Secure Online Desktop 10 years later: our corporate anniversary
Ten years ago, on June 16, 2011, Secure Online Desktop was born. Many things have changed in ten years and we have always done our best to keep up with the times and offer cutting-edge solutions to our customers. We want to celebrate our company anniversary by retracing the key milestones of these years by sharing them with you.
The products offered today are focused on corporate security and decentralization of services, but that wasn’t always the case. Originally our services were limited and only with the experience in the field have we been able to improve and grow the offer, meeting the needs of our customers.
The first service offered, which also gave our company its name, was a secure desktop online that brought the customer remote computing power , easy to use and definitely user friendly . The decentralization of machines and computing , the underlying concept of cluod computing , was still under development in 2011 and certainly not as far-reaching as it is today. The large international companies in the sector had recently ventured into offering this type of service. In fact, Microsoft Azure entered the market in 2010 and Amazon’s AWS was born in 2006.
Things have changed a lot since then, of course. In ten years of technological growth, services have improved, been consolidated and new ones have been born. We at SOD, on the day of our company anniversary, can say that we have done everything possible to always keep up with the times.
SOD’s services on the company’s 10th anniversary
The services offered today are varied and well structured. A high standard of security has been maintained as an added value. The nature of the services is always based on Cloud Computing , but includes much more than just a simple remote desktop.
All products are scalable, which allow the optimization of the customer’s economic resources. A SaaS (Software as a Service) delivery model is used which allows easy customization and high scalability.
On the 10th anniversary of the company, Secure Online Desktop is an Italian company still growing, a cloud provider with excellent quality services, whose values are cyber security and customer care.
What we offer are solutions and not just services. This means that the services provided are highly customizable and we are able to generate ad hoc solutions for every company and every need.
We like to be tested, so we “challenge” our customers to submit specific situations and problems to us and then offer tailored solutions that always leave the final customer and his employees satisfied.
SOD in the market
We can’t deny that competing with giants like Amazon or Microsoft, to name just the best known, isn’t easy at all. However, what sets us apart is the customer care and the attention we put into offering our services .
By necessity, for big companies , having tens of thousands of customers can only lower the level of personalization of the service provided. Inevitably, this leads some customers to be dissatisfied with the service.
We, on the other hand, who are a much smaller international company, can invest more time in assistance and product customization operations. The result is always satisfied customers, perfect services in every detail and constant growth in the number of customers. As an added value, we engage in constant research to improve and expand our range of services offered.
We are extremely satisfied with the results achieved over the past ten years, and we say it with some satisfaction on our company anniversary.
Our most recent social initiatives
Furthermore, we must not forget that over time we have also got involved in the social sphere. In the last year alone, two new initiatives have been promoted to help entrepreneurs and companies in difficulty following the outbreak of the COVID-19 pandemic.
We offered a free Cloud Storage service ( ownCloud ) to support companies in introducing a telecommuting plan for their employees. In addition, we have long supported Folding @ Home , a distributed computing project aimed at simulating protein dynamics , in particular the folding process. Through the use of software made available, it is possible to offer the computing power of a computer as an active resource for research. & nbsp;
The Folding @ Home initiative helped research against COVID-19 by focusing the computational power offered by the participants on virus analysis.
We haven’t pulled back even as regards the realities of our territory, which we regularly support. For example, Civil Protection of Albinea uses our web hosting and online presence management services under the title free. Furthermore, we actively help the association AGiReCoN ( Associazione Giovani Reggiani Against Cancer ) with IT support and in the development of apps to facilitate doctor / patient communication.
The evolution of our services
As I mentioned before, many services have been added to the first Online Desktop offering, but I want to celebrate this day in a complete way by offering a chronological overview of the major services offered.
We work on our services to always offer the best for our customers.
These first 10 years of business have been exciting and have brought many exciting challenges. We want to continue at this pace to improve and always offer the best IT services for our customers!
- Hadoop Open Data Model: “open” data collection
- Pass the Ticket: how to mitigate it with a SOCaaS
- Use cases of a SOCaaS for companies part 2
- Use cases of a SOCaaS for companies part 1
- NIST Cybersecurity Framework
- “Left of boom” and “right of boom”: having a winning strategy
- Smishing: a fraud similar to phishing
- Network Traffic Analyzer: an extra gear for the Next Gen SIEM
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (18)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (14)
- Security (14)
- Web Hosting (15)
- China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes October 15, 2021China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.
- Cisco Duo Trusted Access Report: More Than 50% of Companies Plan Passwordless Move October 15, 2021Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.
- How Attackers Hack Humans October 15, 2021Inside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.
- 'Clumsy' BlackByte Malware Reuses Crypto Keys, Worms Into Networks October 15, 2021Discovered during a recent incident response engagement, the malware avoids Russian computers and uses a single symmetric key for encrypting every compromised system.
