Click Below For More Images:
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting

Primavera P6 in the Cloud

Global PM’s “Primavera P6 in the Cloud” is a hosted solution for deploying Oracle’s Primavera P6 from your PC or tablet from anywhere in the world.

A few of the benefits include:

  • 99.9% uptime
  • Simple per-user pricing model
  • Greatly decreased chance of data loss. Backups of your schedule data can be made hourly, daily, weekly, and/or monthly.
  • Increased security. We have top-tier hardware and software security measures in place. Also, all of our data centers are based in the USA!
  • Ease of access to your Primavera P6 software. Login from:
    • ANY computer with internet access (Google Chrome recommended) or
    • VMware app (included)

Step 1: Select your software (Annual fee)

Step 2: Select number of users

Server Setup/P6 Installation


Learn about the benefits of Global PM’s cloud hosting package.

  • Anytime / anywhere access You can access your projects using any device from anywhere with internet access!
  • U.S. based hosting. Data centers in Lafayette, LA; Dallas, TX; and Las Vegas, NV.
  • Quick turnaround! We can typically get you up and running within one business day!
  • Simple Pricing:
    • If you already own P6:
      • $99 per user/month plus
      • $299 server setup fee (includes P6 installation)
  • Superior performance and security. 99.9% uptime and multi-site backups in the U.S.

Cloud Hosting

Seven Technical Security Benefits of the Cloud


  • Centralized Data

    Reduced Data Leakage: this is the benefit I hear most from Cloud providers – and in my view they are right. How many laptops do we need to lose before we get this? How many backup tapes? The data “landmines” of today could be greatly reduced by the Cloud as thin client technology becomes prevalent. Small, temporary caches on handheld devices or Netbook computers pose less risk than transporting data buckets in the form of laptops. Ask the CISO of any large company if all laptops have company ‘mandated’ controls consistently applied; e.g. full disk encryption. You’ll see the answer by looking at the whites of their eyes. Despite best efforts around asset management and endpoint security we continue to see embarrassing and disturbing misses. And what about SMBs? How many use encryption for sensitive data, or even have a data classification policy in place?

    Monitoring benefits: central storage is easier to control and monitor. The flip-side is the nightmare scenario of widespread data theft. However, I would rather spend my time as a security professional figuring out smart ways to protect and monitor access to data stored in one place (with the benefit of situational advantage) than trying to find all the places where the company data resides across a myriad of numerous clients! You can get the benefits of Thin Clients today, but Cloud Storage provides a way to centralize the data faster and potentially cheaper. The logistical challenge today is getting Terabytes of data to the Cloud in the first place.

  • Incident Response / Forensics

    Forensic readiness: with Infrastructure as a Service (IaaS) providers, I can build a dedicated forensic server in the same Cloud as my company and place it offline, ready for use when needed. I would only need pay for storage until an incident happens and I need to bring it online. I don’t need to call someone to bring it online or install some type of remote boot software – I just click a button in the Cloud Providers web interface. If I have multiple incident responders, I can give them a copy of the VM so we can distribute the forensic workload based on the job at hand or as new sources of evidence arise and need analysis. To fully realize this benefit, commercial forensic software vendors would need to move away from archaic, physical dongle based licensing schemes to a network licensing model.

    Decrease evidence acquisition time: if a server in the Cloud gets compromised (i.e. broken into), I can now clone that server at the click of a mouse and make the cloned disks instantly available to my Cloud Forensics server. I didn’t need to “find” storage or have it “ready, waiting and unused” – it is just there.

    Eliminate or reduce service downtime: I didn’t have to tell the COO that the system needs to be taken offline for hours while I dig around in the RAID Array hoping that my physical acquisition toolkit is compatible.

    Eliminate forensic image verification time: Some Cloud Storage implementations expose a cryptographic checksum or hash. For example, Amazon S3 generates an MD5 hash automagically when you store an object. In theory, you no longer need to generate time-consuming MD5 checksums using external tools – it is already there.

    Decrease time to access protected documents: Immense CPU power opens some doors. Did the suspect password protect a document that is relevant to the investigation? You can now test a wider range of candidate passwords in less time to speed investigations.

  • Password Assurance Testing

    Decrease password cracking time: if your organization regularly tests password strength by running password crackers you can use Cloud Compute to drop crack time, and you only pay for what you use. Ironically, your cracking costs go up as people choose better passwords ;-).

    Keep cracking activities to dedicated machines: if today you use a distributed password cracker to spread the load across non-production machines, you can now put those agents in dedicated Compute instances – and thus stop mixing sensitive credentials with other workloads.

  • Logging

    “Unlimited”, pay per drink storage: logging is often an afterthought; consequently, insufficient disk space is allocated, and logging is either non-existent or minimal. Cloud Storage changes all this – no more ‘guessing’ how much storage you need for standard logs.

    Improve log indexing and search: with your logs in the Cloud you can leverage Cloud Compute to index those logs in real-time and get the benefit of instant search results. What is different here? The Compute instances can be plumbed in and scale as needed based on the logging load – meaning an accurate real-time view.

    Getting compliant with Extended logging: most modern operating systems offer extended logging in the form of a C2 audit trail. This is rarely enabled for fear of performance degradation and log size. Now you can ‘opt-in’ easily – if you are willing to pay for the enhanced logging, you can do so. Granular logging makes compliance and investigations easier.

  • Improve the state of security software (performance)

    Drive vendors to create more efficient security software: Billable CPU cycles get noticed. More attention will be paid to inefficient processes; e.g. poorly tuned security agents. Process accounting will make a comeback as customers target ‘expensive’ processes. Security vendors that understand how to squeeze the most performance from their software will win.

  • Secure builds

    Pre-hardened, change control builds: this is primarily a benefit of virtualization based Cloud Computing. Now you get a chance to start ’secure’ (by your own definition) – you create your Gold Image VM and clone away. There are ways to do this today with bare-metal OS installs but frequently these require additional 3rd party tools, are time-consuming to clone or add yet another agent to each endpoint.

    Reduce exposure through patching offline: Gold images can be kept up securely kept up to date. Offline VMs can be conveniently patched “off” the network.

    Easier to test the impact of security changes: this is a big one. Spin up a copy of your production environment, implement a security change and test the impact at low cost, with minimal startup time. This is a big deal and removes a major barrier to ‘doing’ security in production environments.

  • Security Testing

    Reduce cost of testing security: a SaaS provider only passes on a portion of their security testing costs. By sharing the same application as a service, you don’t foot the expensive security code review and/or penetration test. Even with Platform as a Service (PaaS) where your developers get to write code, there are potential cost economies of scale (particularly around the use of code scanning tools that sweep source code for security weaknesses).



It’s simple. 12-month term. No minimum number of seats is required.