Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

CloudEndure Disaster Recovery to AWS

CloudEndure, an AWS company

Reviews from AWS customer

20 AWS reviews

External reviews

12 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Harsh Shrivastava

Rapid recovery has minimized downtime and protects critical data during frequent outages

  • December 22, 2025
  • Review from a verified AWS customer

What is our primary use case?

AWS Elastic Disaster Recovery is a fully managed service that enables fast, reliable recovery of on-premises or cloud-based applications to AWS. We use it for minimizing downtime and data loss. There have been multiple situations where our production servers hosted on AWS went down, and we were able to shift to different servers, thereby minimizing the downtime with no data loss.

What is most valuable?

This service is very handy in terms of using affordable storage, minimal compute resources, and point-in-time recovery to ensure business continuity during outages or disasters.

Continuous block-level replication stands out for me the most. AWS Elastic Disaster Recovery continuously replicates block-level data from the source environment to a staging area in AWS, ensuring that data is always up to date and minimizing data loss during a disaster. Other valuable features include automated failover and recovery as well as non-disruptive testing.

AWS Elastic Disaster Recovery supports a wide range of source environments, including VMware, Hyper-V, physical servers, and other cloud providers, making it versatile for different IT infrastructures. The flexible recovery options allow recovery of applications to their original environment or to a new instance in AWS while retaining the existing metadata and security parameters. The cost-effective staging area design reduces costs by utilizing affordable storage and minimal compute resources, making it economical for ongoing replication.

It has greatly impacted our company's specific outcomes and improved production failures. For customers, it has been quite beneficial in terms of providing automated failover and recovery options as well as flexible recovery options, which allows recovery of applications to the original environment or to a new instance in AWS while retaining the existing metadata and security parameters, which is quite useful. Encryption and security is also one of the best features. Data is encrypted during transit and at rest, ensuring information remains secure throughout the disaster recovery process.

There has definitely been a lot of improvements in recovery time with very less downtime because we already understand how to recover using the clear process that AWS Elastic Disaster Recovery provides. There has been approximately a thirty percent improvement in terms of recovery time.

What needs improvement?

AWS Elastic Disaster Recovery can be improved through regular drills to ensure that all resources are properly prepared for disasters with scheduled drills. This includes testing and understanding failback, which is crucial for a comprehensive disaster recovery plan.

Monitoring and health checks are important to continuously monitor the health of the ongoing replication using the AWS Elastic Disaster Recovery console or programmatically. This helps identify any servers that may require attention and ensures that the application is functioning correctly. Creating a CloudFormation template that can create the necessary network resources on demand is useful for disaster recovery.

There should be documentation and best practices guidance so that teams can follow best practices for implementation and maintenance of disaster recovery from on-premises using AWS. This includes a written recovery plan as well as regularly updating it with findings and required changes.

Within the scope of improvements, there are many possibilities, but it is currently providing some great results. The scope of improvements can include monitoring and health checks as well as documentation with best practices for documentations, and conducting regular drills.

For how long have I used the solution?

I have been using AWS Elastic Disaster Recovery for around two years.

What do I think about the stability of the solution?

AWS Elastic Disaster Recovery has been quite stable.

What do I think about the scalability of the solution?

The scalability is quite good and we were able to scale this service to many of the services that our company uses. It has been quite fast with reliable recovery of on-premises as well as our private cloud.

How are customer service and support?

Customer support has been quite good and has definitely solved many issues we have faced.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we were using Azure Elastic Disaster Recovery, but now we are using AWS Elastic Disaster Recovery, which is doing a great job.

What was our ROI?

In terms of time saved, it has greatly improved because of production failures, and that time is definitely saved because of the great documentation and plans that everyone understands. There are also fewer employees needed now because of the good structured planning for AWS Elastic Disaster Recovery, so fewer site reliability engineers are required.

What's my experience with pricing, setup cost, and licensing?

The pricing has been fine, and regarding the setup cost as well, it is quite fine. There is definitely a scope of improvement, and for year-end licensing, they should definitely improve the cost.

Which other solutions did I evaluate?

We evaluated other alternatives, but they were not providing good cost options. Commvault Cloud, Rubrik, and OpenText Recover were evaluated, but the number of features in AWS Elastic Disaster Recovery is quite huge and they cannot match that.

What other advice do I have?