- Evolution Equity Partners Close $400M for Cybersecurity Investments October 15, 2021The firm expands capital base, team, and platform addressing a rapidly growing cybersecurity investment opportunity.
- From Help Desk to Head of SOC: Building a Cybersecurity Career on Empathy and Candor October 15, 2021Why a passion for helping people is key to delivering effective cybersecurity solutions.
- How AI Can Stop Zero-Day Ransomware October 15, 2021Ransomware attacks are unpredictable. AI is better at figuring out what looks malicious and abnormal than humans will ever be.
- Enterprise Data Storage Environments Riddled With Vulnerabilities October 14, 2021Many organizations are not properly protecting their storage and backup systems from compromise, new study finds.
- Increased Security Spending to Support Distributed Workforce October 14, 2021Security leaders are deploying or actively considering cloud security, threat intel, and XDR technologies.
- Deepfence Announces Open Source Availability of ThreatMapper October 14, 2021Cloud native security observability platform seamlessly scans, maps, and ranks application vulnerabilities from development through critical production stage.
- [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045) October 6, 2021Posted by bashis on Oct 05[STX] Subject: [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045) Attack vector: Remote Authentication: Anonymous (no credentials needed) Researcher: bashis (2021) Limited Disclosure: September 6, 2021 Full Disclosure: October 6, 2021 PoC: https://github.com/mcw0/DahuaConsole -=[Dahua]=- Advisory: https://www.dahuasecurity.com/support/cybersecurity/details/957 Firmware:...
- Backdoor.Win32.Prorat.lkt / Port Bounce Scan (MITM) October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Port Bounce Scan (MITM) Description: The ProSpy Server V1.9 malware runs an FTP component that listens on TCP port 2121. Third-party attackers who successfully logon can abuse the backdoor […]
- Backdoor.Win32.Prorat.lkt / Weak Hardcoded Password October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Weak Hardcoded Password Description: The ProSpy Server V1.9 malware runs an FTP component that listens on TCP port 2121. The FTP server requires authentication for remote user access. However, […]
- HackTool.Win32.Agent.gi / Local Stack Buffer Overflow (SEH) October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/e60606d19a36789662ba97b4bb5c4ccf.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: HackTool.Win32.Agent.gi Vulnerability: Local Stack Buffer Overflow (SEH) Description: The Hack Office 2000 malware doesnt check bounds when loading textfiles for the wordlist to perform website URL cracking. Loading a specially crafted […]
- Trojan-PSW.Win32.PdPinch.gen / Remote Denial of Service October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/0e4fbfeb6f7a98e437a497013b285ffc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-PSW.Win32.PdPinch.gen Vulnerability: Remote Denial of Service Description: The malware listens on TCP port 1212. Third-party attackers who can reach infected systems can send a specially crafted junk HTTP request to trigger […]
- Backdoor.Win32.Hupigon.gy / Unauthenticated Open Proxy October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be74cbb86c007309d8004d910f5270f7.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.gy Vulnerability: Unauthenticated Open Proxy Description: The malware listens on TCP ports 8080, 1080. Third-party attackers who can connect to the infected system can relay requests from the original connection to […]
- Backdoor.Win32.Bifrose.ahyg / Insecure Permissions October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d6aff119c03ff378d386b30b36b07a69.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bifrose.ahyg Vulnerability: Insecure Permissions Description: The malware creates an dir with insecure permissions under c:\ drive granting change (C) permissions to the authenticated user group. Standard users can rename the...
- HEUR.Trojan.Win32.Generic / Insecure Service Path October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/2e4b6c5bd907995f6fd40c5eeab5c6e9.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: HEUR.Trojan.Win32.Generic Vulnerability: Insecure Service Path Description: The malware creates a service with an unquoted path. Third party attackers who can place an arbitrary executable under c:\ drive can potentially undermine the […]
- Backdoor.Win32.Yoddos.an / Insecure Service Path October 6, 2021Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bf2417bf23a3b7ae2e44676882b4b9dd.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Yoddos.an Vulnerability: Insecure Service Path Description: The malware creates a service with an unquoted path. Third party attackers who can place an arbitrary executable under c:\ drive can potentially undermine the […]
Tempo di lettura: 5 minUtilizzo del Machine Learning per proteggere i dati Introdotto nel gennaio 2017, Acronis Act… https://t.co/mhqalBxm8D
Gli attacchi informatici sono numerosi e non fanno distinzione tra aziende e singoli individui quando prendono di m… https://t.co/uOucUWZf7W
Estimated reading time: 5 minutes SNYPR è uno strumento di analisi della sicurezza in grado di trasformare i Big… https://t.co/oies7e0nYY
Estimated reading time: 5 minutes Con l’avvento delle piattaforme di big data, le aziende che si occupano di sicu… https://t.co/MSvA0dPgiE
Estimated reading time: 5 minutes With the advent of big data platforms, IT security companies can now make guid… https://t.co/aTv41eq2Ir