CloudSigma is one of the most customizable cloud providers on the market with a focus on open design and flexibility with regards to computing deployments

The cloud platform is designed to provide an environment with the same degrees of freedom that private in-house environments end-users might have are able to offer. All functionality is available via an API or the end-user WebApp.

Customers are able to provision processing, storage, networks and other fundamental computing resources in an unbundled way meaning CPU, RAM, storage and bandwidth can be purchased and combined independently to allow the best combination of cloud resources without the limitation of fixed server sizes. So any combination of CPU and RAM can be achieved along with multiple drives mounted to a server and multiple networking interfaces. Each resource is billed separately and transparently as either a subscription or as pay-as-you-go in 5-minute billing segments, enabling customers to track exactly how much their cloud servers are costing over time and be billed for it accurately.

Uniquely, any x86 based operating system and software can be used with complete administrator/root control including all variants of BSD, Linux and Windows. End-users can upload raw ISO image, attach CPU and RAM to it and boot it up. This allows full backwards compatibility from the platform. 


Sentinel-1 Data Repository

CloudSigma is building and maintaining a repository of Sentinel data backed by a powerful service level agreement ensuring availability and performance. This in turn enables Sentinel data to form the foundation for critical commercial and public sector services including services requirement fast access speeds and heavy processing of large amounts of Sentinel data. The marriage of CloudSigma’s computing environment with a powerful data repository creates a unique environment on which to place earth observation related workloads and services. The data repository is stored on a modular equipment architecture using an object oriented storage environment. This repository maintains a copy of data delivered through the SciHub and provides a RESTful web service for querying and accessing the data and metadata. Currently, the full archive of Sentinel-1 SLC products for Europe and North America is available in CloudSigma object storage environment. This data is provided free of charge to all CloudSigma cloud users.
Learn More

Your cloud account comes pre-configured with the following resources for 14 days

For our GEO Premium learners

  • 2 GHz CPU

  • 2 GB RAM

  • 50 GB SSD storage

  • 25 GB outbound traffic (inbound traffic is unlimited)

  • 1 static IP address

  • Pre-installed image containing EO tools such as SNAP, QGIS, Geoserver, Geonode and others

  • Easy and free access to our Sentinel-1 data repository

  • CloudSigma 24/7 free live chat customer support

  • Free platform demo upon request

GEO Premium

Access our ENTIRE content. Not just courses. We provide you with courses, tools and data to start learning and advance your skills.

Learn More

Brand New Location Powered by Latest Generation Processors

In March this year we celebrated the launch of the company’s second Swiss cloud platform in the highly secure data center of Safe Host 2 (SH2) in Gland, near Geneva. Safe Host 2 (SH2) is Switzerland’s largest state-of-the-art, carrier-neutral data centre colocation facility. Located in the heart of Europe, the site meets the growing demand for companies to host their systems in Switzerland where they benefit from the country’s abundant hydro-power and its strong legal framework supporting data protection.


The new cloud comes with latest Generation 10 Intel® Xeon® Gold 6148 processors, powered by HPE. The default CPU core performance is 2.40GHz and each virtual core can achieve 3.1GHz with Intel Turbo Boost Technology.


Apart from high performance, the new HPE Gen-10 servers offer better security and more persistent memory and manageability. The security feature, also known as “silicon root of trust”, is at the firmware level, aiming to repel firmware attacks and stop servers executing compromised firmware code.