The features that really make AWS Elastic Disaster Recovery a ten out of ten include continuous block-level replication, automated failover and recovery, non-disruptive testing, support for various environments, flexible recovery options, integration with AWS services, cost-effective staging area, encryption and security, customizable launch settings, and post-launch actions.

There are a lot of features that should make AWS Elastic Disaster Recovery appealing to potential users because of the huge market capture by AWS and the fact that most companies are using AWS, so that option should be considered.

We have been a customer only. I give this product a rating of ten out of ten. AWS Elastic Disaster Recovery has been doing quite a good job overall.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2774796

Disaster recovery has strengthened critical grid operations and maintains regulatory compliance

  • December 09, 2025
  • Review from a verified AWS customer

What is our primary use case?

AWS Elastic Disaster Recovery is utilized for recovering on-premises and cloud applications onto AWS by continuously replicating servers to a staging area. In our organization, we have had a huge case to ensure business continuity and rapid recovery of our critical IT and OT systems. This includes our data centers, our SCADA systems, our metering platforms, our customer billing systems, and the telemetry from substations and field assets. Our goal is to minimize the downtime, maintain safe and reliable electricity across the state, and support strategic objectives of operational excellence and regulatory compliance. Disaster recovery is centered around protecting and quickly restoring our critical systems that support the state's electricity transmission and distribution network.

Given that our organization manages high-voltage transmission lines and lower-voltage distribution networks, any IT or OT downtime can directly affect hundreds and thousands of customers. It can destabilize the grid and affect operational safety. AWS Elastic Disaster Recovery is essential for replicating the data center workloads, protecting our OT and SCADA systems, supporting disaster recovery planning and testing, and ensuring regulatory compliance and operational resilience.

Our main use case, along with our utilization of AWS Elastic Disaster Recovery, is for regular, non-disruptive disaster recovery drills. Routinely, our team runs failover simulations of both the IT and OT systems without affecting production, which validates the recovery time objectives of under four hours and the recovery point objectives of near zero data loss. We also use AWS Elastic Disaster Recovery to integrate with our OT telemetry and our asset data. Unlike many other organizations that focus just on IT, we focus on replicating even our SCADA systems, our pole telemetry, and our substation data so that field crews can respond immediately during network events.

Our teams also utilize AWS Elastic Disaster Recovery for prioritizing data for regulatory compliance. We classify the workloads based on criticality. Customer billing, outage management, and compliance reporting get the highest priority replication, while less critical analysis or internal reporting are replicated on a lower schedule. We utilize a hybrid recovery approach. AWS Elastic Disaster Recovery allows us to combine our on-premises data centers with cloud replication, giving us flexibility and cost efficiency while keeping sensitive operational data secure and compliant with state and federal requirements.

Several features of AWS Elastic Disaster Recovery stand out for us. The most critical is the continuous block-level replication, ensuring our critical IT and OT workloads are replicated in near real-time, which minimizes data loss during failover events. This is crucial for our SCADA systems, customer billing, and outage management because in these scenarios, even small delays or lost data can impact safety and service reliability. Another feature is the non-disruptive DR testing, which helps us perform DR drills without affecting production. This allows us to validate the recovery plans for both IT and OT systems. For example, if we want to simulate failover for substations and the field asset telemetry regularly, it does not affect our operations.

Another feature we appreciate is the automated orchestration of recovery, as AWS Elastic Disaster Recovery provides predefined recovery workflows we can use to spin up the replicated systems quickly, including networking, IP configurations, and dependencies. During last year's storm, we reduced the manual recovery effort by over 60%. The hybrid deployment flexibility of AWS Elastic Disaster Recovery also supports both on-premises data centers and cloud failover, allowing us to protect sensitive operational data while leveraging AWS scalability during high-demand recovery. Another feature we use day-to-day is their integration with monitoring and alerting, which lets us integrate AWS DRS with our monitoring tool to alert teams instantly if a replication falls behind schedule or if a recovery agent is triggered, ensuring proactive response and minimizing downtime.

We have deployed AWS Elastic Disaster Recovery in a hybrid cloud setup. We use Amazon Web Services (AWS) as the public cloud provider in our hybrid cloud setup.

What is most valuable?

