Public or private cloud based on Microsoft technology

Cloud Server Hyper-V® in a German data center

With our cloud servers based on Microsoft Hyper-V®, you operate your own virtual data center as a standardized IaaS solution, tailored to your company’s requirements. The location in an ISO 27001 certified German data center ensures the highest availability and security for sensitive data. As additional options, we offer server management as well as the integration of our cloud servers into your local IT infrastructure through a dedicated VPN connection.

Cloud Server Hyper-V Germany
GDPR compliant, German cloud, green power

Cloud Server Microsoft Hyper-V® Benefits

Public or Private Cloud

Shared or dedicated Microsoft Hyper-V® Windows Server infrastructure.

Hosting in Germany

ISO 27001 certification, daily backups, redundant connection and GDPR-compliant data storage in Germany.

Seamless integration with your IT

Individual VPN solutions for secure connection to your local infrastructure are available on request.

99.9% availability

You can trust this cloud service. It is guaranteed 99.9% availability.

24/7 emergency hotline

In case of emergency, we are available for you around the clock and respond immediately to malfunctions.

100% green power

Our data centers are operated with certified green electricity. This massively reduces CO2 emissions.

Cloud Server Microsoft Hyper-V® Packages & Pricing

Microsoft Hyper-V® environments are complex applications and therefore do not have fixed prices. We design the environment for each customer individually as public or private cloud solutions.

Cloud Server Microsoft Hyper-V® Add-ons

What sets us apart from other providers? We offer more than just a cloud solution! We plan your Hyper-V environment individually together with you and even extend it with your individual software if desired. Ask us what all is possible!

For even better availability and reliability, the advantages of a cluster are also available to you with our virtual servers. For this, we operate two physically separate systems: In the event of an unplanned interruption to the executing system, your cloud server is automatically activated on the second system. Downtime can thus be reduced to just a few minutes. In the event of planned maintenance work, we ensure that there is no interruption whatsoever through live migration.

Existing cloud servers can also be migrated to a cluster at any time and thus converted to a high-availability solution. By the way: Since the functionality is provided at system level, applications that are not cluster-capable also benefit from this.

When operating a cloud server in the business environment, it is not only a matter of maximum security and availability: Administration at the application level also requires professional know-how and human resources. In day-to-day operation, this often becomes an underestimated challenge for companies.

For all Microsoft Windows® Cloud Servers, we therefore offer you the “Managed Cloud” option: In addition to operating the infrastructure (Infrastructure as a Service – IaaS), we also take over the complete management at operating system and application level. Responsibilities are defined individually with you. You alone decide which tasks are taken over in your company and from which level you prefer to hand over administration to us.

Make our cloud servers part of your local network: With our customized VPN solutions, you combine the advantages of the cloud with those of your local infrastructure. This can be done both through fixed VPN tunnels to your sites or through dynamic dial-up connections. The latter are particularly suitable for employees in the home office or on the road.

For secure and encrypted data exchange or fully integrated into your local domain, you access your Active Directory® via LDAP, for example. Your employees authenticate themselves as usual via Single Sign-on (SSO).

For our VPN connections, we exclusively use leading Cisco® ASA VPN hardware appliances. And, of course, we design and implement your VPN solution according to your individual needs.

With the cloudshift® private firewall, our customers have a wide range of options for flexibly and specifically designing their network security. The solution offers comprehensive functions for customizing the protection of your IT infrastructure to your individual needs:

  • Creating custom rules: You can define detailed security rules for different network areas to assign specific access rights. This enables you to control data traffic in a targeted manner and block suspicious activities at an early stage.
  • Network segmentation: With the private firewall, you can set up and secure various network segments to protect sensitive areas such as internal servers or databases separately from the rest of the network. This allows you to isolate potential threats in a segment without endangering the entire network.
  • VPN integration: The firewall supports the integration of virtual private networks (VPNs), so that secure connections can be created for external employees or partners. This ensures that your network remains well protected even during remote access.
  • Intrusion detection and prevention (IDS/IPS): The private firewall can be combined with an intrusion detection system (IDS) and an intrusion prevention system (IPS) to detect suspicious patterns in data traffic and automatically initiate countermeasures.
  • Logging and monitoring: You receive detailed reports on network traffic and can track security-related events at any time. This not only helps you keep an overview, but also enables you to respond more quickly to potential threats.
  • Protection against DDoS attacks: The firewall offers special protection mechanisms to detect and ward off Distributed Denial-of-Service (DDoS) attacks at an early stage. This ensures the availability of your services even in the event of large-scale attack attempts.
  • Web Filtering and Application Control: The private firewall not only allows you to block unwanted websites, but also to control access to certain applications. This helps to minimize security risks and increase productivity in the company.
  • Automated Security Updates: cloudshift® ensures that the firewall is regularly updated to protect against the latest threats. This ensures that your security measures are always state of the art.
  • Customizable Firewall Profiles: You can create different security profiles for different user groups. This allows access rights to be customized to the specific requirements of administrators, developers, or external service providers, for example.

With these diverse options, cloudshift®‘s private firewall provides comprehensive protection against cyberattacks and helps you operate your network environment securely and efficiently.

Relieve your employees of complicated licensing issues: Renting the software they need is not only simple and flexible, but also often the more cost-effective solution. Start without a large initial investment and scale the licenses as needed. Software rental also allows you to upgrade to new versions at any time.

