
Overview

Product video
Product update: AWS Elastic Disaster Recovery, the next generation of CloudEndure Disaster Recovery, is now the recommended service for disaster recovery to AWS. Learn more here: https://aws.amazon.com/disaster-recovery .
As of March 31, 2024, CloudEndure Disaster Recovery (CEDR) will be discontinued in all AWS Regions except for the following regions and use cases:
AWS China regions - cn-north-1 and cn-northwest-1 AWS GovCloud regions - us-gov-west-1 and us-gov-east-1 Usage in conjunction with AWS Managed Services (AMS) Usage with AWS Outposts
If there is still a need to get started with CloudEndure Disaster Recovery, subscribe on this page and then follow the instructions to register new servers.
CloudEndure Disaster Recovery is an automated IT resilience solution that lets you recover your environment from unexpected infrastructure or application outages, data corruption, ransomware, or other malicious attacks. Block-level, continuous data replication enables recovery point objectives (RPOs) of seconds. Continuous data replication to a low-cost staging area in AWS reduces your compute and storage footprint to a minimum. Automated machine conversion and orchestration enable recovery time objectives (RTOs) of minutes.
Highlights
- Replicate any physical, virtual, or cloud-based workload with RPOs of seconds and RTOs of minutes. Fail over to previous points in time to recover from data corruption, ransomware, or other malicious attacks. Fail back when disaster is over.
- DR TCO reduction: Uses minimal compute and low-cost storage, and eliminates OS and application software licensing during normal operations (real-time replication). Only pay for relevant compute and OS/application licenses when recovery is needed.
- Enterprises use CloudEndure to replicate their most critical databases, including Microsoft SQL Server, Oracle, and MySQL, as well as enterprise applications such as SAP.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/host/hour |
|---|---|
Hourly rate for protected machine | $0.028 |
Hourly rate for AWS protected machine | $0.028 |
Vendor refund policy
If you need to request a refund for software sold by Amazon Web Services, LLC, please contact AWS Customer Service. Web Support: bit.ly/1Q6bE3; Phone Support: bit.ly/MFEcTIAnnual SubscriptionsAnnual subscription cancellations or downgrades are not supported. If you need help with or want to upgrade your subscriptions, please click here: https://aws.amazon.com/marketplace/help/buyer-annual-subscription
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Support for CloudEndure Disaster Recovery is determined by your support level agreement with AWS. We strongly encourage customers using CloudEndure Disaster Recovery for production workloads to purchase either Business or Enterprise Support from Amazon. Learn more:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Rapid recovery has minimized downtime and protects critical data during frequent outages
What is our primary use case?
AWS Elastic Disaster Recovery is a fully managed service that enables fast, reliable recovery of on-premises or cloud-based applications to AWS . We use it for minimizing downtime and data loss. There have been multiple situations where our production servers hosted on AWS went down, and we were able to shift to different servers, thereby minimizing the downtime with no data loss.
What is most valuable?
This service is very handy in terms of using affordable storage, minimal compute resources, and point-in-time recovery to ensure business continuity during outages or disasters.
Continuous block-level replication stands out for me the most. AWS Elastic Disaster Recovery continuously replicates block-level data from the source environment to a staging area in AWS, ensuring that data is always up to date and minimizing data loss during a disaster. Other valuable features include automated failover and recovery as well as non-disruptive testing.
AWS Elastic Disaster Recovery supports a wide range of source environments, including VMware, Hyper-V , physical servers, and other cloud providers, making it versatile for different IT infrastructures. The flexible recovery options allow recovery of applications to their original environment or to a new instance in AWS while retaining the existing metadata and security parameters. The cost-effective staging area design reduces costs by utilizing affordable storage and minimal compute resources, making it economical for ongoing replication.
It has greatly impacted our company's specific outcomes and improved production failures. For customers, it has been quite beneficial in terms of providing automated failover and recovery options as well as flexible recovery options, which allows recovery of applications to the original environment or to a new instance in AWS while retaining the existing metadata and security parameters, which is quite useful. Encryption and security is also one of the best features. Data is encrypted during transit and at rest, ensuring information remains secure throughout the disaster recovery process.
