Listing Thumbnail

    CloudEndure Disaster Recovery to AWS

     Info
    Deployed on AWS
    CloudEndure Disaster Recovery enables organizations to quickly and easily shift their disaster recovery strategy to AWS from existing physical or virtual data centers, private clouds, or other public clouds, in addition to supporting cross-region / cross-AZ disaster recovery in AWS.
    4.1

    Overview

    Play video

    Product update: AWS Elastic Disaster Recovery, the next generation of CloudEndure Disaster Recovery, is now the recommended service for disaster recovery to AWS. Learn more here: https://aws.amazon.com/disaster-recovery .

    As of March 31, 2024, CloudEndure Disaster Recovery (CEDR) will be discontinued in all AWS Regions except for the following regions and use cases:

    AWS China regions - cn-north-1 and cn-northwest-1 AWS GovCloud regions - us-gov-west-1 and us-gov-east-1 Usage in conjunction with AWS Managed Services (AMS) Usage with AWS Outposts

    If there is still a need to get started with CloudEndure Disaster Recovery, subscribe on this page and then follow the instructions to register new servers.

    CloudEndure Disaster Recovery is an automated IT resilience solution that lets you recover your environment from unexpected infrastructure or application outages, data corruption, ransomware, or other malicious attacks. Block-level, continuous data replication enables recovery point objectives (RPOs) of seconds. Continuous data replication to a low-cost staging area in AWS reduces your compute and storage footprint to a minimum. Automated machine conversion and orchestration enable recovery time objectives (RTOs) of minutes.

    Highlights

    • Replicate any physical, virtual, or cloud-based workload with RPOs of seconds and RTOs of minutes. Fail over to previous points in time to recover from data corruption, ransomware, or other malicious attacks. Fail back when disaster is over.
    • DR TCO reduction: Uses minimal compute and low-cost storage, and eliminates OS and application software licensing during normal operations (real-time replication). Only pay for relevant compute and OS/application licenses when recovery is needed.
    • Enterprises use CloudEndure to replicate their most critical databases, including Microsoft SQL Server, Oracle, and MySQL, as well as enterprise applications such as SAP.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    CloudEndure Disaster Recovery to AWS

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (2)

     Info
    Dimension
    Cost/host/hour
    Hourly rate for protected machine
    $0.028
    Hourly rate for AWS protected machine
    $0.028

    Vendor refund policy

    If you need to request a refund for software sold by Amazon Web Services, LLC, please contact AWS Customer Service. Web Support: bit.ly/1Q6bE3; Phone Support: bit.ly/MFEcTIAnnual SubscriptionsAnnual subscription cancellations or downgrades are not supported. If you need help with or want to upgrade your subscriptions, please click here: https://aws.amazon.com/marketplace/help/buyer-annual-subscription 

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Support for CloudEndure Disaster Recovery is determined by your support level agreement with AWS. We strongly encourage customers using CloudEndure Disaster Recovery for production workloads to purchase either Business or Enterprise Support from Amazon. Learn more:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Storage & Backup
    Top
    100
    In Backup & Recovery
    Top
    10
    In Storage

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    18 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Continuous Data Replication
    Block-level, continuous data replication technology enabling recovery point objectives of seconds
    Automated Machine Conversion and Orchestration
    Automated conversion and orchestration of machines enabling recovery time objectives of minutes
    Point-in-Time Recovery
    Capability to fail over to previous points in time for recovery from data corruption, ransomware, or malicious attacks
    Multi-Source Workload Support
    Support for replication of physical, virtual, and cloud-based workloads across different infrastructure types
    Low-Cost Staging Infrastructure
    Continuous data replication to low-cost staging area in AWS with minimal compute and storage footprint during normal operations
    Agentless Architecture
    Agentless comprehensive disaster recovery solution that eliminates the need for agent installation across protected infrastructure.
    Multi-Cloud Support
    Support for multiple cloud platforms enabling disaster recovery orchestration and failover across on-premises and cloud environments.
    Automated Recovery Workflows
    Automated orchestration and execution of recovery processes with configurable workflows for business service protection.
    Non-Disruptive Testing
    Capability to perform non-disruptive testing of disaster recovery plans without impacting production environments.
    Centralized Management
    Centralized management interface for monitoring and controlling disaster recovery operations across hybrid cloud infrastructure.
    Multi-Resource Backup and Recovery
    Supports backup and recovery for more than 105 resources across AWS services including storage, compute, network, security, and monitoring components.
    Cross-Account and Cross-Region Disaster Recovery
    Enables replication and recovery of environments across multiple AWS accounts and alternate regions with pilot-light architecture maintaining infrastructure and backups in secondary locations.
    Automated Environment Orchestration
    Orchestrates native AWS capabilities to continuously back up entire environments and automatically recreate complete infrastructure with dependencies in alternate locations.
    Ransomware Recovery Capabilities
    Provides specialized ransomware recovery features including recovery to locked-down AWS accounts for protection against malicious threats.
    Transit Gateway Replication and Recovery
    Supports replication and recovery of Transit Gateways and shared resources with dependency management across multiple AWS accounts.

