Menu Close

Virtual Possibilities

Example Virtual Machines

AV Computer Services Virtual Machines are designed for all budgets and workloads, starting from our economical Basic-series to the Professional-series and expanding to bring newest VMs. Explore popular categories:

Basic-series

Basic Configuration

The Basic configuration Virtual Machine is a perfect choice for office work, or any other type of use, is a fast virtual machine, and can handled almost all types of works load.

Specs:
8 vCPU    4 GB RAM    127 GB SSD

Extras:
No Extras

Professional-series

Professional Configuration

The Professional configuration Virtual Machine is a perfect choice for office work, can handled almost all types of works load, and include Microsoft Office 365.

Specs:
8 vCPU    4 GB RAM    127 GB SSD

Extras:
Microsoft Office 365

Other-series

Soon

Even that is possible to customize any of our virtual machines, soon some new configurations will be added to make it easy to select, or even a server so your organization got the full control.

Specs:
Coming soon

Extras:
Coming soon

government-min

Scale your infrastructure without adding complexity

Set up highly available, centrally managed, and scalable services for computationally intensive, big data, and container workloads with VM scale sets. Reduce cost and time to reimage your VMs for your stateless applications with Ephemeral OS disks. Manage global replication and sharing of images at scale with shared image galleries. Use generation 2 VMs to improve boot and installation times. Get extreme computing power for your artificial intelligence (AI) and remote visualization workloads with GPU-enabled VMs.

SecPanel

Enhance security and compliance

Protect your VMs against bootkits, rootkits, and kernel-level malware with trusted launch. Safeguard your VM data while in use with AV Computer Services confidential computing. We Monitor your workloads and find and fix vulnerabilities with AV Security Center. Meet a broad set of international and industry-specific compliance standards, including General Data Protection Regulation (GDPR), ISO 27001, HIPAA, FedRAMP, and SOC 2. We deploy your VMs on AV Computer Services Dedicated Host, a physical server used only by your organization.

Limitless Possibilities

flexibility

Flexibility

From the customization of components (RAM, CPU, SSD) to your environment settings, you can fully customized your Virtual Machine. You can choose to get the next OS, or keep the current one at your convenience.

BUDGET

Controlled Budget

We are committed to providing you with the best possible service at a reasonable and transparent cost. Stop your virtual machine to stop paying. We also helps you to chose the correct upgrade to prevent unnecessary extra cost.

secured-cloud

Secure

Thanks to our system, your data is safe and will always be accessible in your personal space. With our RAID 10 your data is secure with mirroring, that duplicates all your data, making it secure and can migrate if need more space.

archive-icon

Archive

Hyper-V uses the Volume Shadow Copy Service (VSS) to backup and restore virtual machines. A VSS requester is installed that will allow VSS writers in the guest operating system to participate in the backup of the virtual machine.

location

Made In Puerto Rico

We are located in Isabela Puerto Rico, and we are here to help you get that virtual machine that can help you reach the next level. A virtual machine is like having a cloud with your data but also universal access to your applications.

AD

OS on any Direction

We will providing you with the latest OS, but not always that is what is needed. For this reason we can apply a specific OS to your virtual machine to be able to run that special application required.

microsoft-sql_server

SQL Server Express

Express edition is the entry-level, free database and is ideal for learning and building desktop and small server data-driven applications. If you need more advanced database features, SQL Server Express can be seamlessly upgraded to other higher end versions of SQL Server.

shared-data

Shared Data

The ability to share the same data resource with multiple applications or users. It implies that the data are stored in one or more servers in the network and that there is some software locking mechanism that prevents the same set of data from being changed by two people at the same time.

Trusted by companies of all sizes

What are the benefits of using VMs?

While virtual machines run like individual computers with individual operating systems and applications, they have the advantage of remaining completely independent of one another and the physical host machine. A piece of software called a hypervisor, or virtual machine manager, lets you run different operating systems on different virtual machines at the same time. This makes it possible to run Linux VMs, for example, on a Windows OS, or to run an earlier version of Windows on more current Windows OS.

And, because VMs are independent of each other, they’re also extremely portable. You can move a VM on a hypervisor to another hypervisor on a completely different machine almost instantaneously.

Because of their flexibility and portability, virtual machines provide many benefits, such as:

  • Cost savings—running multiple virtual environments from one piece of infrastructure means that you can drastically reduce your physical infrastructure footprint. This boosts your bottom line—decreasing the need to maintain nearly as many servers and saving on maintenance costs and electricity.
  • Agility and speed—Spinning up a VM is relatively easy and quick and is much simpler than provisioning an entire new environment for your organization. Virtualization makes the process of running test scenarios a lot quicker.
  • Lowered downtime—VMs are so portable and easy to move from one hypervisor to another on a different machine—this means that they are a great solution for backup, in the event the host goes down unexpectedly.
  • Scalability—VMs allow you to more easily scale your apps by adding more physical or virtual servers to distribute the workload across multiple VMs. As a result you can increase the availability and performance of your apps.
  • Security benefits— Because virtual machines run in multiple operating systems, using a guest operating system on a VM allows you to run apps of questionable security and protects your host operating system. VMs also allow for better security forensics, and are often used to safely study computer viruses, isolating the viruses to avoid risking their host computer.

Related services for Virtual Machines

Domain Controller

DC
A domain controller is a server computer that responds to security authentication requests within a computer network domain. It is a network server that is responsible for allowing host access to domain resources. It authenticates users, stores user account information and enforces security policy for a domain.

Information:
Domain controllers are typically deployed as a cluster to ensure high-availability and maximize reliability. In a Windows environment, one domain controller serves as the Primary Domain Controller (PDC) and all other servers promoted to domain controller status in the domain server as a Backup Domain Controller (BDC)

Active Directory

AD
Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work done.

The database (or directory) contains critical information about your environment, including what users and computers there are and who’s allowed to do what. For example, the database might list 100 user accounts with details like each person’s job title, phone number and password. It will also record their permissions.

Information:
Active Directory simplifies life for administrators and end users while enhancing security for organizations.

Private Network

PN
In Internet networking, a private network is a computer network that uses a private address space of IP addresses. These addresses are commonly used for local area networks in residential, office, and enterprise environments. Both the IPv4 and the IPv6 specifications define private IP address ranges.

Information:
Another type of private networking uses the link-local address range. The validity of link-local addresses is limited to a single link; e.g. to all computers connected to a switch. Hosts on different sides of a network bridge are also on the same link, whereas hosts on different sides of a network router are on different links.

Windows OS Complete Line

XP to 10 and newer
You can opt for an operating system prior to Windows 10, from Windows XP to the latest Microsoft operating system. You can choose to never change or automatically update to the latest one, like Windows 11, the upcoming new operating system.

Shared Location

SL
Network sharing is a feature that allows resources to be shared over a network. These are made accessible to other users/computers over a network. Network sharing enables access to information by more than one person.

Office 365

365
Microsoft 365 encompasses subscription plans that allow use of the Microsoft Office software suite over the life of the subscription, as well as cloud-based software-as-a-service products for business environments. All Microsoft 365 plans include automatic updates.