There has definitely been a lot of improvements in recovery time with very less downtime because we already understand how to recover using the clear process that AWS Elastic Disaster Recovery provides. There has been approximately a thirty percent improvement in terms of recovery time.
What needs improvement?
AWS Elastic Disaster Recovery can be improved through regular drills to ensure that all resources are properly prepared for disasters with scheduled drills. This includes testing and understanding failback, which is crucial for a comprehensive disaster recovery plan.
Monitoring and health checks are important to continuously monitor the health of the ongoing replication using the AWS Elastic Disaster Recovery console or programmatically. This helps identify any servers that may require attention and ensures that the application is functioning correctly. Creating a CloudFormation template that can create the necessary network resources on demand is useful for disaster recovery.
There should be documentation and best practices guidance so that teams can follow best practices for implementation and maintenance of disaster recovery from on-premises using AWS. This includes a written recovery plan as well as regularly updating it with findings and required changes.
Within the scope of improvements, there are many possibilities, but it is currently providing some great results. The scope of improvements can include monitoring and health checks as well as documentation with best practices for documentations, and conducting regular drills.
For how long have I used the solution?
I have been using AWS Elastic Disaster Recovery for around two years.
What do I think about the stability of the solution?
AWS Elastic Disaster Recovery has been quite stable.
What do I think about the scalability of the solution?
The scalability is quite good and we were able to scale this service to many of the services that our company uses. It has been quite fast with reliable recovery of on-premises as well as our private cloud.
How are customer service and support?
Customer support has been quite good and has definitely solved many issues we have faced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we were using Azure Elastic Disaster Recovery, but now we are using AWS Elastic Disaster Recovery, which is doing a great job.
What was our ROI?
In terms of time saved, it has greatly improved because of production failures, and that time is definitely saved because of the great documentation and plans that everyone understands. There are also fewer employees needed now because of the good structured planning for AWS Elastic Disaster Recovery, so fewer site reliability engineers are required.
What's my experience with pricing, setup cost, and licensing?
The pricing has been fine, and regarding the setup cost as well, it is quite fine. There is definitely a scope of improvement, and for year-end licensing, they should definitely improve the cost.
Which other solutions did I evaluate?
We evaluated other alternatives, but they were not providing good cost options. Commvault Cloud , Rubrik , and OpenText Recover were evaluated, but the number of features in AWS Elastic Disaster Recovery is quite huge and they cannot match that.
What other advice do I have?
The features that really make AWS Elastic Disaster Recovery a ten out of ten include continuous block-level replication, automated failover and recovery, non-disruptive testing, support for various environments, flexible recovery options, integration with AWS services, cost-effective staging area, encryption and security, customizable launch settings, and post-launch actions.
There are a lot of features that should make AWS Elastic Disaster Recovery appealing to potential users because of the huge market capture by AWS and the fact that most companies are using AWS, so that option should be considered.
We have been a customer only. I give this product a rating of ten out of ten. AWS Elastic Disaster Recovery has been doing quite a good job overall.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disaster recovery has strengthened critical grid operations and maintains regulatory compliance
What is our primary use case?
AWS Elastic Disaster Recovery is utilized for recovering on-premises and cloud applications onto AWS by continuously replicating servers to a staging area. In our organization, we have had a huge case to ensure business continuity and rapid recovery of our critical IT and OT systems. This includes our data centers, our SCADA systems, our metering platforms, our customer billing systems, and the telemetry from substations and field assets. Our goal is to minimize the downtime, maintain safe and reliable electricity across the state, and support strategic objectives of operational excellence and regulatory compliance. Disaster recovery is centered around protecting and quickly restoring our critical systems that support the state's electricity transmission and distribution network.
Given that our organization manages high-voltage transmission lines and lower-voltage distribution networks, any IT or OT downtime can directly affect hundreds and thousands of customers. It can destabilize the grid and affect operational safety. AWS Elastic Disaster Recovery is essential for replicating the data center workloads, protecting our OT and SCADA systems, supporting disaster recovery planning and testing, and ensuring regulatory compliance and operational resilience.