I can provide a specific example of a situation where AWS Elastic Disaster Recovery helped us recover our critical systems. Last year, we had storms in the state with high winds and flooding in many areas that caused damage and threatened two of our data centers. Using AWS Elastic Disaster Recovery, we were able to fail over our customer management and metering systems to the AWS cloud within a few hours. When we replicate and fail over our customer management, metering, and outage tracking systems to the AWS cloud, we were able to upload to the AWS cloud in just under three hours, compared to an estimated 36 to 48 hours had we done it through manual recovery. Hundreds of thousands of customers were affected by the storms, but since we were able to replicate it to the AWS cloud in under three hours, our customers continued to receive accurate outage notifications through SMS and email because the replicated systems remained operational. Our field crew teams also had real-time access to the pole IDs, substation telemetry, and the asset status that helped them in improving restoration efficiency. This reduced the average time to restore power per affected area by 25%. Billing and regulatory reporting data were fully intact, which helped us prevent any errors and ensured compliance with the Australian Energy Regulator requirements. AWS Elastic Disaster Recovery has allowed us to maintain critical operations during high-impact natural disasters, protecting both our customers and our assets while demonstrating measurable improvements in our response time and regulatory compliance.

Continuous block-level replication and automated orchestration have significantly helped our team in daily operations. I can relate this to last year's storm, during which several substations in our state experienced partial outages. Thanks to the continuous block-level replication, all the telemetry from SCADA systems, pole inspections, and customer meter readings were still up-to-date in the cloud. This allowed our control center to monitor real-time network conditions without relying on compromised on-site servers. Automated orchestration means that if one data center server in our state went offline, AWS Elastic Disaster Recovery automatically spins up the replicated systems in the cloud, including network configuration and monitoring dashboards. This reduced what would have been a manual 10 to 12-hour effort down to less than three hours. The monitoring integration also played a key role because alerts were triggered immediately when replication lag approached the thresholds, helping our teams proactively address issues even before any customer impact occurred. For our daily teams, these features provide our field crews and control center staff the confidence that our critical operational data, such as outage reports, asset condition, and customer information will always be accurate and available, helping teams prioritize restoration, maintain safety, and comply with AER reporting requirements.

One very small but handy feature is AWS Elastic Disaster Recovery point-in-time recovery snapshots. On one end, continuous replication keeps the data current, but having these point-in-time recovery snapshots allows us to quickly roll back specific systems just in case a configuration error happens or if corrupted data is accidentally pushed without affecting other replicated workloads. Another feature that doesn't always get highlighted is that AWS Elastic Disaster Recovery supports both IT and OT workloads. Many disaster recovery tools focus just on IT, but the ability to replicate operational technology data, such as SCADA systems and pole telemetry, gives our field crews real-time access during outages, which has been invaluable during natural disasters including storms and extreme weather events. AWS Elastic Disaster Recovery also has minimal bandwidth and storage overhead for replication, helping us manage costs effectively while maintaining robust disaster recovery capabilities across our thousands of kilometers of network and hundreds of thousands of customers.

AWS Elastic Disaster Recovery has positively impacted our organization. Prior to using it, recovering our critical IT and OT systems after an outage could take anywhere between 10 to 12 hours manually. However, after implementing AWS Elastic Disaster Recovery and using its automated orchestration, we can now restore systems in under three hours. This means we have reduced our downtime by more than 70%. We have improved our data reliability, ensuring that telemetry, SCADA, and customer metering data are always up-to-date, which has reduced errors in operational decision-making. In terms of costs, we utilized cloud failover instead of building a full secondary on-premises disaster recovery site, resulting in an avoided capital expenditure of approximately $1.2 million while maintaining regulatory compliance with AER. We have saved time, money, and ensured customer data is up-to-date, allowing our teams to quickly generate compliance reports and outage logs, meeting AER timelines without last-minute scrambling. Our field crews and control center staff also have instant access to all our replicated OT and IT systems during any emergency, enabling faster response times and safer operations. These are some specific outcomes thanks to AWS Elastic Disaster Recovery.

Since implementing AWS Elastic Disaster Recovery, we have seen improvements in customer satisfaction and regulatory audits. During the storm last year, the replicated SCADA and metering systems allowed us to communicate outage status in near real-time, rather than relying on delayed manual reporting, which improved our customer response metrics by roughly 25% due to faster updates and restoration notifications. Our customers were able to plan their time more effectively during outages, reducing frustrations. Regarding regulatory audits for the Australian Energy Regulator, having continuous, accurate, and auditable data from AWS Elastic Disaster Recovery has simplified our submissions. Recovery logs, outage timelines, and asset status were available immediately, which has helped us reduce our time spent on manually documenting regulatory reports by about 40% and minimized our risk of non-compliance. Our field teams reported that having up-to-date cloud-accessible OT data such as pole conditions or substation status reduces guesswork and improves their safety. The accelerated restoration work has boosted their confidence in operational decisions.

