metered VPS Piergiorgio Venuti

62 Data Center in 25 Countries

metered VPS

[huge_it_maps id=”2″]

 

 

For several years, Secure Online Desktop offers Cloud servers and cloud services not only on hardware resources physically located in Italy, but also through customized custom projects abroad.

We are pleased to announce that thanks to an update of our web interface, it is now possible for a customer / partner to independently select the Datacenter according to the desired location by selecting from a list of 62 Datacenter in 25 countries around the world.

The Cloud Server that can be deployed across all of our Datacenter is the so-called VPS metered, ie Virtual Private Server whose cost is measured based on the time consuming of hardware resources, unlike classic VPS or SuperCloud, you can actually create a server for a few hours or for a few days, paying only for the time of use. In this sense, VPS metered are much cheaper than the so-called flat servers whose cost is constant and therefore does not vary within the billing period.

For those who fit the VPS metered?

Metered VPS are ideal under the following conditions:

   ♦ Limited use

      For demo, development and testing servers in periods of less than one month.

   ♦ The need for hardware resources outside of Italy

      For projects where you need to deploy resumes in different locations, for example: Multi-site projects, multi-pop, disaster recovery, offsite backup, etc.

   ♦ Better performance

      VPS metered can be created in one or more of the following Datacenter, for each Datacenter there is a score showing its relative performance, relative to the others. The score is between 1 and 100, the higher the score will be the performance of that Datacenter.

 

metered VPS Pro Tier and Dev Tier

There are currently two plans for metered VPS (soon the Enterprise plan will also be released), let’s see the difference macros together:

   ♦ Pro Tier

      It is necessary to select this type of Datacenter for server in production where it is necessary to ensure an adequate level of reliability and performance. This level ensures all the parameters required for a 100% uptime such as the presence of professional UPSs, high reliability resources, enterprise-wide components, etc.

   ♦ Dev Tier

      This level, much cheaper, is suitable for test or demo servers that are not in a production environment where high reliability is not required.

 

For those who are not fit for VPS metered?

Metered VPS are NOT ideal under the following conditions:

   ♦ Need to have flat costs

      By its very nature, the consumption and the relative costs of the metered servers vary according to use so they are not really ideal where it is absolutely necessary to have fixed costs.

   ♦ Need to have Italian resources

    The metered servers are deployed on 62 worldwide Datacenters, if a customer needs (for policy, internal regulations, etc) to have only hardware resources on Italian national territory then he should not choose this type of server unless the two Italians Datacenter in the list.

   ♦ Need to have IPv6 addresses

      IPv6 addresses are not yet supported by this type of server.

   ♦ Need to have internal network

      Internal networks (private LAN, VLANs, secondary LANs) are not yet supported by this type of server.

   ♦ Need to have the Cloud customization

      Customizations are not yet supported by this type of server.

 

In all the above cases, you need to navigate to Cloud Servers or SuperClouds.

 

USEFUL LINKS:

METERED VPS

 

[btnsx id=”2931″]

 

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • CVE-2024-31705 April 14, 2024
    Posted by V3locidad on Apr 14CVE ID: CVE-2024-31705 Title : RCE to Shell Commands" Plugin / GLPI Shell Command Management Interface Affected Product : GLPI - 10.X.X and last version Description: An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute arbitrary code via the insufficient validation of user-supplied input. […]
  • SEC Consult SA-20240411-0 :: Database Passwords in Server Response in Amazon AWS Glue April 14, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 14SEC Consult Vulnerability Lab Security Advisory < 20240411-0 > ======================================================================= title: Database Passwords in Server Response product: Amazon AWS Glue vulnerable version: until 2024-02-23 fixed version: as of 2024-02-23 CVE number: - impact: medium homepage: https://aws.amazon.com/glue/ found:...
  • [KIS-2024-03] Invision Community <= 4.7.16 (toolbar.php) Remote Code Execution Vulnerability April 11, 2024
    Posted by Egidio Romano on Apr 10------------------------------------------------------------------------------ Invision Community
  • [KIS-2024-02] Invision Community <= 4.7.15 (store.php) SQL Injection Vulnerability April 11, 2024
    Posted by Egidio Romano on Apr 10-------------------------------------------------------------------- Invision Community
  • Multiple Issues in concretecmsv9.2.7 April 11, 2024
    Posted by Andrey Stoykov on Apr 10# Exploit Title: Multiple Web Flaws in concretecmsv9.2.7 # Date: 4/2024 # Exploit Author: Andrey Stoykov # Version: 9.2.7 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com Verbose Error Message - Stack Trace: 1. Directly browse to edit profile page 2. Error should come up with verbose stack trace […]
  • OXAS-ADV-2024-0001: OX App Suite Security Advisory April 11, 2024
    Posted by Martin Heiland via Fulldisclosure on Apr 10Dear subscribers, We&apos;re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those vulnerabilities. Feel free to join our bug bounty programs for OX App Suite, Dovecot and PowerDNS at YesWeHack. This advisory has also been published at https://documentation.open-xchange.com/appsuite/security/advisories/html/2024/oxas-adv-2024-0001.html. […]
  • Trojan.Win32.Razy.abc / Insecure Permissions (In memory IPC) April 11, 2024
    Posted by malvuln on Apr 10Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/0eb4a9089d3f7cf431d6547db3b9484d.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Razy.abc Vulnerability: Insecure Permissions (In memory IPC) Family: Razy Type: PE32 MD5: 0eb4a9089d3f7cf431d6547db3b9484d SHA256: 3d82fee314e7febb8307ccf8a7396b6dd53c7d979a74aa56f3c4a6d0702fd098 Vuln ID: MVID-2024-0678...
  • CVE-2023-27195: Broken Access Control - Registration Code in TM4Web v22.2.0 April 11, 2024
    Posted by Clément Cruchet on Apr 10CVE ID: CVE-2023-27195 Description: An access control issue in Trimble TM4Web v22.2.0 allows unauthenticated attackers to access a specific crafted URL path to retrieve the last registration access code and use this access code to register a valid account. If the access code was used to create an Administrator […]
  • [CFP] IEEE CSR Workshop on Cyber Forensics& Advanced Threat Investigations in Emerging Technologies 2024 April 5, 2024
    Posted by Andrew Zayine on Apr 05Dear Colleagues, IEEE CSR Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies organizing committee is inviting you to submit your research papers. The workshop will be held in Hybrid mode. The in-person mode will held at Hilton London Tower Bridge, London from 2 to 4 September […]
  • Backdoor.Win32.Agent.ju (PSYRAT) / Authentication Bypass RCE April 5, 2024
    Posted by malvuln on Apr 05Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Agent.ju (PSYRAT) Vulnerability: Authentication Bypass RCE Family: PSYRAT Type: PE32 MD5: 0e6e40aad3e8d46e3c0c26ccc6ab94b3 Vuln ID: MVID-2024-0677 Disclosure: 04/01/2024 Description: The PsyRAT 0.01 malware listens on...

Customers

Newsletter

{subscription_form_1}