metered VPS Piergiorgio Venuti

62 Data Center in 25 Countries

metered VPS

[huge_it_maps id=”2″]

 

 

For several years, Secure Online Desktop offers Cloud servers and cloud services not only on hardware resources physically located in Italy, but also through customized custom projects abroad.

We are pleased to announce that thanks to an update of our web interface, it is now possible for a customer / partner to independently select the Datacenter according to the desired location by selecting from a list of 62 Datacenter in 25 countries around the world.

The Cloud Server that can be deployed across all of our Datacenter is the so-called VPS metered, ie Virtual Private Server whose cost is measured based on the time consuming of hardware resources, unlike classic VPS or SuperCloud, you can actually create a server for a few hours or for a few days, paying only for the time of use. In this sense, VPS metered are much cheaper than the so-called flat servers whose cost is constant and therefore does not vary within the billing period.

For those who fit the VPS metered?

Metered VPS are ideal under the following conditions:

   ♦ Limited use

      For demo, development and testing servers in periods of less than one month.

   ♦ The need for hardware resources outside of Italy

      For projects where you need to deploy resumes in different locations, for example: Multi-site projects, multi-pop, disaster recovery, offsite backup, etc.

   ♦ Better performance

      VPS metered can be created in one or more of the following Datacenter, for each Datacenter there is a score showing its relative performance, relative to the others. The score is between 1 and 100, the higher the score will be the performance of that Datacenter.

 

metered VPS Pro Tier and Dev Tier

There are currently two plans for metered VPS (soon the Enterprise plan will also be released), let’s see the difference macros together:

   ♦ Pro Tier

      It is necessary to select this type of Datacenter for server in production where it is necessary to ensure an adequate level of reliability and performance. This level ensures all the parameters required for a 100% uptime such as the presence of professional UPSs, high reliability resources, enterprise-wide components, etc.

   ♦ Dev Tier

      This level, much cheaper, is suitable for test or demo servers that are not in a production environment where high reliability is not required.

 

For those who are not fit for VPS metered?

Metered VPS are NOT ideal under the following conditions:

   ♦ Need to have flat costs

      By its very nature, the consumption and the relative costs of the metered servers vary according to use so they are not really ideal where it is absolutely necessary to have fixed costs.

   ♦ Need to have Italian resources

    The metered servers are deployed on 62 worldwide Datacenters, if a customer needs (for policy, internal regulations, etc) to have only hardware resources on Italian national territory then he should not choose this type of server unless the two Italians Datacenter in the list.

   ♦ Need to have IPv6 addresses

      IPv6 addresses are not yet supported by this type of server.

   ♦ Need to have internal network

      Internal networks (private LAN, VLANs, secondary LANs) are not yet supported by this type of server.

   ♦ Need to have the Cloud customization

      Customizations are not yet supported by this type of server.

 

In all the above cases, you need to navigate to Cloud Servers or SuperClouds.

 

USEFUL LINKS:

METERED VPS

 

[btnsx id=”2931″]

 

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.Hupigon.adef / Remote Stack Buffer Overflow January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/c8f55ce7bbec784a97d7bfc6d7b1931f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.adef Vulnerability: Remote Stack Buffer Overflow Description: Backdoor Hupigon (Cracked by bartchen) bartchen () vip sina com, listens on TCP ports 8001,8002,8003,8004 and 8005. Sending a large contaminated HTTP POST request...
  • Backdoor.Win32.Xel / Remote Authentication Buffer Overflow January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/3648c68bfe395fb9980ae547d881572c.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Xel Vulnerability: Remote Authentication Buffer Overflow Description: Xel listens on TCP port 8023 and requires authentication good for them!, upon connecting you are greeted with a password prompt: XeL TROJAN based […]
  • Backdoor.Win32.Verify.f / Missing Authentication January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/119cd00c48678d63ec07762a7ff08ac7.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Verify.f Vulnerability: Missing Authentication Description: Backdoor.Win32.Verify by pMK, yet another self-hating backdoor as it lacks authentication granting access to whoever can reach the infected system. This malware listens on...
  • Backdoor.Win32.Onalf / Missing Authentication January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ba815d409cd714c0eac010b5970f6408.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Onalf Vulnerability: Missing Authentication Description: WinRemoteShell (Onalf) listens for commands on TCP port 2020. Interestingly, it will only start listening once it can connect outbound to SMTP port 25. Not much […]
  • Backdoor.Win32.WinShell.30 / Remote Stack Buffer Overflow / Missing Authentication January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/56a2b135c8d35561ea5b04694155eb77.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.WinShell.30 Vulnerability: Remote Stack Buffer Overflow / Missing Authentication Description: WinShell.30 listens on TCP port 5277 for commands. Attackers or responders who can reach the infected host can trigger a buffer […]
  • Backdoor.Win32.Zxman / Missing Authentication January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6b2a9304d1c7a63365db0f9fd12d39b0.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Zxman Vulnerability: Missing Authentication Description: Backdoor.Win32.Zxman by Zx-man listens on TCP port 2048 for commands. However, anyone who can reach the infected host can take control as there is no authentication […]
  • Backdoor.Win32.Whisper.b / Remote Stack Corruption January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a0edb91f62c8c083ec35b32a922168d1.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Whisper.b Vulnerability: Remote Stack Corruption Description: Whisper.b listens on TCP port 113 and connects to port 6667, deletes itself drops executable named rundll32.exe in Windows\System dir. The malware is prone to […]
  • Backdoor.Win32.Whirlpool.10 / Remote Stack Buffer Overflow January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bf0682b674ef23cf8ba0deeaf546f422.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Whirlpool.10 Vulnerability: Remote Stack Buffer Overflow Description: Whirlpool listens on UDP Datagram ports 8848 and 8864. Sending a 192 byte payload to port 8864 triggers a stack buffer overflow overwriting both […]
  • Backdoor.Win32.Zombam.geq / Remote Buffer Overflow January 22, 2021
    Posted by malvuln on Jan 22Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/fd14cc7f025f49a3e08b4169d44a774e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Zombam.geq Vulnerability: Remote Buffer Overflow Description: Zombam.geq listens for connections on TCP port 80 and trys connect to SMTP port 25. By sending a HTTP GET request of about 2000 bytes […]
  • [REVIVE-SA-2021-001] Revive Adserver Vulnerabilities January 22, 2021
    Posted by Matteo Beccati via Fulldisclosure on Jan 22======================================================================== Revive Adserver Security Advisory REVIVE-SA-2021-001 ------------------------------------------------------------------------ https://www.revive-adserver.com/security/revive-sa-2021-001 ------------------------------------------------------------------------ CVE-IDs: CVE-2021-22871, CVE-2021-22872, CVE-2021-22873 Date:...

Customers

Newsletter