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.1
    32 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    47%
    44%
    0%
    3%
    6%
    20 AWS reviews
    |
    12 external reviews
    External reviews are from G2  and PeerSpot .
    reviewer2802339

    Improved disaster recovery metrics and reduced costs while still needing better automation

    Reviewed on Feb 11, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Our main use case for AWS Elastic Disaster Recovery  was to ensure that if our primary on-premises data center failed, we could quickly launch EC2  instances in AWS  to resume production.

    The main use case was ensuring business continuity with low RPO and RTO. We use AWS Elastic Disaster Recovery  to perform continuous replication of on-premises servers. RPO, which stands for Recovery Point Objective , is the maximum acceptable data loss. If RPO is low, we have minimal data loss, no major business transaction loss, and better consumer trust. If replication happens every few seconds, we do not lose hours of data during a failover. The other benefit is how low RTO improves our operations. If the RTO is low, then we have faster system recovery and reduced loss. If systems are restored in minutes instead of hours, business operations continue smoothly. Low RPO ensures minimal data loss during a disaster and low RTO ensures faster system recovery. Together, they reduce business downtime, protect revenue, and maintain customer trust for our business.

    What is most valuable?

    We use AWS Elastic Disaster Recovery because it provides low RPO, RTO, supports failover testing, and eliminates the need for a secondary data center. It is cost-effective and suitable for business continuity planning.

    AWS Elastic Disaster Recovery uses continuous block-level replication. Its lightweight agent is installed on a source server, so data replicates to a low-cost staging area in AWS . During a disaster, we launch EC2  instances from replicated data. The low RPO at a seconds-level replication and a fast recovery with a low RTO provide the most cost-effective way, paying mostly for storage until failover.

    The best feature that AWS Elastic Disaster Recovery offers is the full server-level replication and near-real-time disaster recovery. The benefits are fast recovery, low RPO, and it is cost-effective.

    The fast recovery and low RPO of AWS Elastic Disaster Recovery have made a significant difference for my team and organization by ensuring minimal data loss and quick restoration of services.

    Using AWS Elastic Disaster Recovery services, our organization noticed a very positive impact. The first positive impact is that it significantly improved our disaster recovery posture. We minimized data loss, which increased system reliability. It also reduced the need for maintaining a separate DR data center, which lowered infrastructure costs.

    What needs improvement?

    After implementing AWS Elastic Disaster Recovery, we significantly improved our disaster recovery metrics. Our RPO improved from approximately three to four hours to less than one minute. While the service is very effective, it could improve in areas such as more granular cost visibility during staging and test launches. Additionally, enhanced automation for large-scale failover orchestration across multiple regions would be beneficial.

    For how long have I used the solution?

    I have been using AWS Elastic Disaster Recovery for three years for continuous server replication to AWS.

    Which solution did I use previously and why did I switch?

    I used AWS Elastic Disaster Recovery in my previous organization, which is called Andor Communication Private Limited.

    What was our ROI?

    We have measured the results of implementing AWS Elastic Disaster Recovery. We improved our RPO from around four hours to less than one minute and our RTO from six to eight hours to under thirty minutes. Maintaining a secondary DR center was costing approximately eight thousand to ten thousand dollars per month, which is around eight to ten lakh per month in Indian rupees.

    What other advice do I have?

    I will suggest to IT professionals who want to use AWS Elastic Disaster Recovery that if you have clearly defined RPO and RTO objectives before implementing it, proper network bandwidth planning is very important to ensure smooth continuous replication. You should also regularly test failover and failback scenarios. Instead of treating DR as a one-time setup, conducting quarterly DR drills helps validate recovery objectives. My advice would be to clearly define RPO and RTO, plan network bandwidth properly, test failover regularly, and monitor staging costs closely. DR should be continuously tested, not just configured once.

    AWS Elastic Disaster Recovery is a reliable and cost-effective solution for business continuity. It simplifies disaster recovery by eliminating the need for maintaining a secondary data center while still providing low RPO. With proper planning and monitoring, it provides excellent business continuity at a lower cost compared to traditional DR setups. I would rate this solution seven out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Harsh Shrivastava

    Rapid recovery has minimized downtime and protects critical data during frequent outages

    Reviewed on Dec 22, 2025
    Review from a verified AWS customer

    What is our primary use case?

