CloudVelox approahes workload Optimization in three phases of the cloud optimization lifecycle:
Using the Automated Application Blueprinting capabilities, CloudVelox OHC 4.0 can optimize cost, performance, and availability by matching the applications's data center infrastucture characteristics to the appropriate cloud compute, storage, network, and security services to deliver enhanced management and control for applications oved or protected in the cloud.
CloudVelox can enable continuous optimization of migrated workloads running in the cloud. Key areas such as instance, storage, availability, and security policy of cloud workloads will be continuously monitored to deliver actionable insights. Insights can be implemented to yield cost savings, better performance and availability as well as compliance with regulatory requirements.
Some of the applications moved to the cloud can further leverage cloud native services to deliver agility, cost savings, and higher availability.
Single systems or a group of appsystems assigned tags (up to 50) to classify and categorize the migrated workloads.
Tags can specify type of application, line of business, owner, etc. Tags can be used for billing, reporting, utilization analysis, and creating policies for cost and peformance optimization.
Placement groups enable performance optimization for applications requiring high performance compute, low latency, and loads of network I/O.
An app or a group of appsystems can be assigned to a placement group in a selected AWS region
Automates the creation of a Placement Group and launching instances (belonging to an application) in a Placement Group
Placement Groups provide high bandwidth low latency interconnect between instances (VM's).
Applications that need high network throughput or low latency or both benefit by placing them into a Placement Group.
Security groups assigned to a single systems or a group of appsystems.
Security policies for apps are mapped to the cloud to meet regulatory and compliance requirements.
Identity and Access Management (IAM) roles
IAM roles assigned to a single system or a group of apps to prevent unwarranted access of AWS resources.
Access permissions can be modified at both group and individual system level enabling eas of management.
Automated assignment of IAM roles to systems at run-time increase IT productivity and reduce the security risk of providing creditials manually or through scripts.