cloud milan Piergiorgio Venuti

Cloud Milan

Cloud Milan

 

The Datacenter in Italy of the Secure Online Desktop reside in Caldera street 21 in Milan at the MIX (Milan Internet eXchange).

Our Datacenter is a Tier 3 with the following technical features:

Cloud Milan – Physical security:

The service you purchase includes structural elements and procedures to prevent / deter the physical access of unauthorized personnel to the Datacenter. Physical security is achieved through:

   ♦ electronic systems for access control;
   ♦ surveillance personnel, 24 hours a day, 365 days a year;
   ♦ cameras inside the Datacenter;
   ♦ on-site personnel, whose duties include checking the Client’s activities;
   ♦ well defined access procedures;
   ♦ control of material and baggage entering and leaving the Datacenter.

HVAC conditioning:

Heating, ventilation, air conditioning (HVAC)
The service you purchase includes the use of the Datacenter heating, ventilation and air conditioning system. The temperature and humidity inside the rooms dedicated to the service are strictly controlled to ensure stable conditions for the equipment installed, according to the following parameters:

   ♦ Power: 1000W / m2
   ♦ Temperature: between 20 and 25 degrees Celsius
   ♦ Humidity: between 40% and 60%

Fire prevention:

The service that purchases includes the use of the fire protection / suppression system inside the Datacenter, consisting of passive elements and active elements.

   ♦ Passive elements. They are located in areas and parts of the building where required by current building regulations.
   ♦ Active elements. They consist of an electronic detection system located inside the floors and / or counter-ceilings. The system is manufactured in compliance with current regulations.
   ♦ Fire suppression system. The system is built using a gas suppression system, mainly based on FM 200 or Inert55 (mixture of nitrogen and Argon), or other component according to law.

Canal floor:

The data rooms are equipped with a floating floor with the following characteristics:
Loading capacity: 1,200 Kg / m2
Minimum height: 50 cm

Equipment cabling: “aerial” conduits

Environmental controls:

 

The service that purchases includes the use of the following environmental controls:

♦ Protection against electric shock – Present
♦ Lightning protection – The Via Caldera complex is equipped with lightning protection systems located on the roof of each building.
♦ Anti-dust / pollen filters – Present
♦ Anti-flooding system: Present
Our Datacenter has been built according to the norms in force and has the ISO 27001 certification.

[btnsx id=”2931″]

Useful links:

Partner

WEB HOSTING

Cloud Products and Services

How to have your computer network under control

Alternative to the NAS

New Acronis Cloud Backup model for end users and new reseller plan

New templates for VPS

BaaS | Veeam Cloud Connect

ownCloud

Subscription business model – Basics

Demo Cloud Servers

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • CVE-2022-48336 - Buffer Overflow in Widevine Trustlet (PRDiagParseAndStoreData @ 0x5cc8) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48336 [+] Title : Buffer Overflow in Widevine Trustlet (PRDiagParseAndStoreData @ 0x5cc8) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48335 - Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48335 [+] Title : Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48334 - Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x7370) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48334 [+] Title : Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x7370) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48333 - Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x730c) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48333 [+] Title : Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x730c) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48332 - Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x6a18) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48332 [+] Title : Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x6a18) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48331 - Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x69b0) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48331 [+] Title : Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x69b0) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • SCHUTZWERK-SA-2022-001: Cross-Site-Scripting in Papaya Medical Viewer May 30, 2023
    Posted by Lennert Preuth via Fulldisclosure on May 30Title ===== SCHUTZWERK-SA-2022-001: Cross-Site-Scripting in Papaya Medical Viewer Status ====== PUBLISHED Version ======= 1.0 CVE reference ============= CVE-2023-33255 Link ==== https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001/ Text-only version: https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001.txt Further SCHUTZWERK advisories: https://www.schutzwerk.com/blog/tags/advisories/ Affected products/vendor...
  • [RT-SA-2023-005] Pydio Cells: Server-Side Request Forgery May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30For longer running processes, Pydio Cells allows for the creation of jobs, which are run in the background. The job "remote-download" can be used to cause the backend to send a HTTP GET request to a specified URL and save the response to a new file. The response […]
  • [RT-SA-2023-004] Pydio Cells: Cross-Site Scripting via File Download May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30Advisory: Pydio Cells: Cross-Site Scripting via File Download Pydio Cells implements the download of files using presigned URLs which are generated using the Amazon AWS SDK for JavaScript [1]. The secrets used to sign these URLs are hardcoded and exposed through the JavaScript files of the web application. […]
  • [RT-SA-2023-003] Pydio Cells: Unauthorised Role Assignments May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30Advisory: Pydio Cells: Unauthorised Role Assignments Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning […]

Customers

Newsletter