Secure Online Desktop 10 years later: our corporate anniversary
Ten years ago, on June 16, 2011, Secure Online Desktop was born. Many things have changed in ten years and we have always done our best to keep up with the times and offer cutting-edge solutions to our customers. We want to celebrate our company anniversary by retracing the key milestones of these years by sharing them with you.
The products offered today are focused on corporate security and decentralization of services, but that wasn’t always the case. Originally our services were limited and only with the experience in the field have we been able to improve and grow the offer, meeting the needs of our customers.
The first service offered, which also gave our company its name, was a secure desktop online that brought the customer remote computing power , easy to use and definitely user friendly . The decentralization of machines and computing , the underlying concept of cluod computing , was still under development in 2011 and certainly not as far-reaching as it is today. The large international companies in the sector had recently ventured into offering this type of service. In fact, Microsoft Azure entered the market in 2010 and Amazon’s AWS was born in 2006.
Things have changed a lot since then, of course. In ten years of technological growth, services have improved, been consolidated and new ones have been born. We at SOD, on the day of our company anniversary, can say that we have done everything possible to always keep up with the times.
SOD’s services on the company’s 10th anniversary
The services offered today are varied and well structured. A high standard of security has been maintained as an added value. The nature of the services is always based on Cloud Computing , but includes much more than just a simple remote desktop.
All products are scalable, which allow the optimization of the customer’s economic resources. A SaaS (Software as a Service) delivery model is used which allows easy customization and high scalability.
On the 10th anniversary of the company, Secure Online Desktop is an Italian company still growing, a cloud provider with excellent quality services, whose values are cyber security and customer care.
What we offer are solutions and not just services. This means that the services provided are highly customizable and we are able to generate ad hoc solutions for every company and every need.
We like to be tested, so we “challenge” our customers to submit specific situations and problems to us and then offer tailored solutions that always leave the final customer and his employees satisfied.
SOD in the market
We can’t deny that competing with giants like Amazon or Microsoft, to name just the best known, isn’t easy at all. However, what sets us apart is the customer care and the attention we put into offering our services .
By necessity, for big companies , having tens of thousands of customers can only lower the level of personalization of the service provided. Inevitably, this leads some customers to be dissatisfied with the service.
We, on the other hand, who are a much smaller international company, can invest more time in assistance and product customization operations. The result is always satisfied customers, perfect services in every detail and constant growth in the number of customers. As an added value, we engage in constant research to improve and expand our range of services offered.
We are extremely satisfied with the results achieved over the past ten years, and we say it with some satisfaction on our company anniversary.
Our most recent social initiatives
Furthermore, we must not forget that over time we have also got involved in the social sphere. In the last year alone, two new initiatives have been promoted to help entrepreneurs and companies in difficulty following the outbreak of the COVID-19 pandemic.
We offered a free Cloud Storage service ( ownCloud ) to support companies in introducing a telecommuting plan for their employees. In addition, we have long supported Folding @ Home , a distributed computing project aimed at simulating protein dynamics , in particular the folding process. Through the use of software made available, it is possible to offer the computing power of a computer as an active resource for research. & nbsp;
The Folding @ Home initiative helped research against COVID-19 by focusing the computational power offered by the participants on virus analysis.
We haven’t pulled back even as regards the realities of our territory, which we regularly support. For example, Civil Protection of Albinea uses our web hosting and online presence management services under the title free. Furthermore, we actively help the association AGiReCoN ( Associazione Giovani Reggiani Against Cancer ) with IT support and in the development of apps to facilitate doctor / patient communication.
The evolution of our services
As I mentioned before, many services have been added to the first Online Desktop offering, but I want to celebrate this day in a complete way by offering a chronological overview of the major services offered.
We work on our services to always offer the best for our customers.
These first 10 years of business have been exciting and have brought many exciting challenges. We want to continue at this pace to improve and always offer the best IT services for our customers!
- The SOAR benefits: simplifying investigation and response
- Security Code Review: How the service works
- Integration of the automated response: the automations in SOCaaS
- Coordination between CTI and SOC: how to further raise the defenses
- New Cloud Server: redundant internet
- Quality certificate for the SOCaaS of SOD
- Managed Detection and Response: a new preventive approach
- CLUSIT: our collaboration for better services
- Backup as a Service (17)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (22)
- Conferenza Cloud (4)
- ICT Monitoring (5)
- Log Management (2)
- News (21)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (15)
- Security (170)
- Web Hosting (15)
- ICYMI: A Microsoft Warning, Follina, Atlassian, and More July 1, 2022Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.
- OpenSea NFT Marketplace Faces Insider Hack July 1, 2022OpenSea warns users that they are likely to be targeted in phishing attacks after a vendor employee accessed and downloaded its email list.
- Time Constraints Hamper Security Awareness Programs July 1, 2022Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.
- Criminals Use Deepfake Videos to Interview for Remote Work July 1, 2022The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
- DragonForce Malaysia Releases LPE Exploit, Threatens Ransomware July 1, 2022The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.
- When It Comes to SBOMs, Do You Know the Ingredients in Your Ingredients? July 1, 2022Transitive dependencies can complicate the process of developing software bills of materials.