What needs improvement?

A couple of things where AWS Elastic Disaster Recovery could improve are the granular testing of OT workloads. It would be helpful to have fully isolated test recoveries for our OT data, such as SCADA or pole telemetry, without impacting replication, to help validate disaster recovery readiness more frequently. Additionally, advanced reporting and analytics would be beneficial. If the tool could provide more built-in dashboards to show replication lag trends, failover readiness, or system dependencies, it would save time and improve transparency for both field teams and regulatory reporting.

In terms of integration, tighter integration with our asset management systems and GIS databases would streamline automated recovery of linked OT systems and data relationships, making failover more efficient. There should also be more fine-grained alerts for replication lag or orchestration failures, with customizable thresholds for different types of workloads to improve proactive incident response.

My advice would be to start with a clear disaster recovery strategy. Identify which IT and OT systems are critical, calculate the recovery time objective, and which assets need replication first. Keep latency-sensitive or legacy OT systems on-premises while replicating core IT workloads to AWS for fast, reliable failover. It is essential to keep testing failovers regularly, as it builds confidence and uncovers gaps that help ensure smooth operation during real incidents. Actively monitor costs by paying attention to replication storage and compute usage since AWS Elastic Disaster Recovery is pay-as-you-go, which allows us to save thousands of dollars annually. Connecting disaster recovery events with field operations, SCADA systems, and asset management dashboards streamlines operational responses. The AWS team is great, and engaging with their support and architects, along with their documentation and best practices, is very helpful.

For how long have I used the solution?

I have been using AWS Elastic Disaster Recovery for one and a half years.

What do I think about the stability of the solution?

AWS Elastic Disaster Recovery is stable and reliable.

What do I think about the scalability of the solution?

AWS Elastic Disaster Recovery is scalable and has handled growth in our organization well.

How are customer service and support?

I have not interacted with their customer support team.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

I did not previously use a different solution for disaster recovery.

How was the initial setup?

My experience with pricing, setup cost, and licensing for AWS Elastic Disaster Recovery was that there was minimal upfront capital expenditure compared to building a traditional secondary disaster recovery site. Most costs were operational in nature and based on the amount of data replicated and storage used in AWS. The licensing model uses a pay-as-you-go model, so we only pay for the replication storage, compute used during failover, and additional orchestrated testing. There is no heavy licensing fee, making it scalable and cost-efficient as our network and data grow. Overall, the flexibility and transparency of AWS pricing have been a major advantage.

What about the implementation team?

We did not purchase AWS Elastic Disaster Recovery through the AWS Marketplace.

What was our ROI?

I have seen a return on investment. We saved around $1.2 million in capital expenditure by avoiding a dedicated secondary on-premises disaster recovery site. Our downtime recovery time used to be 10 to 12 hours; now it has dropped to under three hours. We have reduced dedicated disaster recovery personnel hours by almost 30%, allowing staff to focus more on proactive network maintenance and asset management. In terms of regulatory and audit readiness, we have reduced preparation time for compliance checks by roughly 40%.

What's my experience with pricing, setup cost, and licensing?

There is no heavy licensing fee, making it scalable and cost-efficient as our network and data grow.

Which other solutions did I evaluate?

Before choosing AWS Elastic Disaster Recovery, we evaluated traditional on-premises disaster recovery sites and considered building a secondary data center locally, but rejected that option due to high capital expenditure. We also evaluated VM replication tools such as Veeam and Zerto for virtual machine replication, but those lacked seamless orchestration for hybrid IT and OT systems. Other cloud-based DR solutions, such as Microsoft Azure Site Recovery and Google Cloud's disaster recovery offerings, were also considered, but we went with AWS Elastic Disaster Recovery because it aligned best with our existing AWS workloads, offering continuous block-level replication, automated orchestration, and simple pay-as-you-go pricing.

What other advice do I have?

