Secure and reliable Elastic Compute Service

Empowers you to obtain more powerful, flexible, and cost-effective computing power anytime.

  • High Stability

    Single-instance availability reaches 99.975%, and cross-zone instance availability reaches 99.995%, leading the industry.
  • Exceptional Performance

    A fully customized computing platform powered by self-developed Cloud Infrastructure Processing Unit (CIPU) chips, delivering industry-leading performance across multiple dimensions, including compute, network, and storage.
  • Secure and reliable

    Trusted computing, hardware encryption, and virtualization-based encrypted Compute, Pass multiple international security certifications
  • High cost-effectiveness

    No need for fixed asset investment. Resources are used on demand, significantly reducing costs and enabling Customers to benefit from technological advantages
  • 1/0

    Product Introduction

    With 15 years of deep technical expertise in elastic computing, Alibaba Cloud provides rock-solid and high-performance computing services for enterprises and developers to meet business requirements across hundreds of scenarios. Elastic Compute Service (ECS) is an Infrastructure as a Service (IaaS)-level cloud computing service offered by Alibaba Cloud, featuring exceptional performance, stability, reliability, and scalability. ECS eliminates the need for upfront investment in IT hardware procurement, enabling you to use servers as conveniently and efficiently as public resources such as water, electricity, and natural gas, and achieve instant provisioning and automatic scaling of computing resources. Alibaba Cloud ECS continuously delivers innovative server solutions to address diverse business needs and accelerate your business growth.
    Elastic Compute Service (ECS)

    Benefits

    Alibaba Cloud Elastic Compute Service (ECS) is an Infrastructure as a Service (IaaS) cloud computing service provided by Alibaba Cloud, featuring outstanding performance, stability, reliability, and scalability. By choosing ECS, you can easily build computing resources with the following advantages.
    img

    High-stability commitment to ensure business continuity.

    The SLA for a single instance reaches 99.975%, while the SLA for multiple instances across multiple availability zones reaches 99.995%. Cloud disks offer reliability of 99.9999999%. The system supports automatic failover upon downtime and snapshot-based backups. It also enables high-availability architecture designs spanning multiple availability zones, along with automated recovery capabilities, to ensure business continuity.

    img

    Flexible sales models and elastic guarantees significantly reduce resource costs.

    It offers a variety of flexible payment options to effectively reduce enterprise IT costs. The platform supports the creation of tens of thousands of instances within minutes, enabling agile and elastic scaling to meet sudden demand spikes. Compute resources, storage capacity, and network bandwidth can each be scaled up or down on demand.

    img

    Global cloud infrastructure accelerates enterprises’ expansion overseas and their business growth.

    We provide efficient and stable computing services across 29 regions and 90 availability zones worldwide. We have already delivered computing power to 5 million customers globally, helping enterprises achieve digital transformation and business innovation while providing robust computing support for their expansion into overseas markets and new regions.

    img

    High-stability commitment to ensure business continuity.

    The SLA for a single instance reaches 99.975%, while the SLA for multiple instances across multiple availability zones reaches 99.995%. Cloud disks offer reliability of 99.9999999%. The system supports automatic failover upon downtime and snapshot-based backups. It also enables high-availability architecture designs spanning multiple availability zones, along with automated recovery capabilities, to ensure business continuity.

    img

    Multi-layered protection for comprehensive enterprise security.

    Leveraging multiple international security certifications, we provide comprehensive security safeguards for enterprises. Our services include DDoS protection, operating system vulnerability detection, and malware removal to help reduce business security risks. We also offer instances and cloud disk data encryption features that support trusted computing, hardware-based encryption, and virtualized encrypted computing, further minimizing the risk of data leakage.

    图片

    Gartner®

    Gartner published the Magic Quadrant for Cloud Infrastructure and Platform Services, in which Alibaba Cloud has been included for the sixth consecutive year. Analysts highly commended Alibaba Cloud’s leadership in the China and Southeast Asia marketplaces, its engineering capabilities, and its expansion into emerging digital channels, reflecting the rapid business growth of Alibaba Cloud over the past year.
    Gartner published the Magic Quadrant for Cloud Infrastructure and Platform Services, in which Alibaba Cloud has been included for the sixth consecutive year. Analysts highly commended Alibaba Cloud’s leadership in the China and Southeast Asia marketplaces, its engineering capabilities, and its expansion into emerging digital channels, reflecting the rapid business growth of Alibaba Cloud over the past year.

    Security Compliance

    Security covers a broad scope. Alibaba Cloud ensures the security of its cloud infrastructure and services, such as data centers, virtualization stacks, network security, and data security. However, adhering to security best practices during the use of cloud products is equally important, such as securing your Alibaba Cloud account, safeguarding confidential information, and implementing access control.

    卡片头部图

    Cybersecurity

    Network isolationECS provides users with a virtual private network that leverages tunneling technology to achieve data-link-layer isolation, offering each user a separate, isolated virtual secure network environment.
    VPC EncryptionProtect dynamic data transmitted within a VPC to prevent unauthorized access and data leakage. Even if an attacker—especially one who intercepts packets on the physical network—gains access to the data, they will be unable to decrypt its contents.
    卡片头部图

    Storage security

    Data encryptionECS offers a variety of data encryption methods, including cloud disk encryption, data transmission encryption, and storage encryption, providing comprehensive protection for users’ data security.
    Backup and RestoreECS provides multiple methods for data protection, including snapshot-based backup and recovery, image-based backup and recovery, and data migration between internal and external networks, to ensure the reliability and security of user data.
    卡片头部图

    Computational security

    Host SecurityECS host security provides capabilities such as vulnerability scanning, abnormal login detection, AK leak detection, and compliance checks.
    End-to-end securityECS provides default memory encryption, trusted computing (vTPM) capabilities, and confidential computing capabilities, including confidential virtual machines (Confidential VMs) and enclaves.

    Customer Use Cases

    bannerbannerbannerbanner
    1
    Xiaohongshu
    The 8th-generation AMD instances deliver high-performance computing power, boosting the performance of distributed training clusters for search and recommendation systems by 30%. With multi-Availability Zone deployment, they provide large-scale, highly available computing services.
    2
    Sina Weibo
    The Yitian c8y compute-optimized instances deliver powerful computing performance, enabling the construction of high-performance audio and video live-streaming processing clusters that significantly boost audio and video processing efficiency. In H.264 transcoding scenarios, the cost per stream is reduced by 66.7%. The Yitian chip maintains its full performance without frequency throttling under heavy workloads, while delivering highly stable output and supporting a higher number of concurrent streams.
    3
    Xinkai Pu
    By leveraging Yitian’s latest ARM vector instruction set and adopting a no-hyperthreading design, the solution delivers superior computing power for latency-sensitive scenarios such as campus payment services, while reducing overall business costs by 20%.
    4
    Mobvista
    Together with Alibaba Cloud’s elastic scaling capabilities, we’ve launched the SpotMax elastic cluster management solution, which delivers lower costs while ensuring the availability of elastic resources.