Thanks to Cloud Computing, the on-demand delivery of IT resources is now within everyone's reach. You can use all the computing power, storage and databases you need (upscale or downsize with just a few clicks), without having to take care of maintenance.
Each layer of Cloud Services or Cloud Computing offers different levels of control, flexibility and management. This allows you to easily choose a service that best suits your wishes, needs and possibilities.
Fuga Cloud uses OpenStack and believes in Open Source techniques. For example, by using Kubernetes it is possible to easily and quickly set up an elastic web server framework for cloud applications. And thanks to our user-friendly dashboard, maintenance can be arranged clearly and efficiently.
Fuga Compute offers highly scalable Instances (also known as Virtual Machines). These Instances contain CPU, RAM, SSD storage and a high number of free IOPs. They are available in many predefined formats, including fully optimised types (RAM-optimised and CPU-optimised) for special needs.
Our regions are located in the most highly regarded data centres, built on the best hardware and maintained by a fully automated CI/CD pipeline that first fully tests all our updates to the Fuga platform before they are launched. This allows us to guarantee high performance and a very stable platform.
Fuga Cloud does everything in its power to secure the platform. We continue to validate our efforts through periodic vulnerability assesments and penetration testing. In addition, Fuga Cloud has various certifications (ISO27001, ISO20000 and NEN7510) that ensure that our service is performed to a high standard. We are a 100% Dutch company and therefore fall under Dutch and European regulations. Within this legislation, privacy is an important factor that we fully support. After all, there is a reason we are a member of the CiC and contribute to the GAIA-X project.
We are therefore fully GDPR/AVG compliant.
In addition to our focus on security, we offer an extensive toolset that ensures that you as well can safely launch and manage your project.
Fuga offers you the possibility to create security group rules yourself. Security groups are a set of IP filter rules that define your network access.
Public-key authentication with Secure Shell is more secure than password authentication, because it provides much more identity checking. You must have a private key and the correct password to identify yourself to your platform.
Because security is very important, we ensure that all instances are standard behind our advanced Anti-DDoS layer. This means you are protected against DDoS attacks free of charge.
Need extra Memory or more CPU power? Check out our pricing page.
Fuga Cloud provides ready-to-use OS images. With one click you choose an OS that is immediately installed when you launch an instance.
In addition to the standard OS images, you can also create images yourself. These will then end up nicely in your own catalog so that you can also deploy them with one click.
We have the following cloud images available for you: CentOS 7 2003, CentOS 8 1911, CentOS Stream 8, CirrOS 0.3.5, CoreOS 2191.5.0 Stable, Debian 10.10.3, Debian 9.12.2, Fedora 28 Base, Fedora 31, Fedora CoreOS 32 20201104, OpenSUSE Leap 42.3, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS.
Proudly made in The Netherlands
Copyright © 2022 FUGA BV