Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
Five Application Recovery Challenges And How To Fix Them
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • Five Application Recovery Challenges And How To Fix Them

Five Application Recovery Challenges And How To Fix Them

FP Archives • February 2, 2017, 23:43:37 IST
Whatsapp Facebook Twitter

A Quest Software survey indicates that nearly three-quarters of organisations now rank restoring critical applications alongside recovering lost data as their top data protection concern.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Five Application Recovery Challenges And How To Fix Them

In response to such trends as rampant growth of mission-critical data, the proliferation of virtualisation and cloud within the datacentre, and the erosion of organisational tolerance for downtime, businesses large and small are reprioritising their data protection objectives. A recent Quest Software survey indicates that nearly three-quarters of organisations now rank restoring critical applications alongside recovering lost data as their top data protection concern. The shift in focus from recovering lost data to restoring critical applications, however, presents a whole new set of backup and recovery challenges. Quest Software has identified five common application recovery challenges, along with best practices for ensuring the rapid recoverability of these critical assets.

STORY CONTINUES BELOW THIS AD

Five Challenges Of Modern Application Recovery And How To Alleviate Them

1. Not all applications are the same – Applications have varying degrees of value to the business, and must be protected accordingly. For example, the application powering the finance department’s transactional database needs to be held to a stricter SLA than an application less critical to business operations. This means organisations need to be strategic about setting application recovery objectives. One-size-fits all recovery will not suffice.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

The Fix: Develop a tiered recovery strategy – If all applications aren’t the same, then the recovery strategy assigned to each of those assets shouldn’t be the same, either. Organisations should align the backup and recovery strategy for a given application with the criticality of that application to the business. The more critical the application, the more aggressive the recovery objective should be.

2. Many critical applications are now virtualised – With virtualisation the norm in most of today’s datacentres, a growing number of organisations are virtualising their mission-critical applications. Problematically, many traditional backup solutions only enable image-level backups; so, to recover just a single lost item, admins must restore the entire VM on which an application is running.

The Fix: Implement application-aware VM backup – Organisations should make it a priority to use a VM backup solution that’s truly application-aware and contains a searchable catalog. This will provide the capability to search for specific items, and conduct granular restores. Being able to recover a single Microsoft Exchange mailbox, or even a single attachment, without having to restore the entire VM is critical to meeting aggressive application recovery objectives.

STORY CONTINUES BELOW THIS AD

3. Most strategies requires a two-step restore – Restoring critical applications is often a two-step, two-person process that can be both arduous and time consuming. In most cases, the backup admin is only capable of restoring the image of the data. The application administrator then needs to reconfigure the underlying application.

The Fix: Enable role-based access – By providing application administrators with direct visibility into the recoverability of the specific IT services they are responsible for managing, and enabling them to leverage specialised data protection tools to perform granular backup and recovery tasks, IT can bypass the time-consuming, two-step recovery process that makes restoring applications so challenging with traditional backup strategies.

4. Modern IT infrastructure is fluid – The reality of today’s mixed physical, virtual, and cloud environments is that application assets no longer necessarily reside in the same place in the underlying IT infrastructure. Some application assets may reside on a physical server, some may reside on a virtual machine, and some may even reside off-premise. Truly restoring an application in this complex environment requires a search of multiple backups, in multiple locations, to collect all the necessary components.

STORY CONTINUES BELOW THIS AD

The Fix: Protect services, not servers – Choose a data protection solution that provides the capability to organise, schedule, view, and manage backups based on services, rather than servers. This will enable admins to group all relevant assets associated with a given application – including servers, virtual machines, and databases – into an application group against which they can directly set and manage recovery SLAs.

5. Corruptions create vulnerability – Many organisations have implemented high-availability, replication-centric solutions designed to protect mission-critical data and applications. However, in the event of a corruption, not only is data replicated, but so, too, is the command or error that caused the corruption in the first place. Without the ability to restore an application to a point in time before a corruption occurred, organisations still are exposed to risk.

The Fix: Leverage continuous data protection (CDP) – With true CDP solutions, IT can restore critical applications back to any point in time. This provides protection against corruptions that might otherwise wipe out an entire application.

STORY CONTINUES BELOW THIS AD

“The role of backup and recovery continues to evolve. Administrators no longer are consumed by legacy data protection challenges like breaking the backup window and ensuring the organisation has at least one good copy of its data. Instead, restoring the critical applications that power business and technology services has become the top priority. By investing in application-aware technologies and building a holistic backup and recovery strategy that emphasises the need to quickly restore these critical assets, organisations will be better prepared to meet the data protection challenges of the modern world,” said Walter Angerer, Senior Vice President and General Manager, Data Protection, Quest Software.

Tags
data protection Quest Software
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV