Cloud Instances could be accessed from anywhere and at any time to fit your computing requirements. It is designed to completely satisfy customer needs, its easily extendable, cost effective, fast, secure and it could be easily deployed in seconds.
The latest hardware technology. All our Cloud infrastructure is built on latest technology Octa Core (8 Core) CPU, ECC RAM and RAID SSD Equipped Servers.
High Performance SSD Disk Infrastructure
KVM Virtualization (Kernel – Based Virtual Machine) provides rich capabilities for Scalability, Enterprise Class Performance and Security Hardening Requirements. It is the most feature advanced virtualization technology preferred by most of the Enterprises.
API support - API facilitates the access of third-party applications and software components to interact with your virtual machines and your Cloude account.
For the full API features, please click here
Access to dedicated fast international network ( 2GB/s)
Control and manage your instance easily and instantly
Two-factor authentication - An additional layer of security for user’s data.
SSH Fingerprint – Raising security levels for a trusted authentication and for your encrypted data.
Tag Systems - Servers and snapshots can be labeled and grouped inside the control panel. Allowing them to be filtered and simplifying management for any user.
Main Features
All our Cloud infrastructure is hosted in data centers which are certified by international authorities as Tier 4, being the highest industry standards. In Romania, our infrastructure is hosted at NXData Bucharest. In Turkey, our infrastructure is hosted at IBM Turkey Datacenters, which are located in Levent/Instanbul and Bayrakli/Izmir. We will soon open new data center locations in Frankfurt/Germany, Amsterdam/Netherlands and Sofia/Bulgaria.
Intel® Trusted Execution Technology (Intel® TXT) provides hardware-based security technologies at an international level which provides therefore a solid security foundation and platform. Intel TXT is specifically designed to harden platforms from the emerging threats of hypervisor attacks, BIOS, or other firmware attacks, malicious root kit installations, or other software-based attacks. It increases protection by allowing greater control of the launch stack through a Measured Launch Environment (MLE) and enabling isolation in the boot process. More specifically, it extends the Virtual Machine Extensions (VMX) environment of Intel® Virtualization Technology (Intel® VT), by permitting a verifiably secure installation, launch, and use of a hypervisor or operating system (OS).