Our main use case, along with our utilization of AWS Elastic Disaster Recovery, is for regular, non-disruptive disaster recovery drills. Routinely, our team runs failover simulations of both the IT and OT systems without affecting production, which validates the recovery time objectives of under four hours and the recovery point objectives of near zero data loss. We also use AWS Elastic Disaster Recovery to integrate with our OT telemetry and our asset data. Unlike many other organizations that focus just on IT, we focus on replicating even our SCADA systems, our pole telemetry, and our substation data so that field crews can respond immediately during network events.
Our teams also utilize AWS Elastic Disaster Recovery for prioritizing data for regulatory compliance. We classify the workloads based on criticality. Customer billing, outage management, and compliance reporting get the highest priority replication, while less critical analysis or internal reporting are replicated on a lower schedule. We utilize a hybrid recovery approach. AWS Elastic Disaster Recovery allows us to combine our on-premises data centers with cloud replication, giving us flexibility and cost efficiency while keeping sensitive operational data secure and compliant with state and federal requirements.
Several features of AWS Elastic Disaster Recovery stand out for us. The most critical is the continuous block-level replication, ensuring our critical IT and OT workloads are replicated in near real-time, which minimizes data loss during failover events. This is crucial for our SCADA systems, customer billing, and outage management because in these scenarios, even small delays or lost data can impact safety and service reliability. Another feature is the non-disruptive DR testing, which helps us perform DR drills without affecting production. This allows us to validate the recovery plans for both IT and OT systems. For example, if we want to simulate failover for substations and the field asset telemetry regularly, it does not affect our operations.
Another feature we appreciate is the automated orchestration of recovery, as AWS Elastic Disaster Recovery provides predefined recovery workflows we can use to spin up the replicated systems quickly, including networking, IP configurations, and dependencies. During last year's storm, we reduced the manual recovery effort by over 60%. The hybrid deployment flexibility of AWS Elastic Disaster Recovery also supports both on-premises data centers and cloud failover, allowing us to protect sensitive operational data while leveraging AWS scalability during high-demand recovery. Another feature we use day-to-day is their integration with monitoring and alerting, which lets us integrate AWS DRS with our monitoring tool to alert teams instantly if a replication falls behind schedule or if a recovery agent is triggered, ensuring proactive response and minimizing downtime.
We have deployed AWS Elastic Disaster Recovery in a hybrid cloud setup. We use Amazon Web Services (AWS) as the public cloud provider in our hybrid cloud setup.
What is most valuable?
I can provide a specific example of a situation where AWS Elastic Disaster Recovery helped us recover our critical systems. Last year, we had storms in the state with high winds and flooding in many areas that caused damage and threatened two of our data centers. Using AWS Elastic Disaster Recovery, we were able to fail over our customer management and metering systems to the AWS cloud within a few hours. When we replicate and fail over our customer management, metering, and outage tracking systems to the AWS cloud, we were able to upload to the AWS cloud in just under three hours, compared to an estimated 36 to 48 hours had we done it through manual recovery. Hundreds of thousands of customers were affected by the storms, but since we were able to replicate it to the AWS cloud in under three hours, our customers continued to receive accurate outage notifications through SMS and email because the replicated systems remained operational. Our field crew teams also had real-time access to the pole IDs, substation telemetry, and the asset status that helped them in improving restoration efficiency. This reduced the average time to restore power per affected area by 25%. Billing and regulatory reporting data were fully intact, which helped us prevent any errors and ensured compliance with the Australian Energy Regulator requirements. AWS Elastic Disaster Recovery has allowed us to maintain critical operations during high-impact natural disasters, protecting both our customers and our assets while demonstrating measurable improvements in our response time and regulatory compliance.
