These days we often hear of cyber-attacks, breaches and demands for ransomware that have a global and negative impact on any business.
IBM Storage Defender is a software solution designed for Cyber Resilience. It protects your enterprise by keeping your data safe and workloads available.
IBM Storage Defender Data Resiliency Service (DRS) offers various capabilities around governance, compliance, AI-enabled early threat detection, recovery and a centralized dashboard.
DRS has an existing capability of defining a 'Recovery Group' i.e. a collection of related resources of the same workload type like Virtual Machines or database servers or volumes.
Storage and Backup Admins, need to go a step further to define multiple applications that can each be mapped to a particular business function. E.g., a payroll or ordering system. It becomes extremely important to identify what are the various components, needed to bring up any particular application. It can be a mix of multiple workloads E.g., Virtual Machines, Database servers, Web servers etc.
DRS has recently introduced a new capability to define 'Applications'. A set of logically grouped recovery groups, becomes an application.
DRS Applications
This also helps define and represents an order of operations, to recover the entire application. A recovery group can be a pre-requisite for another recovery group within the application. E.g., in the above diagram, RG1 needs to be recovered first, followed by RG2 and RG3 in parallel and RG4 at the end.
Building these DRS Applications, helps to get a comprehensive view of your enterprise's resiliency posture and provides an improved understanding of your environment. Details on any active threats or alerts can be visualized in the centralized DRS Dashboard, and necessary actions can be taken easily. It helps admins prioritize how can they recover all or part of the business, in an appropriate sequence. And ultimately get key functions back online as quickly as possible.
DRS Dashboard showing Application summary for a customer
For more details on how to build and gain deep insights into your application's storage dependencies, gaps and recovery points, please follow:
https://www.ibm.com/docs/en/storage-defender/base?topic=groupings-applications