SCALE UP TO THOUSANDS OF CORES AND SEATS VIA OUR ON-DEMAND PLATFORM
Easily scale up or down to as many cores and seats as you want with our cloud power-by-the-hour model. This unique flexible model allows you to choose how many cores and simultaneous simulations you want to run.
RUN ANYWHERE THANKS TO THE EASY-TO-USE WEB BROWSER ACCESS
No need to stay behind your desk. Get access to your simulation environment from anywhere around the world from within your web browser.
We provide you with the full environment, so no need to install software and no need to shop around for hardware. Access the latest technology wherever you are and get started.
FULLY SECURED ENVIRONMENT
Our cloud environment is fully secured thanks to container security layer technology.
More details below
FULLY SECURED ENVIRONMENT THROUGH CONTAINER SECURITY LAYERS
HPC Containers Provide Additional Security over HPC
- Containers + Bare Metal + Dedicated Servers = Most Secure Infrastructure
- Isolated from host server and other UC containers running on other hosts within the same network
- Host server is protected: If one container is hacked, the host and other containers are not impacted
- Secure Remote Access restricted to container (via The SSL for GUI access and SSH encryption for file transfers and remote command line access)
- Separation of Duties: Containers built only once, reused unlimited times without any change or interaction.