    AWS Elastic Disaster Recovery  is a fully managed service that enables fast, reliable recovery of on-premises or cloud-based applications to AWS . We use it for minimizing downtime and data loss. There have been multiple situations where our production servers hosted on AWS  went down, and we were able to shift to different servers, thereby minimizing the downtime with no data loss.

    What is most valuable?

    This service is very handy in terms of using affordable storage, minimal compute resources, and point-in-time recovery to ensure business continuity during outages or disasters.

    Continuous block-level replication stands out for me the most. AWS Elastic Disaster Recovery  continuously replicates block-level data from the source environment to a staging area in AWS, ensuring that data is always up to date and minimizing data loss during a disaster. Other valuable features include automated failover and recovery as well as non-disruptive testing.

    AWS Elastic Disaster Recovery supports a wide range of source environments, including VMware, Hyper-V , physical servers, and other cloud providers, making it versatile for different IT infrastructures. The flexible recovery options allow recovery of applications to their original environment or to a new instance in AWS while retaining the existing metadata and security parameters. The cost-effective staging area design reduces costs by utilizing affordable storage and minimal compute resources, making it economical for ongoing replication.

    It has greatly impacted our company's specific outcomes and improved production failures. For customers, it has been quite beneficial in terms of providing automated failover and recovery options as well as flexible recovery options, which allows recovery of applications to the original environment or to a new instance in AWS while retaining the existing metadata and security parameters, which is quite useful. Encryption and security is also one of the best features. Data is encrypted during transit and at rest, ensuring information remains secure throughout the disaster recovery process.

    There has definitely been a lot of improvements in recovery time with very less downtime because we already understand how to recover using the clear process that AWS Elastic Disaster Recovery provides. There has been approximately a thirty percent improvement in terms of recovery time.

    What needs improvement?

    AWS Elastic Disaster Recovery can be improved through regular drills to ensure that all resources are properly prepared for disasters with scheduled drills. This includes testing and understanding failback, which is crucial for a comprehensive disaster recovery plan.

    Monitoring and health checks are important to continuously monitor the health of the ongoing replication using the AWS Elastic Disaster Recovery console or programmatically. This helps identify any servers that may require attention and ensures that the application is functioning correctly. Creating a CloudFormation  template that can create the necessary network resources on demand is useful for disaster recovery.

    There should be documentation and best practices guidance so that teams can follow best practices for implementation and maintenance of disaster recovery from on-premises using AWS. This includes a written recovery plan as well as regularly updating it with findings and required changes.

    Within the scope of improvements, there are many possibilities, but it is currently providing some great results. The scope of improvements can include monitoring and health checks as well as documentation with best practices for documentations, and conducting regular drills.

    For how long have I used the solution?

    I have been using AWS Elastic Disaster Recovery for around two years.

    What do I think about the stability of the solution?

    AWS Elastic Disaster Recovery has been quite stable.

    What do I think about the scalability of the solution?

    The scalability is quite good and we were able to scale this service to many of the services that our company uses. It has been quite fast with reliable recovery of on-premises as well as our private cloud.

    How are customer service and support?

    Customer support has been quite good and has definitely solved many issues we have faced.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, we were using Azure  Elastic Disaster Recovery, but now we are using AWS Elastic Disaster Recovery, which is doing a great job.

    What was our ROI?

    In terms of time saved, it has greatly improved because of production failures, and that time is definitely saved because of the great documentation and plans that everyone understands. There are also fewer employees needed now because of the good structured planning for AWS Elastic Disaster Recovery, so fewer site reliability engineers are required.

    What's my experience with pricing, setup cost, and licensing?

    The pricing has been fine, and regarding the setup cost as well, it is quite fine. There is definitely a scope of improvement, and for year-end licensing, they should definitely improve the cost.

    Which other solutions did I evaluate?

    We evaluated other alternatives, but they were not providing good cost options. Commvault Cloud , Rubrik , and OpenText  Recover were evaluated, but the number of features in AWS Elastic Disaster Recovery is quite huge and they cannot match that.

    What other advice do I have?

    The features that really make AWS Elastic Disaster Recovery a ten out of ten include continuous block-level replication, automated failover and recovery, non-disruptive testing, support for various environments, flexible recovery options, integration with AWS services, cost-effective staging area, encryption and security, customizable launch settings, and post-launch actions.

