This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here
TheStreet Open House

Five Challenges Of Modern Application Recovery And How To Alleviate Them (Graphic: Business Wire)

Quest Software, Inc. (NASDAQ: QSFT)

In response to such trends as rampant growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational tolerance for downtime, businesses large and small are reprioritizing their data protection objectives. A recent Quest Software survey indicates that nearly three-quarters of organizations now rank restoring critical applications alongside recovering lost data as their top data protection concern. The shift in focus from recovering lost data to restoring critical applications, however, presents a whole new set of backup and recovery challenges. Quest Software has identified five common application recovery challenges, along with best practices for ensuring the rapid recoverability of these critical assets.

Tweet This: Five application recovery challenges and how to address them http://bit.ly/NjxXSw

Five Challenges of Modern Application Recovery and How to Alleviate Them

  1. Not all applications are the same – Applications have varying degrees of value to the business, and must be protected accordingly. For example, the application powering the finance department’s transactional database needs to be held to a stricter SLA than an application less critical to business operations. This means organizations need to be strategic about setting application recovery objectives. One-size-fits-all recovery will not suffice. The Fix: Develop a tiered recovery strategy – If all applications aren’t the same, then the recovery strategy assigned to each of those assets shouldn’t be the same, either. Organizations should align the backup and recovery strategy for a given application with the criticality of that application to the business. The more critical the application, the more aggressive the recovery objective should be.
  2. Many critical applications are now virtualized – With virtualization the norm in most of today’s data centers, a growing number of organizations are virtualizing their mission-critical applications. Problematically, many traditional backup solutions only enable image-level backups; so, to recover just a single lost item, admins must restore the entire VM on which an application is running. The Fix: Implement application-aware VM backup – Organizations should make it a priority to use a VM backup solution that’s truly application-aware and contains a searchable catalog. This will provide the capability to search for specific items, and conduct granular restores. Being able to recover a single Microsoft Exchange mailbox, or even a single attachment, without having to restore the entire VM is critical to meeting aggressive application recovery objectives.
  3. Most strategies require a two-step restore – Restoring critical applications is often a two-step, two-person process that can be both arduous and time consuming. In most cases, the backup admin is only capable of restoring the image of the data. The application administrator then needs to reconfigure the underlying application. The Fix: Enable role-based access – By providing application administrators with direct visibility into the recoverability of the specific IT services they are responsible for managing, and enabling them to leverage specialized data protection tools to perform granular backup and recovery tasks, IT can bypass the time-consuming, two-step recovery process that makes restoring applications so challenging with traditional backup strategies.
  4. Modern IT infrastructure is fluid – The reality of today’s mixed physical, virtual, and cloud environments is that application assets no longer necessarily reside in the same place in the underlying IT infrastructure. Some application assets may reside on a physical server, some may reside on a virtual machine, and some may even reside off-premise. Truly restoring an application in this complex environment requires a search of multiple backups, in multiple locations, to collect all the necessary components. The Fix: Protect services, not servers – Choose a data protection solution that provides the capability to organize, schedule, view, and manage backups based on services, rather than servers. This will enable admins to group all relevant assets associated with a given application – including servers, virtual machines, and databases – into an application group against which they can directly set and manage recovery SLAs.
  5. Corruptions create vulnerability – Many organizations have implemented high-availability, replication-centric solutions designed to protect mission-critical data and applications. However, in the event of a corruption, not only is data replicated, but so, too, is the command or error that caused the corruption in the first place. Without the ability to restore an application to a point in time before a corruption occurred, organizations still are exposed to risk. The Fix: Leverage continuous data protection (CDP) – With true CDP solutions such as Quest NetVault® FastRecover, IT can restore critical applications back to any point in time. This provides protection against corruptions that might otherwise wipe out an entire application.

Supporting Quote:

Walter Angerer, senior vice president and general manager, Data Protection, Quest Software

“The role of backup and recovery continues to evolve. Administrators no longer are consumed by legacy data protection challenges like breaking the backup window and ensuring the organization has at least one good copy of its data. Instead, restoring the critical applications that power business and technology services has become the top priority. By investing in application-aware technologies and building a holistic backup and recovery strategy that emphasizes the need to quickly restore these critical assets, organizations will be better prepared to meet the data protection challenges of the modern world.”

1 of 2

Select the service that is right for you!

COMPARE ALL SERVICES
Action Alerts PLUS
Try it NOW

Jim Cramer and Stephanie Link actively manage a real portfolio and reveal their money management tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
  • Weekly roundups
TheStreet Quant Ratings
Try it NOW
Only $49.95/yr

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
  • Upgrade/downgrade alerts
Stocks Under $10
Try it NOW

David Peltier, uncovers low dollar stocks with extraordinary upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
  • Weekly roundups
Dividend Stock Advisor
Try it NOW

Jim Cramer's protege, David Peltier, identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Alerts when market news affect the portfolio
  • Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
Real Money Pro
Try it NOW

All of Real Money, plus 15 more of Wall Street's sharpest minds delivering actionable trading ideas, a comprehensive look at the market, and fundamental and technical analysis.

Product Features:
  • Real Money + Doug Kass Plus 15 more Wall Street Pros
  • Intraday commentary & news
  • Ultra-actionable trading ideas
Options Profits
Try it NOW

Our options trading pros provide daily market commentary and over 100 monthly option trading ideas and strategies to help you become a well-seasoned trader.

Product Features:
  • 100+ monthly options trading ideas
  • Actionable options commentary & news
  • Real-time trading community
  • Options TV
To begin commenting right away, you can log in below using your Disqus, Facebook, Twitter, OpenID or Yahoo login credentials. Alternatively, you can post a comment as a "guest" just by entering an email address. Your use of the commenting tool is subject to multiple terms of service/use and privacy policies - see here for more details.
Submit an article to us!
DOW 17,043.73 -27.49 -0.16%
S&P 500 1,971.20 -6.60 -0.33%
NASDAQ 4,492.3120 -13.54 -0.30%

Brokerage Partners

Rates from Bankrate.com

  • Mortgage
  • Credit Cards
  • Auto

Free Newsletters from TheStreet

My Subscriptions:

After the Bell

Before the Bell

Booyah! Newsletter

Midday Bell

TheStreet Top 10 Stories

Winners & Losers

Register for Newsletters
Top Rated Stocks Top Rated Funds Top Rated ETFs