A customer has two non-dependent applications that are protected with a Dell EMC Isolated Recovery Solution. Application A has been compromised and Application B is not compromised. The customer wants to understand how the recovery of Application A impacts Application B.
How is Application B affected by the recovery process of Application A?
Currently there are no comments in this discussion, be the first to comment!