My overall review rating for AWS Elastic Disaster Recovery is 9.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Vamshidhar Gade

Cross-region recovery has protected critical apps and reduces downtime with proactive alerts

  • December 02, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for AWS Elastic Disaster Recovery is for any databases or applications when they go down on a cross-region. For instance, when an application is spinning up into multiple regions, we lost one, and AWS Elastic Disaster Recovery helped us recover. In that situation, when there was an event that happened in the cloud stack, AWS Elastic Disaster Recovery helped us get things back up and running. Although this happened only once, we would like to have this multi-region, multi-data center level recovery for disaster recovery, so we are incorporating this technology.

How has it helped my organization?

AWS Elastic Disaster Recovery has positively impacted my organization. We have a priority one application that was recently deployed, and it was important for us to recover the data when the cloud stack went down. Since deploying AWS Elastic Disaster Recovery, we have mostly seen an improvement in uptime, which contributes to reducing downtime.

What is most valuable?

The best features AWS Elastic Disaster Recovery offers are the insights and alerting, which inform developers or application developers about what's going on and how the system is running.

The insights and alerting features help my team day-to-day by allowing SREs to know when an event has happened and how we are supposed to be doing recovery. They provide alerts to the SREs and groups that are subscribed, and they are alerted early. I am currently exploring the features, but for now, I find it very useful in the event of the disaster that happened.

What needs improvement?

I think insights are an area for improvement. It would be beneficial to get some insights when a disaster happens, including identification and probable solutions to ensure effective recovery. That insight and solution suggestion area is the main thing I would want to see improved.

We believe that customer support for AWS Elastic Disaster Recovery needs to be improved because although we do raise tickets, the response can take some time.

For how long have I used the solution?

I have been using AWS Elastic Disaster Recovery for two years.

What do I think about the stability of the solution?

AWS Elastic Disaster Recovery is stable. It is definitely a stable application.

What do I think about the scalability of the solution?

The scalability of AWS Elastic Disaster Recovery is good. We can expand it to multiple data centers or different areas such as EMEA and APAC.

How are customer service and support?

I would rate the customer support an eight, as it often takes a lot of time to engage and get a solution. About eighty percent of the time, I think it will be resolved quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we were using a homegrown application that tracks these systems before switching to AWS Elastic Disaster Recovery.

How was the initial setup?

We did purchase AWS Elastic Disaster Recovery through the AWS Marketplace, but it's mostly the procurement team that has handled that. The management, particularly the procurement team, looks at pricing and setup costs, so I know a little about pricing, but I'm not directly involved in it.

What about the implementation team?

We are just customers and consume a lot of AWS services, and do not have another business relationship with this vendor.

What was our ROI?

We have seen a return on investment by needing fewer employees for maintenance and related matters. We no longer have to schedule employees on weekends since the system automatically triggers alerts, allowing engineers to respond as needed.

Which other solutions did I evaluate?

We did not evaluate other options before choosing AWS Elastic Disaster Recovery.

What other advice do I have?

My advice for others looking into using AWS Elastic Disaster Recovery is to definitely consider it if you are scaling your applications significantly, especially if your applications are spanned across different regions. I would give this product an eight out of ten because it's a fair score. The education of our technology and operations or SRE teams is needed since most people don't know, only a few do. I suggest that improvement in customer service for disaster recovery and the alerting system would be great.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    SauravSingh

Centralized backup facilitates quick recovery processes and effective disaster recovery drills

  • July 29, 2025
  • Review from a verified AWS customer

What is our primary use case?

I have worked with AWS Elastic Disaster Recovery for the past year. My feedback is that when we compare it, it's a good thing to have a centralized backup. When your stack is on AWS, it is very helpful, but I think when you have multi-cloud, that's where it may not be a great product.

Also, from the cost side, it is good. The best use case for this would be if you're in AWS and you want to try things quickly without the actual disaster recovery cost that you usually have to incur.

However, the challenge is the EBS snapshot. At the end of the day, they have snapshots, and they do have EBS snapshots which they capture. We ended up not using it, but we explored it for our own disaster recovery solutions that we were evaluating.

What is most valuable?

I appreciate the automated orchestration of recovery processes in this solution. That's a good thing, especially once you are able to configure something with this tool. I haven't tested the automated recovery, but they do support it. It is beneficial, especially integration with Route 53 and automatically using Route 53 to switch to a different region directly.

Because it has native integrations with all the Route 53 features, that's a good aspect. The part I really appreciated about it was they're not just AWS Backup; along with that, they give you an option to quickly do the drills. If you want to conduct DR drills, it's very useful.

What needs improvement?