Whether application programs, virus protection or server software such as Microsoft SQL Server®, Microsoft SharePoint®, Microsoft Office® or Microsoft Project®: We have the applications of leading software providers ready for you and advise you on the selection of suitable products and licenses. Your advantage with cloudshift®: Our short contract period of only one month also applies to software licenses.

Windows® server infrastructure according to your requirements. Public or private cloud.

The use of Microsoft Hyper-V® servers offers great efficiency advantages. We offer you individual Hyper-V® instances as well as the setup of your own private cloud on a completely dedicated infrastructure. Under Hyper-V® , availability can be further increased through the use of clustering. In this case, individual instances are made available redundantly, so that there is no more downtime even in the event of updates. We work with you to design your individual solution.

FAQ Hyper-V®

Hyper-V® is a technology developed by Microsoft® that allows virtual machines to be created and run. A virtual machine is basically a “computer within a computer”. It simulates a physical computer and can run its own operating system and applications that are completely independent of the physical computer (the “host”) on which it is running.

To explain it more simply: Imagine you have a physical computer with a certain amount of resources (such as CPU, memory, storage, etc.). With Hyper-V®, you can divide those resources into multiple “virtual” computers that operate independently as if they were separate physical machines. Each of these virtual computers can be equipped with different operating systems and applications.

This is particularly useful in enterprise environments because it enables efficient use of hardware resources, allows testing in isolated environments, and simplifies deployment and management of applications and services.

In a data center server environment, Hyper-V® makes it easier and more efficient to implement complex structures and isolate individual applications than with physical hardware.

No, Hyper-V® is not an operating system. Hyper-V® is virtualization software called a hypervisor that runs on a host operating system.

A hypervisor is a type of software, hardware, or firmware that creates and manages virtual machines. In this case, Hyper-V® allows you to create and run multiple virtual machines on a single physical machine.

Each of these virtual machines can have its own operating system, which is completely independent of the host operating system. This means that you could, for example, run multiple Windows® or Linux-based virtual machines on a single physical machine running Windows Server.

It’s important to note that while Hyper-V® is not an operating system, some of its versions are built into specific operating systems. For example, Hyper-V® comes as a feature with some versions of Windows Server and Windows 10®. There is also a standalone version called “Hyper-V Server®“, which is actually a stripped down Windows Server operating system with only the Hyper-V® features.

Hyper-V® is a Type 1 hypervisor. This means that it is installed directly on the computer’s hardware and does not run on top of an existing operating system, which is the case with Type-2 hypervisors.

Type-1 hypervisors, also known as “bare metal” hypervisors, tend to have better performance and efficiency than Type-2 hypervisors because they run directly on the hardware and have less overhead. They also tend to be more secure because there is no way to access them through the host operating system.

However, it is important to note that while Hyper-V® itself is a Type 1 hypervisor, it is built into some versions of Windows® and is installed and managed on those operating systems. This could cause confusion and lead some people to consider it a Type 2 hypervisor. Technically, however, Hyper-V® remains a Type 1 hypervisor because it runs directly on hardware, even though its management is done through an operating system.

Checkpoints in Hyper-V®, also known as “snapshots” in other virtualization systems, are essentially versions of a virtual machine at a specific point in time. They store the current state of the virtual machine, including the system configuration and all applications and data.

Checkpoints are useful for testing changes to a virtual machine. For example, you might create a checkpoint before installing new software or performing a system update. If something goes wrong, you can reset the virtual machine to the state of the checkpoint.

However, it’s important to note that checkpoints are not meant to be a long-term backup solution. They are meant for short-term solutions such as testing and updates. If used for a longer period of time, checkpoints can cause problems because they take up a lot of memory and can affect virtual machine performance.

Also, checkpoints are not intended to save the state of data that is constantly being changed, such as databases. Using checkpoints with such data can lead to inconsistencies.

To back up a virtual machine for the long term, you should perform a full backup of the virtual machine or use an application-level data protection solution. Such a full backup of the Hyper-V® virtual machine is included with cloudshift®.

In the IT context, a “cloud” is a collection of resources (such as servers, storage, and network components), usually provided over the Internet, on which applications can be hosted and data stored. The main difference between a public cloud and a private cloud lies in the way these resources are provisioned and managed.

Public cloud

In a public cloud, an external provider makes resources available that are accessible via the Internet. Customers share these resources and only pay for what they actually use.

The advantages of a public cloud can be scalability and cost efficiency, as no hardware needs to be purchased and costs are divided by the number of users. In addition, the provider takes care of maintenance, security updates and other technical aspects.

Private cloud

A private cloud is a set of cloud resources owned and used exclusively by a company or organization. It can be hosted either in the company’s own data center or by an external provider that delivers dedicated resources.

The advantages of a private cloud can include more control and adaptability, as well as potentially higher security since data is not shared with others. However, a private cloud can be more expensive and require more maintenance than a public cloud, as the organization is responsible for managing and maintaining the resources.

There is also a hybrid cloud, which uses a combination of public and private clouds to get the best of both worlds. For example, companies can store sensitive data in a private cloud while using the resources of the public cloud for less sensitive data or applications with high scalability requirements.

You have questions or need an individual offer?

Our cloud experts will be happy to answer your questions about the design, implementation and operation of your applications in the cloud. We look forward to your inquiry!

+49 69 17 53 73 46 - 0

Mon. till Fri. 9 a.m. till 5 p.m.