Continuous block-level replication and automated orchestration have significantly helped our team in daily operations. I can relate this to last year's storm, during which several substations in our state experienced partial outages. Thanks to the continuous block-level replication, all the telemetry from SCADA systems, pole inspections, and customer meter readings were still up-to-date in the cloud. This allowed our control center to monitor real-time network conditions without relying on compromised on-site servers. Automated orchestration means that if one data center server in our state went offline, AWS Elastic Disaster Recovery automatically spins up the replicated systems in the cloud, including network configuration and monitoring dashboards. This reduced what would have been a manual 10 to 12-hour effort down to less than three hours. The monitoring integration also played a key role because alerts were triggered immediately when replication lag approached the thresholds, helping our teams proactively address issues even before any customer impact occurred. For our daily teams, these features provide our field crews and control center staff the confidence that our critical operational data, such as outage reports, asset condition, and customer information will always be accurate and available, helping teams prioritize restoration, maintain safety, and comply with AER reporting requirements.
One very small but handy feature is AWS Elastic Disaster Recovery point-in-time recovery snapshots. On one end, continuous replication keeps the data current, but having these point-in-time recovery snapshots allows us to quickly roll back specific systems just in case a configuration error happens or if corrupted data is accidentally pushed without affecting other replicated workloads. Another feature that doesn't always get highlighted is that AWS Elastic Disaster Recovery supports both IT and OT workloads. Many disaster recovery tools focus just on IT, but the ability to replicate operational technology data, such as SCADA systems and pole telemetry, gives our field crews real-time access during outages, which has been invaluable during natural disasters including storms and extreme weather events. AWS Elastic Disaster Recovery also has minimal bandwidth and storage overhead for replication, helping us manage costs effectively while maintaining robust disaster recovery capabilities across our thousands of kilometers of network and hundreds of thousands of customers.
AWS Elastic Disaster Recovery has positively impacted our organization. Prior to using it, recovering our critical IT and OT systems after an outage could take anywhere between 10 to 12 hours manually. However, after implementing AWS Elastic Disaster Recovery and using its automated orchestration, we can now restore systems in under three hours. This means we have reduced our downtime by more than 70%. We have improved our data reliability, ensuring that telemetry, SCADA, and customer metering data are always up-to-date, which has reduced errors in operational decision-making. In terms of costs, we utilized cloud failover instead of building a full secondary on-premises disaster recovery site, resulting in an avoided capital expenditure of approximately $1.2 million while maintaining regulatory compliance with AER. We have saved time, money, and ensured customer data is up-to-date, allowing our teams to quickly generate compliance reports and outage logs, meeting AER timelines without last-minute scrambling. Our field crews and control center staff also have instant access to all our replicated OT and IT systems during any emergency, enabling faster response times and safer operations. These are some specific outcomes thanks to AWS Elastic Disaster Recovery.
Since implementing AWS Elastic Disaster Recovery, we have seen improvements in customer satisfaction and regulatory audits. During the storm last year, the replicated SCADA and metering systems allowed us to communicate outage status in near real-time, rather than relying on delayed manual reporting, which improved our customer response metrics by roughly 25% due to faster updates and restoration notifications. Our customers were able to plan their time more effectively during outages, reducing frustrations. Regarding regulatory audits for the Australian Energy Regulator, having continuous, accurate, and auditable data from AWS Elastic Disaster Recovery has simplified our submissions. Recovery logs, outage timelines, and asset status were available immediately, which has helped us reduce our time spent on manually documenting regulatory reports by about 40% and minimized our risk of non-compliance. Our field teams reported that having up-to-date cloud-accessible OT data such as pole conditions or substation status reduces guesswork and improves their safety. The accelerated restoration work has boosted their confidence in operational decisions.
What needs improvement?
A couple of things where AWS Elastic Disaster Recovery could improve are the granular testing of OT workloads. It would be helpful to have fully isolated test recoveries for our OT data, such as SCADA or pole telemetry, without impacting replication, to help validate disaster recovery readiness more frequently. Additionally, advanced reporting and analytics would be beneficial. If the tool could provide more built-in dashboards to show replication lag trends, failover readiness, or system dependencies, it would save time and improve transparency for both field teams and regulatory reporting.
