

Snowflake’s SnowWork Targets the Gap Between Data Insight and Business Action

Brad Shimmin and Nick Patience explore Snowflake’s Project SnowWork and how the Agentic Enterprise Control Plane turns the AI Data Cloud into a "system of action" for autonomous workflows across...
Mistral Forge Takes Aim at RAG. But Who Actually Needs Custom Models
March 25, 2026

Mistral Forge Takes Aim at RAG. But Who Actually Needs Custom Models?

Nick Patience, AI Platforms Practice Lead at Futurum, examines Mistral Forge, a custom enterprise AI model training platform, and argues that while its approach is sound, the addressable market may...
Oracle Positions AI Database 26ai to Lead $1.2 Trillion Market by Bridging the Agentic Reasoning Gap
March 25, 2026

Oracle Positions AI Database 26ai to Lead $1.2 Trillion Market by Bridging the Agentic Reasoning Gap

Brad Shimmin and Keith Kirkpatrick of Futurum explore Oracle's pivot to agentic plumbing. Oracle is embedding autonomous reasoning directly into Oracle AI Database 26ai to solve the enterprise data latency...
Grounding the Agentic Mandate As the Semantic Layer Market Eyes 19% Growth, Microsoft Fabric IQ Targets Leaders Prioritizing AI Investment
March 20, 2026

Grounding the Agentic Mandate: As the Semantic Layer Market Eyes 19% Growth, Microsoft Fabric IQ Targets Leaders Prioritizing AI Investment

Brad Shimmin, VP and Practice Lead at Futurum, shares insights from FabCon and SQLCon 2026 on how Microsoft is leveraging the new Database Hub and Fabric IQ to unify transactional...
NVIDIA GTC 2026 Day 1 - Can NVIDIA’s Ecosystem Accelerate the Inference Inflection
March 18, 2026

NVIDIA GTC 2026 Day 1 – Can NVIDIA’s Ecosystem Accelerate the Inference Inflection?

Brendan Burke, Research Director at Futurum, breaks down NVIDIA GTC 2026 Day 1, highlighting the NVIDIA Vera Rubin platform, the $27B Nebius-Meta deal, and how partners like HPE and Micron...
NVIDIA Agent Toolkit
March 16, 2026

At GTC 2026, NVIDIA Stakes Its Claim on Autonomous Agent Infrastructure

Nick Patience and Mitch Ashley, analysts at Futurum, examine NVIDIA's Agent Toolkit announcements at GTC 2026, covering NemoClaw, AI-Q, the Nemotron Coalition, and what they mean for enterprise agentic AI...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.