Cloud infrastructure in Uzbekistan and Kazakhstan
– Cloud platform and VPS/VDS virtual servers
– Rental of dedicated servers and private cloud
– Servers with GPU
– Object storage
– Backups in the cloud using Veeam agents
Services and Solutions

High-performance servers and storage for peak loads. 99.9% availability guarantee, PCI DSS compliance, and customization for specific tasks. Quick launch and 24/7 support for reliable cloud operation.

Individual solutions with PCI DSS and TIER III compliance. High connection speed, fixed payments, server activation in 10 minutes, and 24/7 support ensure convenience and reliability.

Automatic cluster management with load balancing for high performance and fault tolerance. Easy integration with virtual servers simplifies configuration and management.

Cloud servers with Nvidia Tesla T4 and V100 GPUs. Up to 10 times faster than CPU. Ideally suited for AI inference, complex calculations, and GPU-accelerated virtualization. Optimized for high-performance computing, big data analysis, and rendering.

Scalable storage with pay-per-use billing. Data is replicated for protection and available via API 24/7. Ideal for storing and working with large volumes of data, multimedia, backends for large websites, and backups.

Qrator Labs — DDoS protection with external real-time traffic filtering. Effectively counteracts L7 attacks, ensuring stable infrastructure operation even during an attack, resistance to any loads, and multi-level data protection.

Implementation, maintenance and audit
Implementation, maintenance, and audit of IT infrastructure. Experts will help set up the cloud, improve reliability, and optimize resources. Fixed SLA. IT cost optimization. Ensuring business continuity.

Supply and maintenance of licensed software. Selecting solutions for business tasks, assistance with activation, migration, and support. Official Microsoft and Red Hat licenses — fast, cost-effective, no intermediaries. Expert support, configuration, and maintenance.

Reliable cloud backups based on Veeam with storage in the Pro-Data infrastructure. Storing backups in the cloud will allow your organization to optimize IT infrastructure costs. Flexible recovery policies, AES encryption, convenient control panel.
Why clients choose Pro-Data?
Network capabilities up to 10 Gbps
HPE servers with Intel Xeon Gold processors and disk arrays with RAID-6. Hybrid storage system with active controllers. High performance and fault tolerance are ensured.
Team competencies
Expertise in network and system administration, IT architecture, and automation. Specialists with international certifications and many years of practical experience. Ready-made solutions for managing complex IT infrastructure.
Platform power and reliability
HPE servers with Intel Xeon Gold processors and disk arrays with RAID-6. Hybrid storage system with active controllers. High performance and fault tolerance are ensured.
Reliability guarantees SLA - up to 99.99%
SLA with financial responsibility and availability level up to 99.99%. Technical support 24/7/365, response to customer requests — up to 10 minutes. Guaranteed reliability is stipulated in the user agreement.
ISO 27001 and TIER 3 standards
Compliance with ISO 27001 security standards and operation in certified data centers. Ensuring the highest level of protection for customer data and infrastructure. TIER 3 and TIER 2+ data centers are used.
IT Relocation to Uzbekistan and Kazakhstan
Data hosting in Uzbekistan and Kazakhstan on virtual and dedicated servers. A solution for foreign companies doing business in the region. The infrastructure complies with the requirements of laws LRU No. 547 and No. 94‑V.
Any operating systems
Support for popular OS: Linux, Windows, and specialized solutions. We use Kerio, pfSense, FortiGate to create software routers. Ability to install any OS based on a template provided by the customer.
Migration to the Pro-Data cloud
Since 2021, we have helped dozens of companies successfully migrate to the cloud. Organized transfer of IT infrastructure without downtime. Experience working with physical servers and other clouds.
Information security
Our customers in Uzbekistan and Kazakhstan set high requirements for information security, both at the physical and software-hardware levels. In order to comply with these requirements and protect customer data from unauthorized access or loss, we have ensured.
At the physical level:
– Multi-level physical protection of data center premises
– 24/7/365 video surveillance system
– Storage of surveillance system recordings for at least 30 days
– 24-hour premises security
At the software-technical level:
– Use of firewalls
– Application of access management policies
– User identification and authentication
– Maintaining records of objects and resources for access to information systems
Upon request, the following can be arranged:
– Installation and configuration of NGFW firewall (IDS/IPS, DMZ, NAT)
– Protection against network "denial of service" (DDoS) attacks
– Traffic cleaning from active and Zero Day attacks
– Web Application Firewall (WAF)
Data centers and vendors
TIER 3 and ISO 27001
Currently, to provide services, Pro-Data uses 6 geographically distributed locations in Uzbekistan and 1 location in Kazakhstan. To ensure the highest level of reliability for its services, Pro-Data uses data centers designed in accordance with the TIER 3 standard, some of which have international reliability certificates from the Uptime Institute.
Pro-Data infrastructure security complies with the requirements of ISO 7001, the standard for information security management systems.
Enterprise-class equipment
To ensure high reliability of its services, Pro-Data uses Enterprise-class equipment from the following vendors: HPE, Cisco, Intel, Brocade. To create the best price offer on the local market, we purchase equipment on Western markets, bypassing local suppliers and their markups.

Pro-Data is a cloud provider in Uzbekistan, certified under the ISO 27001 standard
ISO 27001 — is a global standard for comprehensive data protection and business process resilience, minimizing the risks of leaks and cyber threats