I don't think there is any bad feature in AWS Elastic Disaster Recovery as such. It's more of when you do disaster recovery, you think of it more holistically. You want flexibility in terms of options. I would say it did not provide enough flexibility for all our backup needs. It had one single way of just supporting the EBS backup, or you can say volume-level backup. But let's say you want to integrate with your current backup solution; that kind of flexibility is what I would say is missing.

In terms of improvements for AWS Elastic Disaster Recovery, for any backup and disaster products, I would want it when companies are trying to evaluate these products, the biggest challenge is you want the most cost-optimal way because it's insurance.

AWS is already highly available, and you can have your infrastructure just in multiple AZs, and your life will be fine, considering the low probability of an AZ going down because of AWS's scale. You do disaster recovery basically for insurance and compliance, so it's crucial to ensure that it's very cost-optimal. There are different models that balance cost and recovery time objectives, but I have not seen any innovation; these are very old practices.

Additionally, while the storage side is key because you want your data to be there on both sides, the speed at which you can build your infrastructure also matters. It's mostly about data storage. For data storage, if you architect your storage properly, you can actually bring it up faster. For example, with a database cluster, if your database size doesn't exceed certain limits, it will significantly improve recovery time. However, these guidelines aren't offered by backup tools, as they sort of work against them. Still, to make backup cost-optimal, it is not just about the tool; it's also about how you architect your infrastructure.

For how long have I used the solution?

I have experience working with AWS Elastic Disaster Recovery for about six or seven months.

How are customer service and support?

Being an enterprise customer, I find the technical support from AWS very supportive.

How would you rate customer service and support?

Neutral

What other advice do I have?

Regarding the security features, including encryption provided by AWS Elastic Disaster Recovery, security is dependent on the user's needs. Encryption is something you need to enable based on your data and where you're storing it. I don't remember if they have an option where, by default, whatever backup you have is secured, since what you're storing is still in your own S3 or something. I think they charge you based on the amount of data. It's a shared responsibility model, but I believe they do offer a feature where you can enable encryption at rest and encryption in transit for your data, but it's our responsibility as customers; I don't think AWS does it for you.

For AWS Elastic Disaster Recovery, regarding the deployment model, we mostly tried the backup restore option. We typically haven't explored the other deployment options they offer yet. We start with a very simple backup restore and chose it for specific use cases, MongoDB backup, but as of right now, we haven't looked at it more holistically. Overall, we felt that it doesn't support all the types of backup that we have.

On a scale of one to ten, I would rate AWS Elastic Disaster Recovery an eight.


    Olusegun Akinnola

Seamless service management and integration with good flexibility

  • January 27, 2025
  • Review from a verified AWS customer

What is our primary use case?

I use the solution to deploy a Docker image application. It is hosted on GitHub, and the servers we run on are not ECR.

What is most valuable?

What I like about ECR AWS is that it is a fully managed service, so I don't need to manage the underlying infrastructure or worry about scalability in AWS concerning building, maintenance, security, and high availability. 

It offers seamless integration with services like ACL, EKS, and Fargate for deploying containerized applications. It works great with AWS, and it is flexible to use a public repository for open-source projects or a private repository for secure storage.

What needs improvement?

In its current state, ECL integrates with CloudWatch for basic logging and monitoring, yet improvements could include more detailed logs for specific actions, like when I perform actions such as push or pull. This would detail user activity directly in the ACL console for easier debugging and auditing. 

Additionally, an improved AWS pricing model is needed. AWS charges for storage and data transfer, which can add up, especially with large images or frequent pulls. Improvement should focus on offering more storage or better volume discounts for long-term use. It would also be beneficial to allow free pulls within the AWS account and vision. 

Moreover, image scanning for vulnerabilities can sometimes be slow, especially for large images. Speeding up the scanning process or providing optimized scanning for critical workflows would be welcome advancements.

For how long have I used the solution?

I have used it for about seven months now.

What do I think about the stability of the solution?

Since the time I have been using ECL, my application on AWS has not broken down. I have not had any issues with it for now. It is working well. It is very good and very reliable.

How are customer service and support?

I never had to contact the support team.

Which solution did I use previously and why did I switch?

I didn't really use Azure. However, that was in my last organization before I joined this new one. 

What other advice do I have?

I would rate AWS nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Vijay Londhe

Managed services with seamless integration and good reliability

  • January 22, 2025
  • Review from a verified AWS customer

What is our primary use case?