In terms of integration, tighter integration with our asset management systems and GIS databases would streamline automated recovery of linked OT systems and data relationships, making failover more efficient. There should also be more fine-grained alerts for replication lag or orchestration failures, with customizable thresholds for different types of workloads to improve proactive incident response.
My advice would be to start with a clear disaster recovery strategy. Identify which IT and OT systems are critical, calculate the recovery time objective, and which assets need replication first. Keep latency-sensitive or legacy OT systems on-premises while replicating core IT workloads to AWS for fast, reliable failover. It is essential to keep testing failovers regularly, as it builds confidence and uncovers gaps that help ensure smooth operation during real incidents. Actively monitor costs by paying attention to replication storage and compute usage since AWS Elastic Disaster Recovery is pay-as-you-go, which allows us to save thousands of dollars annually. Connecting disaster recovery events with field operations, SCADA systems, and asset management dashboards streamlines operational responses. The AWS team is great, and engaging with their support and architects, along with their documentation and best practices, is very helpful.
For how long have I used the solution?
I have been using AWS Elastic Disaster Recovery for one and a half years.
What do I think about the stability of the solution?
AWS Elastic Disaster Recovery is stable and reliable.
What do I think about the scalability of the solution?
AWS Elastic Disaster Recovery is scalable and has handled growth in our organization well.
How are customer service and support?
I have not interacted with their customer support team.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I did not previously use a different solution for disaster recovery.
How was the initial setup?
My experience with pricing, setup cost, and licensing for AWS Elastic Disaster Recovery was that there was minimal upfront capital expenditure compared to building a traditional secondary disaster recovery site. Most costs were operational in nature and based on the amount of data replicated and storage used in AWS. The licensing model uses a pay-as-you-go model, so we only pay for the replication storage, compute used during failover, and additional orchestrated testing. There is no heavy licensing fee, making it scalable and cost-efficient as our network and data grow. Overall, the flexibility and transparency of AWS pricing have been a major advantage.
What about the implementation team?
We did not purchase AWS Elastic Disaster Recovery through the AWS Marketplace .
What was our ROI?
I have seen a return on investment. We saved around $1.2 million in capital expenditure by avoiding a dedicated secondary on-premises disaster recovery site. Our downtime recovery time used to be 10 to 12 hours; now it has dropped to under three hours. We have reduced dedicated disaster recovery personnel hours by almost 30%, allowing staff to focus more on proactive network maintenance and asset management. In terms of regulatory and audit readiness, we have reduced preparation time for compliance checks by roughly 40%.
What's my experience with pricing, setup cost, and licensing?
There is no heavy licensing fee, making it scalable and cost-efficient as our network and data grow.
Which other solutions did I evaluate?
Before choosing AWS Elastic Disaster Recovery, we evaluated traditional on-premises disaster recovery sites and considered building a secondary data center locally, but rejected that option due to high capital expenditure. We also evaluated VM replication tools such as Veeam and Zerto for virtual machine replication, but those lacked seamless orchestration for hybrid IT and OT systems. Other cloud-based DR solutions, such as Microsoft Azure Site Recovery and Google Cloud 's disaster recovery offerings, were also considered, but we went with AWS Elastic Disaster Recovery because it aligned best with our existing AWS workloads, offering continuous block-level replication, automated orchestration, and simple pay-as-you-go pricing.
What other advice do I have?
My overall review rating for AWS Elastic Disaster Recovery is 9.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Cross-region recovery has protected critical apps and reduces downtime with proactive alerts
What is our primary use case?
My main use case for AWS Elastic Disaster Recovery is for any databases or applications when they go down on a cross-region. For instance, when an application is spinning up into multiple regions, we lost one, and AWS Elastic Disaster Recovery helped us recover. In that situation, when there was an event that happened in the cloud stack, AWS Elastic Disaster Recovery helped us get things back up and running. Although this happened only once, we would like to have this multi-region, multi-data center level recovery for disaster recovery, so we are incorporating this technology.
How has it helped my organization?