    There are a lot of features that should make AWS Elastic Disaster Recovery appealing to potential users because of the huge market capture by AWS and the fact that most companies are using AWS, so that option should be considered.

    We have been a customer only. I give this product a rating of ten out of ten. AWS Elastic Disaster Recovery has been doing quite a good job overall.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Vamshidhar Gade

    Cross-region recovery has protected critical apps and reduces downtime with proactive alerts

    Reviewed on Dec 02, 2025
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for AWS Elastic Disaster Recovery  is for any databases or applications when they go down on a cross-region. For instance, when an application is spinning up into multiple regions, we lost one, and AWS Elastic Disaster Recovery  helped us recover. In that situation, when there was an event that happened in the cloud stack, AWS Elastic Disaster Recovery helped us get things back up and running. Although this happened only once, we would like to have this multi-region, multi-data center level recovery for disaster recovery, so we are incorporating this technology.

    How has it helped my organization?

    AWS Elastic Disaster Recovery has positively impacted my organization. We have a priority one application that was recently deployed, and it was important for us to recover the data when the cloud stack went down. Since deploying AWS Elastic Disaster Recovery, we have mostly seen an improvement in uptime, which contributes to reducing downtime.

    What is most valuable?

    The best features AWS Elastic Disaster Recovery offers are the insights and alerting, which inform developers or application developers about what's going on and how the system is running.

    The insights and alerting features help my team day-to-day by allowing SREs to know when an event has happened and how we are supposed to be doing recovery. They provide alerts to the SREs and groups that are subscribed, and they are alerted early. I am currently exploring the features, but for now, I find it very useful in the event of the disaster that happened.

    What needs improvement?

    I think insights are an area for improvement. It would be beneficial to get some insights when a disaster happens, including identification and probable solutions to ensure effective recovery. That insight and solution suggestion area is the main thing I would want to see improved.

    We believe that customer support for AWS Elastic Disaster Recovery needs to be improved because although we do raise tickets, the response can take some time.

    For how long have I used the solution?

    I have been using AWS Elastic Disaster Recovery for two years.

    What do I think about the stability of the solution?

    AWS Elastic Disaster Recovery is stable. It is definitely a stable application.

    What do I think about the scalability of the solution?

    The scalability of AWS Elastic Disaster Recovery is good. We can expand it to multiple data centers or different areas such as EMEA and APAC.

    How are customer service and support?

    I would rate the customer support an eight, as it often takes a lot of time to engage and get a solution. About eighty percent of the time, I think it will be resolved quickly.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, we were using a homegrown application that tracks these systems before switching to AWS Elastic Disaster Recovery.

    How was the initial setup?

    We did purchase AWS Elastic Disaster Recovery through the AWS Marketplace , but it's mostly the procurement team that has handled that. The management, particularly the procurement team, looks at pricing and setup costs, so I know a little about pricing, but I'm not directly involved in it.

    What about the implementation team?

    We are just customers and consume a lot of AWS  services, and do not have another business relationship with this vendor.

    What was our ROI?

    We have seen a return on investment by needing fewer employees for maintenance and related matters. We no longer have to schedule employees on weekends since the system automatically triggers alerts, allowing engineers to respond as needed.

    Which other solutions did I evaluate?

    We did not evaluate other options before choosing AWS Elastic Disaster Recovery.

    What other advice do I have?

    My advice for others looking into using AWS Elastic Disaster Recovery is to definitely consider it if you are scaling your applications significantly, especially if your applications are spanned across different regions. I would give this product an eight out of ten because it's a fair score. The education of our technology and operations or SRE teams is needed since most people don't know, only a few do. I suggest that improvement in customer service for disaster recovery and the alerting system would be great.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    SauravSingh

    Centralized backup facilitates quick recovery processes and effective disaster recovery drills

    Reviewed on Jul 29, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I have worked with AWS Elastic Disaster Recovery  for the past year. My feedback is that when we compare it, it's a good thing to have a centralized backup. When your stack is on AWS , it is very helpful, but I think when you have multi-cloud, that's where it may not be a great product.

    Also, from the cost side, it is good. The best use case for this would be if you're in AWS  and you want to try things quickly without the actual disaster recovery cost that you usually have to incur.

    However, the challenge is the EBS snapshot. At the end of the day, they have snapshots, and they do have EBS snapshots which they capture. We ended up not using it, but we explored it for our own disaster recovery solutions that we were evaluating.

    What is most valuable?

    I appreciate the automated orchestration of recovery processes in this solution. That's a good thing, especially once you are able to configure something with this tool. I haven't tested the automated recovery, but they do support it. It is beneficial, especially integration with Route 53  and automatically using Route 53  to switch to a different region directly.