Our human resources solution is used by higher management competency. This is critical to the organization since it is used by higher management. ITM is really essential for the organization.

What is most valuable?

For the past year, I have been using AWS, as there was previously no native replication service available. Initially, they offered services like CloudEndure, which was a third-party service. This caused problems with integrations with existing servers. However, with AWS Elastic Disaster Recovery Service being a native service, integration is seamless. Moreover, since it is a managed service, I reduce my time to manage infrastructure and applications, which adds another benefit.

What needs improvement?

Since I have to view everything on the console, the previous application solutions like IBM and Sanavi showed the RPO and RTO status directly. In AWS Disaster Recovery Service, these details are not available, making it difficult to check my replication status. I have to calculate whether my data is replicated to the Adarabad region or not. These features, if available in AWS, would be beneficial.

For how long have I used the solution?

I have been using it since 2019.

What do I think about the stability of the solution?

AWS is not difficult, but the cost associated with replicating data to another region can be significant. This is due to services like the duplication server, which continuously runs in AWS. I have more than 200 hosts, including email solutions and others, which contribute to the high cost. Cost is a concern. Otherwise, the service is reliable.

How are customer service and support?

Customer service is quite helpful. I have AWS enterprise-level support, which is very beneficial. In case of any issue, they are ready to provide support within the defined SLA timeline.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Earlier, I worked with IBM Sonavi. I stopped using it since we moved from on-premise to cloud. It's not in use right now.

How was the initial setup?

There were no issues during the initial setup.

What about the implementation team?

The implementation is actually managed by our partner. I have taken a rate per user storage. The licensing part is completely managed by the partner.

What was our ROI?

For the past year, I have been using AWS, as there was previously no native replication service available. Initially, they offered services like CloudEndure, which was a third-party service. This caused problems with integrations with existing servers. However, with AWS Elastic Disaster Recovery Service being a native service, integration is seamless, highlighting the return on investment.

What's my experience with pricing, setup cost, and licensing?

The setup is actually managed by our partner. I have taken a rate of per user. Licensing is completely managed by the partner. I am paying per user and per GB storage cost, while the infrastructure cost is separate.

What other advice do I have?

Although no financial benefit from using it has been observed, I recommend the solution. The overall product rating is eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Lucky Lushaba

Prevents security breaches and covers data leak and recovery

  • July 09, 2024
  • Review from a verified AWS customer

What is our primary use case?

If there is a data leak, incident, or compliance issue, auditors may want to verify whether there is a policy and plan in place for utilizing AWS Elastic Disaster Recovery.

As part of a strategic approach, I have been part of a team ensuring compliance with various regulations, including HIPAA compliance. I have contributed to developing strategies to satisfy audits and inspections from various government bodies. These strategies outline the plans and features to be utilized if needed.

What is most valuable?

AWS, as a cloud platform, helps build trust in its services. There have been incidents where clients using Amazon services faced security breaches, but these stories seem more frequent with Microsoft. This might be a personal bias, and others may have different experiences. AWS proactively protects its reputation by addressing issues and investing heavily in its tools, app tech, and engineers.

What needs improvement?

Pricing could be improved.

What do I think about the stability of the solution?

The solution is stable because we haven't had any incidents.

What do I think about the scalability of the solution?

It's scalable because of the value and investment it has made in terms of capacity.

What was our ROI?

Every business survives because of its reputation. In case of any disaster, AWS cannot guarantee 100% security, but it helps protect the company's reputation. It also assists in providing remedies to solve any particular problems that may arise. AWS is a platform that supports businesses.

What's my experience with pricing, setup cost, and licensing?

It has pay-as-you-go pricing. The cost will be different if you are not utilizing it as often as possible because there are costs beforehand and after an incident.

What other advice do I have?

If you are using AWS for your disaster recovery, it's important to use AWS Elastic Disaster Recovery to ensure continuity in case of any failures. Having a strategic approach means considering the cost of disaster recovery as part of your overall planning.

Overall, I rate the solution an eight out of ten.


    Miller Cortés

Provides ease of deployment and continuous data protection

  • July 03, 2024
  • Review from a verified AWS customer

What is our primary use case?

The primary use case for AWS Elastic Disaster Recovery is to ensure data replication and protection across diverse environments without the need for hypervisor integration.

What is most valuable?

The product's most valuable features include its ease of deployment, cost-effectiveness due to AWS's pay-as-you-go pricing model, and continuous data protection.

What needs improvement?

