Datacenter Piergiorgio Venuti

Datacenter in Italy

Datacenter

Datacenter in Italy (Milan/Reggio Emilia)

 

The Datacenter in Italy of the Secure Online Desktop reside in via Caldera 21 in Milan at the MIX (Milan Internet eXchange).

Our Datacenter is a Tier 3 with the following technical features:

Physical security:

The service you purchase includes structural elements and procedures to prevent / deter the physical access of unauthorized personnel to the Datacenter. Physical security is achieved through:

   ♦ electronic access control systems;
   ♦ surveillance personnel, 24 hours a day, 365 days a year;
   ♦ cameras inside;
   ♦ on-site personnel, whose duties include checking the Client’s activities;
   ♦ well defined access procedures;
   ♦ control of material and baggage entering and leaving the Datacenter.

HVAC conditioning:

Heating, ventilation, air conditioning (HVAC)
The service you purchase includes the use of the Datacenter heating, ventilation and air conditioning system. The temperature and humidity inside the rooms dedicated to the service are strictly controlled to ensure stable conditions for the equipment installed, according to the following parameters:

   ♦ Power: 1000W / m2
   ♦ Temperature: between 20 and 25 degrees Celsius
   ♦ Humidity: between 40% and 60%

Fire prevention:

The service that purchases includes the use of the fire protection / suppression system inside the Datacenter, consisting of passive elements and active elements.

   ♦ Passive elements. They are located in areas and parts of the building where required by current building regulations.
   ♦ Active elements. They consist of an electronic detection system located inside the floors and / or counter-ceilings. The system is manufactured in compliance with current regulations.
   ♦ Fire suppression system. The system is built using a gas suppression system, mainly based on FM 200 or Inert55 (mixture of nitrogen and Argon), or other component according to law.

Canal floor:

The data rooms are equipped with a floating floor with the following characteristics:
Loading capacity: 1,200 Kg / m2
Minimum height: 50 cm
Equipment cabling: “aerial” conduits

Environmental controls:

The service that purchases includes the use of the following environmental controls:

   ♦ Protection against electric shock – Present
   ♦ Lightning protection – The Via Caldera complex is equipped with lightning protection systems located on the roof of each building.
   ♦ Dust / Pollen Filters – Present
   ♦ Anti-flooding system: Present
Our Datacenter has been built according to current regulations and is ISO 27001 certified.

Check out the Cloud Server

[btnsx id=”2931″]

Useful links:

Partner

WEB HOSTING

Public Cloud

Public Cloud Reggio Emilia

Cloud Products and Services

Subscription business model – Basics

Alternative to the NAS

Cloud Milan

How to have your computer network under control

Cloud services

Free Microsoft Windows licenses

ownCloud

IaaS | Cloud | Infrastructure as a Service

New templates for VPS

VPS Metered – Cloud location

New Cloud Server video – Create your Public Cloud

Demo Cloud Servers

BaaS | Veeam Cloud Connect

New Acronis Cloud Backup model for end users and new reseller plan

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • CVE-2022-48336 - Buffer Overflow in Widevine Trustlet (PRDiagParseAndStoreData @ 0x5cc8) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48336 [+] Title : Buffer Overflow in Widevine Trustlet (PRDiagParseAndStoreData @ 0x5cc8) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48335 - Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48335 [+] Title : Buffer Overflow in Widevine Trustlet (PRDiagVerifyProvisioning @ 0x5f90) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48334 - Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x7370) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48334 [+] Title : Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x7370) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48333 - Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x730c) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48333 [+] Title : Buffer Overflow in Widevine Trustlet (drm_verify_keys @ 0x730c) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48332 - Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x6a18) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48332 [+] Title : Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x6a18) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • CVE-2022-48331 - Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x69b0) May 30, 2023
    Posted by Cyber Intel Security on May 301. INFORMATION -------------- [+] CVE : CVE-2022-48331 [+] Title : Buffer Overflow in Widevine Trustlet (drm_save_keys @ 0x69b0) [+] Vendor : Google [+] Device : Nexus 6 [+] Affected component : Widevine [+] Publication date : March 2023 [+] Credits : CyberIntel Team 2. AFFECTED VERSIONS -------------------- 5.0.0 […]
  • SCHUTZWERK-SA-2022-001: Cross-Site-Scripting in Papaya Medical Viewer May 30, 2023
    Posted by Lennert Preuth via Fulldisclosure on May 30Title ===== SCHUTZWERK-SA-2022-001: Cross-Site-Scripting in Papaya Medical Viewer Status ====== PUBLISHED Version ======= 1.0 CVE reference ============= CVE-2023-33255 Link ==== https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001/ Text-only version: https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-001.txt Further SCHUTZWERK advisories: https://www.schutzwerk.com/blog/tags/advisories/ Affected products/vendor...
  • [RT-SA-2023-005] Pydio Cells: Server-Side Request Forgery May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30For longer running processes, Pydio Cells allows for the creation of jobs, which are run in the background. The job "remote-download" can be used to cause the backend to send a HTTP GET request to a specified URL and save the response to a new file. The response […]
  • [RT-SA-2023-004] Pydio Cells: Cross-Site Scripting via File Download May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30Advisory: Pydio Cells: Cross-Site Scripting via File Download Pydio Cells implements the download of files using presigned URLs which are generated using the Amazon AWS SDK for JavaScript [1]. The secrets used to sign these URLs are hardcoded and exposed through the JavaScript files of the web application. […]
  • [RT-SA-2023-003] Pydio Cells: Unauthorised Role Assignments May 30, 2023
    Posted by RedTeam Pentesting GmbH on May 30Advisory: Pydio Cells: Unauthorised Role Assignments Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning […]

Customers

Newsletter