AWS Elastic Disaster Recovery has positively impacted my organization. We have a priority one application that was recently deployed, and it was important for us to recover the data when the cloud stack went down. Since deploying AWS Elastic Disaster Recovery, we have mostly seen an improvement in uptime, which contributes to reducing downtime.
What is most valuable?
The best features AWS Elastic Disaster Recovery offers are the insights and alerting, which inform developers or application developers about what's going on and how the system is running.
The insights and alerting features help my team day-to-day by allowing SREs to know when an event has happened and how we are supposed to be doing recovery. They provide alerts to the SREs and groups that are subscribed, and they are alerted early. I am currently exploring the features, but for now, I find it very useful in the event of the disaster that happened.
What needs improvement?
I think insights are an area for improvement. It would be beneficial to get some insights when a disaster happens, including identification and probable solutions to ensure effective recovery. That insight and solution suggestion area is the main thing I would want to see improved.
We believe that customer support for AWS Elastic Disaster Recovery needs to be improved because although we do raise tickets, the response can take some time.
For how long have I used the solution?
I have been using AWS Elastic Disaster Recovery for two years.
What do I think about the stability of the solution?
AWS Elastic Disaster Recovery is stable. It is definitely a stable application.
What do I think about the scalability of the solution?
The scalability of AWS Elastic Disaster Recovery is good. We can expand it to multiple data centers or different areas such as EMEA and APAC.
How are customer service and support?
I would rate the customer support an eight, as it often takes a lot of time to engage and get a solution. About eighty percent of the time, I think it will be resolved quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we were using a homegrown application that tracks these systems before switching to AWS Elastic Disaster Recovery.
How was the initial setup?
We did purchase AWS Elastic Disaster Recovery through the AWS Marketplace , but it's mostly the procurement team that has handled that. The management, particularly the procurement team, looks at pricing and setup costs, so I know a little about pricing, but I'm not directly involved in it.
What about the implementation team?
We are just customers and consume a lot of AWS services, and do not have another business relationship with this vendor.
What was our ROI?
We have seen a return on investment by needing fewer employees for maintenance and related matters. We no longer have to schedule employees on weekends since the system automatically triggers alerts, allowing engineers to respond as needed.
Which other solutions did I evaluate?
We did not evaluate other options before choosing AWS Elastic Disaster Recovery.
What other advice do I have?
My advice for others looking into using AWS Elastic Disaster Recovery is to definitely consider it if you are scaling your applications significantly, especially if your applications are spanned across different regions. I would give this product an eight out of ten because it's a fair score. The education of our technology and operations or SRE teams is needed since most people don't know, only a few do. I suggest that improvement in customer service for disaster recovery and the alerting system would be great.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized backup facilitates quick recovery processes and effective disaster recovery drills
What is our primary use case?
I have worked with AWS Elastic Disaster Recovery for the past year. My feedback is that when we compare it, it's a good thing to have a centralized backup. When your stack is on AWS , it is very helpful, but I think when you have multi-cloud, that's where it may not be a great product.
Also, from the cost side, it is good. The best use case for this would be if you're in AWS and you want to try things quickly without the actual disaster recovery cost that you usually have to incur.
However, the challenge is the EBS snapshot. At the end of the day, they have snapshots, and they do have EBS snapshots which they capture. We ended up not using it, but we explored it for our own disaster recovery solutions that we were evaluating.
What is most valuable?
I appreciate the automated orchestration of recovery processes in this solution. That's a good thing, especially once you are able to configure something with this tool. I haven't tested the automated recovery, but they do support it. It is beneficial, especially integration with Route 53 and automatically using Route 53 to switch to a different region directly.
Because it has native integrations with all the Route 53 features, that's a good aspect. The part I really appreciated about it was they're not just AWS Backup ; along with that, they give you an option to quickly do the drills. If you want to conduct DR drills, it's very useful.
What needs improvement?