- Microsoft Going Big on Identity with the Launch of Entra July 1, 2022With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
- Google: Hack-for-Hire Groups Present a Potent Threat June 30, 2022Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of new reports said.
- 18 Zero-Days Exploited So Far in 2022 June 30, 2022It didn't have to be this way: So far 2022's tranche of zero-days shows too many variants of previously patched security bugs, according Google Project Zero.
- API Security Losses Total Billions, But It's Complicated June 30, 2022A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
- JAHx221 - RCE in copy/pasted PHP compat libraries, json_decode function July 1, 2022Posted by Eldar Marcussen on Jun 30JAHx221 - RCE in copy/pasted PHP compat libraries, json_decode function =============================================================================== Several PHP compatability libraries contain a potential remote code execution flaw in their `json_decode()` function based on having copy pasted existing vulnerable code. Identifiers --------------------------------------- * JAHx221 - http://www.justanotherhacker.com/advisories/JAHx221.txt...
- Backdoor.Win32.EvilGoat.b / Weak Hardcoded Credentials July 1, 2022Posted by malvuln on Jun 30Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/20daf01e941f966b21a7ae431faefc65.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.EvilGoat.b Vulnerability: Weak Hardcoded Credentials Description: The malware listens on TCP port 13014. Authentication is required, however the credentials "evilgoat / penix" are weak and found within the PE...
- Backdoor.Win32.Coredoor.10.a / Authentication Bypass July 1, 2022Posted by malvuln on Jun 30Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/49da40a2ac819103da9dc5ed10d08ddb.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Coredoor.10.a Vulnerability: Authentication Bypass Description: The malware runs an FTP server on TCP port 21000. Third-party attackers who can reach infected systems can logon using any username/password combination....
- Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials July 1, 2022Posted by malvuln on Jun 30Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/a8fc1b3f7a605dc06a319bf0e14ca68b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Cafeini.b Vulnerability: Weak Hardcoded Credentials Description: The malware listens on TCP ports 51966 and 23. Authentication is required, however the password "mama" is weak and found within the PE […]
- BigBlueButton - Stored XSS in username (CVE-2022-31064) July 1, 2022Posted by Rick Verdoes via Fulldisclosure on Jun 30CVE-2022-31064 - Stored Cross-Site Scripting in BigBlueButton. ========================= Exploit Title: Stored Cross-Site Scripting (XSS) in BigBlueButton Product: BigBlueButton Vendor: BigBlueButton Vulnerable Versions: 2.3,
- typeorm CVE-2022-33171 July 1, 2022Posted by lixts via Fulldisclosure on Jun 30typeorm CVE-2022-33171 findOne(id), findOneOrFail(id) The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. The issue […]
- 🐞 CFP for Hardwear.io NL 2022 is OPEN! July 1, 2022Posted by Andrea Simonca on Jun 30*🐞 CFP for Hardwear.io NL 2022 is OPEN!* If you have groundbreaking embedded research or an awesome open-source tool you’d like to showcase before the global hardware security community, this is your chance. Send in your ideas on various hardware subjects, including but not limited to Chips, Processors, ICS/SCADA, […]
- [Extension: CPSIoTSec 2022] The Workshop on CPS&IoT Security and Privacy **Submission Deadline: July 25, 2022** July 1, 2022Posted by alcaraz on Jun 30[Apologies for cross-posting] -------------------------------------------------------------------------- C a l l F o r P a p e r s The Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2022), in conjunction with the ACM Conference on Computer and Communications Security (ACM CCS) November 7-11, 2022, Los Angeles, U.S.A. https://cpsiotsec2022.github.io/cpsiotsec/...
- Backdoor.Win32.InfecDoor.17.c / Insecure Permissions June 28, 2022Posted by malvuln on Jun 27Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/1fd70e41918c3a75c634b1c234ec36fb.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.InfecDoor.17.c Vulnerability: Insecure Permissions Description: The malware writes a ".420" settings file type to c drive granting change (C) permissions to the authenticated user group. Standard users can...
- Trojan-Mailfinder.Win32.VB.p / Insecure Permissions June 28, 2022Posted by malvuln on Jun 27Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/20e438d84aa2828826d52540d80bf7f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Mailfinder.Win32.VB.p Vulnerability: Insecure Permissions Description: The malware writes a dir with multiple PE files to c drive granting change (C) permissions to the authenticated user group. Standard users can […]
Estimated reading time: 6 minutes L'impatto crescente delle minacce informatiche, su sistemi operativi privati op… https://t.co/FimxTS4o9G
Estimated reading time: 6 minutes The growing impact of cyber threats, on private or corporate operating systems… https://t.co/y6G6RYA9n1
Tempo di lettura stimato: 6 minuti Today we are talking about the CTI update of our services. Data security is… https://t.co/YAZkn7iFqa
Estimated reading time: 6 minutes Il tema della sicurezza delle informazioni è di grande attualità in questo peri… https://t.co/tfve5Kzr09
Estimated reading time: 6 minutes The issue of information security is very topical in this historical period ch… https://t.co/TP8gvdRcrF