Continuous Assurance for the AWS Well-Architected Framework [US EVENT]

Presented by

Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software

About this talk

Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure. This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes. Topics of discussion will include: - Challenges to building and maintaining robust infrastructure - Removing threats to Well-Architected adherence - How the solution works in a joint customer case study The session's guest speakers are: - Rob Melka, Senior Solutions Architect at AWS - Ori Tabachnik, CRO at CloudZone - Avi Aharon, VP Cloud at Continuity Software
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (4)
Subscribers (468)
Continuity Software helps the world’s leading organizations, including 6 of the top 10 US banks, to proactively prevent downtime, data-loss and cyber resilience risks in hybrid IT infrastructure. Our next generation of resilience assurance solutions are designed for today’s complex hybrid and multi-cloud environments, covering every type and combination of environment (legacy, on-prem, private cloud, public cloud, and hybrid) and the various technologies used in modern environments (software-defined infrastructure, containers, etc.). As a result, unplanned infrastructure outages are reduced by an average of 80% and configuration errors are resolved before they turn into costly service incidents. Our proven technology and methodology now encompass cyber resilience. Our solutions protect mission-critical data residing in vulnerable storage systems against cyberattacks, prevent data loss, and ensure data recoverability.