    Because it has native integrations with all the Route 53 features, that's a good aspect. The part I really appreciated about it was they're not just AWS Backup ; along with that, they give you an option to quickly do the drills. If you want to conduct DR drills, it's very useful.

    What needs improvement?

    I don't think there is any bad feature in AWS Elastic Disaster Recovery  as such. It's more of when you do disaster recovery, you think of it more holistically. You want flexibility in terms of options. I would say it did not provide enough flexibility for all our backup needs. It had one single way of just supporting the EBS backup, or you can say volume-level backup. But let's say you want to integrate with your current backup solution; that kind of flexibility is what I would say is missing.

    In terms of improvements for AWS Elastic Disaster Recovery, for any backup and disaster products, I would want it when companies are trying to evaluate these products, the biggest challenge is you want the most cost-optimal way because it's insurance.

    AWS is already highly available, and you can have your infrastructure just in multiple AZs, and your life will be fine, considering the low probability of an AZ going down because of AWS's scale. You do disaster recovery basically for insurance and compliance, so it's crucial to ensure that it's very cost-optimal. There are different models that balance cost and recovery time objectives, but I have not seen any innovation; these are very old practices.

    Additionally, while the storage side is key because you want your data to be there on both sides, the speed at which you can build your infrastructure also matters. It's mostly about data storage. For data storage, if you architect your storage properly, you can actually bring it up faster. For example, with a database cluster, if your database size doesn't exceed certain limits, it will significantly improve recovery time. However, these guidelines aren't offered by backup tools, as they sort of work against them. Still, to make backup cost-optimal, it is not just about the tool; it's also about how you architect your infrastructure.

    For how long have I used the solution?

    I have experience working with AWS Elastic Disaster Recovery for about six or seven months.

    How are customer service and support?

    Being an enterprise customer, I find the technical support from AWS very supportive.

    How would you rate customer service and support?

    Neutral

    What other advice do I have?

    Regarding the security features, including encryption provided by AWS Elastic Disaster Recovery, security is dependent on the user's needs. Encryption is something you need to enable based on your data and where you're storing it. I don't remember if they have an option where, by default, whatever backup you have is secured, since what you're storing is still in your own S3  or something. I think they charge you based on the amount of data. It's a shared responsibility model, but I believe they do offer a feature where you can enable encryption at rest and encryption in transit for your data, but it's our responsibility as customers; I don't think AWS does it for you.

    For AWS Elastic Disaster Recovery, regarding the deployment model, we mostly tried the backup restore option. We typically haven't explored the other deployment options they offer yet. We start with a very simple backup restore and chose it for specific use cases, MongoDB  backup, but as of right now, we haven't looked at it more holistically. Overall, we felt that it doesn't support all the types of backup that we have.

    On a scale of one to ten, I would rate AWS Elastic Disaster Recovery an eight.

    Olusegun Akinnola

    Seamless service management and integration with good flexibility

    Reviewed on Jan 27, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I use the solution to deploy a Docker  image application. It is hosted on GitHub , and the servers we run on are not ECR.

    What is most valuable?

    What I like about ECR AWS  is that it is a fully managed service, so I don't need to manage the underlying infrastructure or worry about scalability in AWS  concerning building, maintenance, security, and high availability. 

    It offers seamless integration with services like ACL , EKS, and Fargate for deploying containerized applications. It works great with AWS, and it is flexible to use a public repository for open-source projects or a private repository for secure storage.

    What needs improvement?

    In its current state, ECL integrates with CloudWatch for basic logging and monitoring, yet improvements could include more detailed logs for specific actions, like when I perform actions such as push or pull. This would detail user activity directly in the ACL  console for easier debugging and auditing. 

    Additionally, an improved AWS pricing model is needed. AWS charges for storage and data transfer, which can add up, especially with large images or frequent pulls. Improvement should focus on offering more storage or better volume discounts for long-term use. It would also be beneficial to allow free pulls within the AWS account and vision. 

    Moreover, image scanning for vulnerabilities can sometimes be slow, especially for large images. Speeding up the scanning process or providing optimized scanning for critical workflows would be welcome advancements.

    For how long have I used the solution?

    I have used it for about seven months now.

    What do I think about the stability of the solution?

    Since the time I have been using ECL, my application on AWS has not broken down. I have not had any issues with it for now. It is working well. It is very good and very reliable.

    How are customer service and support?

    I never had to contact the support team.

    Which solution did I use previously and why did I switch?

    I didn't really use Azure . However, that was in my last organization before I joined this new one. 

    What other advice do I have?

    I would rate AWS nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    View all reviews