cloud services Piergiorgio Venuti

Cloud services

cloud services

The provision of Cloud Services is the core business of Secure Online Desktop, through these services we are able to provide our customers with support to all the company’s ICT processes. Thanks to the adoption of Cloud services, our customers can use a reliable Cloud Provider that, through its Datacenter, is able to implement and maintain the customer’s server pool in a highly professional and structured environment.

The categories of services most used by our customers are:

Cloud services

IaaS (Infrastructure as a Service).

Through this service it is possible to create a single virtual server (VPS) or an internal virtual datacenter on which to install the company’s own applications, avaling the computational capacity of our Cloud.

IaaS services are an excellent response to customers who want to offer their customers services provided by a stable, professional and flexible infrastructure

The services offered in this category are:

   ♦ Cloud Server: It offers the possibility to create a virtual server in a few minutes from a convenient web interface without having the necessary hardware resources and facilities to manage it.
   ♦ Super Cloud: Offers the possibility to create a real Cloud Datacenter with one or more virtual servers to replicate or expand your Datacenter.

SaaS (Software as a Service)

Through this service you can take advantage of software in web or remote mode as if it were installed on your PC, at the same time you have all the advantages offered by the Cloud world (flexibility, backup, redundancy, etc.). With the SaaS services it is not necessary to install the software on your PC or server as everything you need is online and publicly accessible.

The services offered in this category are:

   ♦ Cloud CRM for call centers: Software designed for call centers to manage outbound and inboud calls.
   ♦ Web conference: Software for creating web meetings.

[btnsx id=”2931″]

Useful links:

ICT Monitoring Service | Demo

VPS Metered – Cloud location

Demo Cloud Servers

VPS

New templates for VPS

IaaS | Cloud | Infrastructure as a Service

Free Microsoft Windows licenses

How to have your computer network under control

Cloud Milan

Stay in control of your fast-moving, quick-shifting data

Let’s Encrypt Free Certificates for all Webhosting users

Virtual server

WEB HOSTING

Cloud Products and Services

Alternative to the NAS

Subscription business model – Basics

Public Cloud

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • SEC Consult SA-20231123 :: Uninstall Key Caching in Fortra Digital Guardian Agent Uninstaller November 27, 2023
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Nov 27SEC Consult Vulnerability Lab Security Advisory < 20231123-0 > ======================================================================= title: Uninstall Key Caching product: Fortra Digital Guardian Agent Uninstaller (Data Loss Prevention) vulnerable version: Agent:
  • SEC Consult SA-20231122 :: Multiple Vulnerabilities in m-privacy TightGate-Pro November 27, 2023
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Nov 27SEC Consult Vulnerability Lab Security Advisory < 20231122-0 > ======================================================================= title: Multiple Vulnerabilities product: m-privacy TightGate-Pro vulnerable version: Rolling Release, servers with the following package versions are vulnerable: tightgatevnc < 4.1.2~1 rsbac-policy-tgpro
  • Senec Inverters Home V1, V2, V3 Home & Hybrid Use of Hard-coded Credentials - CVE-2023-39169 November 27, 2023
    Posted by Phos4Me via Fulldisclosure on Nov 27Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
  • [SYSS-2023-019] SmartNode SN200 - Unauthenticated OS Command Injection November 27, 2023
    Posted by Maurizio Ruchay via Fulldisclosure on Nov 27Advisory ID: SYSS-2023-019 Product: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway Manufacturer: Patton LLC Affected Version(s):
  • CVE-2023-46307 November 27, 2023
    Posted by Kevin on Nov 27running on the remote port specified during setup
  • CVE-2023-46307 November 27, 2023
    Posted by Kevin on Nov 27While conducting a penetration test for a client, they were running an application called etc-browser which is a public GitHub project with a Docker container. While fuzzing the web server spun up with etcd-browser (which can run on any arbitrary port), the application had a Directory Traversal vulnerability that is […]
  • Survey on usage of security advisories November 27, 2023
    Posted by Aurich, Janik on Nov 27Dear list members, we are looking for voluntary participants for our survey, which was developed in the context of a master thesis at the University of Erlangen-Nuremberg. The goal of the survey is to determine potential difficulties that may occur when dealing with security advisories. The focus of the […]
  • [CVE-2023-46386, CVE-2023-46387, CVE-2023-46388, CVE-2023-46389] Multiple vulnerabilities in Loytec products (3) November 27, 2023
    Posted by Chizuru Toyama on Nov 27[+] CVE : CVE-2023-46386, CVE-2023-46387, CVE-2023-46388, CVE-2023-46389 [+] Title : Multiple vulnerabilities in Loytec L-INX Automation Servers [+] Vendor : LOYTEC electronics GmbH [+] Affected Product(s) : LINX-151, Firmware 7.2.4, LINX-212, firmware 6.2.4 [+] Affected Components : L-INX Automation Servers [+] Discovery Date :...
  • [CVE-2023-46383, CVE-2023-46384, CVE-2023-46385] Multiple vulnerabilities in Loytec products (2) November 27, 2023
    Posted by Chizuru Toyama on Nov 27[+] CVE : CVE-2023-46383, CVE-2023-46384, CVE-2023-46385 [+] Title : Multiple vulnerabilities in Loytec LINX Configurator [+] Vendor : LOYTEC electronics GmbH [+] Affected Product(s) : LINX Configurator 7.4.10 [+] Affected Components : LINX Configurator [+] Discovery Date : 01-Sep-2021 [+] Publication date : 03-Nov-2023 [+]...
  • Senec Inverters Home V1, V2, V3 Home & Hybrid Exposure of the Username to an Unauthorized Actor - CVE-2023-39168 November 12, 2023
    Posted by Phos4Me via Fulldisclosure on Nov 12Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/

Customers

Newsletter

{subscription_form_1}