I don't think there is any bad feature in AWS Elastic Disaster Recovery as such. It's more of when you do disaster recovery, you think of it more holistically. You want flexibility in terms of options. I would say it did not provide enough flexibility for all our backup needs. It had one single way of just supporting the EBS backup, or you can say volume-level backup. But let's say you want to integrate with your current backup solution; that kind of flexibility is what I would say is missing.
In terms of improvements for AWS Elastic Disaster Recovery, for any backup and disaster products, I would want it when companies are trying to evaluate these products, the biggest challenge is you want the most cost-optimal way because it's insurance.
AWS is already highly available, and you can have your infrastructure just in multiple AZs, and your life will be fine, considering the low probability of an AZ going down because of AWS's scale. You do disaster recovery basically for insurance and compliance, so it's crucial to ensure that it's very cost-optimal. There are different models that balance cost and recovery time objectives, but I have not seen any innovation; these are very old practices.
Additionally, while the storage side is key because you want your data to be there on both sides, the speed at which you can build your infrastructure also matters. It's mostly about data storage. For data storage, if you architect your storage properly, you can actually bring it up faster. For example, with a database cluster, if your database size doesn't exceed certain limits, it will significantly improve recovery time. However, these guidelines aren't offered by backup tools, as they sort of work against them. Still, to make backup cost-optimal, it is not just about the tool; it's also about how you architect your infrastructure.
For how long have I used the solution?
I have experience working with AWS Elastic Disaster Recovery for about six or seven months.
How are customer service and support?
Being an enterprise customer, I find the technical support from AWS very supportive.
How would you rate customer service and support?
Neutral
What other advice do I have?
Regarding the security features, including encryption provided by AWS Elastic Disaster Recovery, security is dependent on the user's needs. Encryption is something you need to enable based on your data and where you're storing it. I don't remember if they have an option where, by default, whatever backup you have is secured, since what you're storing is still in your own S3 or something. I think they charge you based on the amount of data. It's a shared responsibility model, but I believe they do offer a feature where you can enable encryption at rest and encryption in transit for your data, but it's our responsibility as customers; I don't think AWS does it for you.
For AWS Elastic Disaster Recovery, regarding the deployment model, we mostly tried the backup restore option. We typically haven't explored the other deployment options they offer yet. We start with a very simple backup restore and chose it for specific use cases, MongoDB backup, but as of right now, we haven't looked at it more holistically. Overall, we felt that it doesn't support all the types of backup that we have.
On a scale of one to ten, I would rate AWS Elastic Disaster Recovery an eight.
Seamless service management and integration with good flexibility
What is our primary use case?
I use the solution to deploy a Docker image application. It is hosted on GitHub , and the servers we run on are not ECR.
What is most valuable?
What I like about ECR AWS is that it is a fully managed service, so I don't need to manage the underlying infrastructure or worry about scalability in AWS concerning building, maintenance, security, and high availability.
It offers seamless integration with services like ACL , EKS, and Fargate for deploying containerized applications. It works great with AWS, and it is flexible to use a public repository for open-source projects or a private repository for secure storage.
What needs improvement?
In its current state, ECL integrates with CloudWatch for basic logging and monitoring, yet improvements could include more detailed logs for specific actions, like when I perform actions such as push or pull. This would detail user activity directly in the ACL console for easier debugging and auditing.
Additionally, an improved AWS pricing model is needed. AWS charges for storage and data transfer, which can add up, especially with large images or frequent pulls. Improvement should focus on offering more storage or better volume discounts for long-term use. It would also be beneficial to allow free pulls within the AWS account and vision.
Moreover, image scanning for vulnerabilities can sometimes be slow, especially for large images. Speeding up the scanning process or providing optimized scanning for critical workflows would be welcome advancements.
For how long have I used the solution?
I have used it for about seven months now.
What do I think about the stability of the solution?
Since the time I have been using ECL, my application on AWS has not broken down. I have not had any issues with it for now. It is working well. It is very good and very reliable.
How are customer service and support?
I never had to contact the support team.
Which solution did I use previously and why did I switch?
I didn't really use Azure . However, that was in my last organization before I joined this new one.
What other advice do I have?
I would rate AWS nine out of ten.