The product could be improved by incorporating more AI-driven automation for deployment and additional security features. These enhancements would make the solution even more user-friendly and secure.

For how long have I used the solution?

I have been using AWS Elastic Disaster Recovery for several years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The platform offers excellent scalability, allowing it to accommodate the needs of both small-scale environments and large enterprises without significant changes to the setup.

How are customer service and support?

The technical support has been effective, providing necessary assistance and resolving issues promptly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used solutions like Double-Take and Carbon. We switched to AWS Elastic Disaster Recovery because of its versatility in deployment across different environments without requiring specific hardware or hypervisor dependencies.

How was the initial setup?

The initial setup can vary in complexity depending on the specific environment and setup requirements. While the deployment process is generally straightforward, detailed planning and configuration are essential to ensure a successful implementation.

What about the implementation team?

The implementation was handled by our in-house team.

What was our ROI?

The ROI has been substantial, primarily due to its cost-effective pricing model. It reduces downtime and data loss during disaster recovery scenarios.

Which other solutions did I evaluate?

We evaluated several other options, including traditional on-premises disaster recovery solutions and cloud-based offerings.

What other advice do I have?

AWS Elastic Disaster Recovery is a robust and reliable solution for disaster recovery needs. However, thorough planning and regular monitoring are crucial to maximizing its benefits and ensuring seamless operation.

I rate it a nine.


    Duy AnhMai

Cloud-based solution enhances company backup but comes with high costs

  • May 30, 2024
  • Review from a verified AWS customer

What is our primary use case?

We are using AWS Elastic Disaster Recovery for backup purposes in our company.

How has it helped my organization?

AWS Elastic Disaster Recovery is convenient because it is cloud-based technology.

What is most valuable?

The strong points are the stability and scalability of the solution, as well as the convenience of it being cloud-based.

What needs improvement?

The cost of AWS Elastic Disaster Recovery is seen as expensive.

For how long have I used the solution?

We have been using AWS Elastic Disaster Recovery for five or six years.

What do I think about the stability of the solution?

I rate the stability of AWS Elastic Disaster Recovery as nine out of ten.

What do I think about the scalability of the solution?

I rate the scalability of AWS Elastic Disaster Recovery as nine out of ten.

How are customer service and support?

The customer service and technical support for AWS are very good and helpful. I rate it ten out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not work with any other products before AWS.

What about the implementation team?

We use a third-party consultant company to help with integration.

What's my experience with pricing, setup cost, and licensing?

The pricing of AWS is considered expensive compared to other options.

Which other solutions did I evaluate?

We have also used Microsoft Azure as an alternate solution.

What other advice do I have?

I would recommend AWS Elastic Disaster Recovery to other users.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2248701

Has a complex setup and takes about a day to get the network configured properly for a network failover test

  • February 23, 2024
  • Review provided by PeerSpot

What is our primary use case?

We were using CloudEndure Disaster Recovery as a backup for websites when we had a double ISP outage.

What is most valuable?

CloudEndure Disaster Recovery is a fairly stable solution.

What needs improvement?

The solution never reduced our system's downtime. It would take us about a day to get the network configured properly for even doing a network failover test. The solution's orchestration capabilities did not simplify our disaster recovery process.

The solution's network setup and a lot of the control tower setup could be improved. The solution should provide more ease of use for the creation of cloud appliances for firewalls.

For how long have I used the solution?

I have been using CloudEndure Disaster Recovery for three years.

What do I think about the stability of the solution?

I rate the solution an eight out of ten for stability.

What do I think about the scalability of the solution?

I rate the solution a five or six out of ten for scalability.

How was the initial setup?

The solution's initial setup was fairly complex, and the company that did the initial setup for us messed up a couple of times.

On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup a one or two out of ten.

What about the implementation team?

The solution was deployed by three people from my team and two engineers from the company.

What's my experience with pricing, setup cost, and licensing?

On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing an eight out of ten.

What other advice do I have?

The solution's replication was fine. We faced issues when we actually tried to utilize it. Every time we made a big change to any of the on-premise servers that were being replicated, we'd always have to change our replication engines, sizing, and the disc it's written on. Otherwise, it would end up taking around 30 days for a small monthly Windows update to replicate.

I would not recommend CloudEndure Disaster Recovery to other users because of all the issues we had with the wrong sizing and the fact that there are better solutions in the market.

Overall, I rate the solution a two out of ten.