Click Below For More Images:
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting
  • Cloud Hosting

Primavera P6 in the Cloud

Global PM’s “Primavera P6 in the Cloud” is a hosted solution for deploying Oracle’s Primavera P6 from your PC or tablet from anywhere in the world.

A few of the benefits!

  • Service includes secure cloud server access with a top tier security
  • 99.99% up time
  • Daily (or even hourly) backup of the server (and your Primavera P6 data)
  • Simple per user pricing model
  • Access to Primavera P6 software (hosted in the cloud) from:
    • Any internet browser (Google Chrome recommended) or
    • VMware app (included)

Monthly Hosting Fee

P6 Software Lease (Annual Fee)

Server Setup and P6 Installation (One time fee)

$0.00

Learn about the benefits of Global PM’s cloud hosting package.

  • Anytime / anywhere access You can access your projects using any device from anywhere with internet access!
  • U.S. based hosting. Data centers in Lafayette, LA; Dallas, TX; and Las Vegas, NV.
  • Quick turnaround! We can get you up an running within 1 business day!
  • Simple Pricing:
    • If you already own P6:
      • $99 per user /  month plus
      • $299 server setup fee (includes P6 installation)
  • Superior performance and security. 99.999% up-time and multi-site backups

Cloud Hosting

Seven Technical Security Benefits of the Cloud

Source: CloudSecurity.org


  • Centralized Data

    Reduced Data Leakage: this is the benefit I hear most from Cloud providers – and in my view they are right. How many laptops do we need to lose before we get this? How many backup tapes? The data “landmines” of today could be greatly reduced by the Cloud as thin client technology becomes prevalent. Small, temporary caches on handheld devices or Netbook computers pose less risk than transporting data buckets in the form of laptops. Ask the CISO of any large company if all laptops have company ‘mandated’ controls consistently applied; e.g. full disk encryption. You’ll see the answer by looking at the whites of their eyes. Despite best efforts around asset management and endpoint security we continue to see embarrassing and disturbing misses. And what about SMBs? How many use encryption for sensitive data, or even have a data classification policy in place?

    Monitoring benefits: central storage is easier to control and monitor. The flip-side is the nightmare scenario of comprehensive data theft. However, I would rather spend my time as a security professional figuring out smart ways to protect and monitor access to data stored in one place (with the benefit of situational advantage) than trying to figure out all the places where the company data resides across a myriad of thick clients! You can get the benefits of Thin Clients today but Cloud Storage provides a way to centralise the data faster and potentially cheaper. The logistical challenge today is getting Terabytes of data to the Cloud in the first place.

  • Incident Response / Forensics


    Forensic readiness: with Infrastructure as a Service (IaaS) providers, I can build a dedicated forensic server in the same Cloud as my company and place it offline, ready for use when needed. I would only need pay for storage until an incident happens and I need to bring it online. I don’t need to call someone to bring it online or install some kind of remote boot software – I just click a button in the Cloud Providers web interface. If I have multiple incident responders, I can give them a copy of the VM so we can distribute the forensic workload based on the job at hand or as new sources of evidence arise and need analysis. To fully realise this benefit, commercial forensic software vendors would need to move away from archaic, physical dongle based licensing schemes to a network licensing model.

    Decrease evidence acquisition time: if a server in the Cloud gets compromised (i.e. broken into), I can now clone that server at the click of a mouse and make the cloned disks instantly available to my Cloud Forensics server. I didn’t need to “find” storage or have it “ready, waiting and unused” – its just there.

    Eliminate or reduce service downtime: Note that in the above scenario I didn’t have to go tell the COO that the system needs to be taken offline for hours whilst I dig around in the RAID Array hoping that my physical acqusition toolkit is compatible (and that the version of RAID firmware isn’t supported by my forensic software). Abstracting the hardware removes a barrier to even doing forensics in some situations.

    Decrease evidence transfer time: In the same Cloud, bit fot bit copies are super fast – made faster by that replicated, distributed filesystem my Cloud provider engineered for me. From a network traffic perspective, it may even be free to make the copy in the same Cloud. Without the Cloud, I would have to a lot of time consuming and expensive provisioning of physical devices. I only pay for the storage as long as I need the evidence.

    Eliminate forensic image verification time: Some Cloud Storage implementations expose a cryptographic checksum or hash. For example, Amazon S3 generates an MD5 hash automagically when you store an object. In theory you no longer need to generate time-consuming MD5 checksums using external tools – its already there.

    Decrease time to access protected documents: Immense CPU power opens some doors. Did the suspect password protect a document that is relevant to the investigation? You can now test a wider range of candidate passwords in less time to speed investigations.

  • Password Assurance Testing

    Decrease password cracking time: if your organization regularly tests password strength by running password crackers you can use Cloud Compute to decrease crack time and you only pay for what you use. Ironically, your cracking costs go up as people choose better passwords ;-).

    Keep cracking activities to dedicated machines: if today you use a distributed password cracker to spread the load across non-production machines, you can now put those agents in dedicated Compute instances – and thus stop mixing sensitive credentials with other workloads.

  • Logging

    “Unlimited”, pay per drink storage: logging is often an afterthought, consequently insufficient disk space is allocated and logging is either non-existant or minimal. Cloud Storage changes all this – no more ‘guessing’ how much storage you need for standard logs.

    Improve log indexing and search: with your logs in the Cloud you can leverage Cloud Compute to index those logs in real-time and get the benefit of instant search results. What is different here? The Compute instances can be plumbed in and scale as needed based on the logging load – meaning a true real-time view.

    Getting compliant with Extended logging: most modern operating systems offer extended logging in the form of a C2 audit trail. This is rarely enabled for fear of performance degradation and log size. Now you can ‘opt-in’ easily – if you are willing to pay for the enhanced logging, you can do so. Granular logging makes compliance and investigations easier.

  • Improve the state of security software (performance)

    Drive vendors to create more efficient security software: Billable CPU cycles get noticed. More attention will be paid to inefficient processes; e.g. poorly tuned security agents. Process accounting will make a comeback as customers target ‘expensive’ processes. Security vendors that understand how to squeeze the most performance from their software will win.

  • Secure builds


    Pre-hardened, change control builds: this is primarily a benefit of virtualization based Cloud Computing. Now you get a chance to start ’secure’ (by your own definition) – you create your Gold Image VM and clone away. There are ways to do this today with bare-metal OS installs but frequently these require additional 3rd party tools, are time consuming to clone or add yet another agent to each endpoint.

    Reduce exposure through patching offline: Gold images can be kept up securely kept up to date. Offline VMs can be conveniently patched “off” the network.

    Easier to test impact of security changes: this is a big one. Spin up a copy of your production environment, implement a security change and test the impact at low cost, with minimal startup time. This is a big deal and removes a major barrier to ‘doing’ security in production environments.

  • Security Testing

    Reduce cost of testing security: a SaaS provider only passes on a portion of their security testing costs. By sharing the same application as a service, you don’t foot the expensive security code review and/or penetration test. Even with Platform as a Service (PaaS) where your developers get to write code, there are potential cost economies of scale (particularly around use of code scanning tools that sweep source code for security weaknesses).

 

 

It’s simple. 12 month term. No minimum number of seats.

turnover