IT as a Service - EUDC provides Infrastructure- and Platform-as-a-Service from Euro Data Center and IBM Petrom City data centers.
Choose between three branches: Data Center, Carrier and Cloud Services.
Protect your virtualized workloads from unforeseen system failures. The Disaster Recovery service provides you with a secondary location for data backup and management, guaranteeing your data and the continued operation of your applications.
Replication and back-up solutions in two locations: Euro Data Center and IBM Petrom City.
EUDC operates from atomic shelter-housed Euro Data Center in Transylvania, Romania and IBM Petrom City Bucharest, Romania.
High Performance Computing supported by dedicated clusters and SAN switching. High Density power and cooling with up to 25KW per 42U Rack.
Network Operations Command Center (NOCC) available 24/7. On-site physical security 24/7. Agile and flexible migration support, configurations and scaling.
Euro Data Center is located in the center of Romania, in Brasov, between the Curvature Carpathians and the Southern Carpathians. It is protected in the Local Anti-Aircraft Shelter.
IBM Petrom City is located in the Romanian capital, Bucharest, on a seismic plate separate from that of Brasov.
The two computing centers, located 170km away and 500m altitude difference, are interconnected with guaranteed band width and with capacities up to 10 Gbps.
Through advanced expertise and the use of project design instruments, we developed a solution based on modern technologies in data centers in order to facilitate the client's ease of rapid implementation of IT and Telecommunication services and infrastructure. We assure enhanced flexibility, reduced operational costs, complexities and risks.
Colocation services are ideal for businesses which want to have their own hardware and software systems in parallel with the security of partial or total hosting in a data center.
read all“Virtual Dispersive Networking” refers to a revolutionary technology which brought cyber security one step in front of hackers trying to access data transferred through different online methods.
read allWe all know two step authentication systems which are available on all modern online services and apps. These offer a higher level of security for their user which do not want to risk having their personal data and files compromised.
read all