Cloud milano Piergiorgio Venuti

Cloud Milano

Cloud Milano

Il Datacenter in Italia della Secure Online Desktop risiedere in via Caldera 21 a Milano presso il MIX (Milan Internet eXchange).

Il nostro Datacenter è un Tier 3 con le seguenti caratteristiche tecniche:

Cloud Milano – Sicurezza fisica:

Il servizio che acquisti include elementi strutturali e procedure per prevenire/dissuadere l’accesso fisico di personale non autorizzato al Datacenter. La sicurezza fisica è realizzata tramite:

  • ♦ sistemi elettronici per il controllo degli accessi;
  • ♦ personale di sorveglianza, 24 ore al giorno per 365 giorni l’anno;
  • ♦ telecamere all’interno del Datacenter;
  • ♦ personale on-site, tra i cui compiti è incluso il controllo delle attività del Cliente;
  • ♦ procedure d’accesso ben definite;
  • ♦ controllo di materiale e bagagli in entrata e uscita al Datacenter;

Condizionamento HVAC:

Riscaldamento, ventilazione, condizionamento(HVAC)

Il servizio che acquisti include l’uso del sistema di riscaldamento, ventilazione e condizionamento del Datacenter. La temperatura e l’umidità all’interno delle sale dedicate al servizio sono rigidamente controllate per assicurare condizioni stabili alle apparecchiature installate, secondo i seguenti parametri:

  • ♦ Potenza: 1000W/m2
  • ♦ Temperatura: tra 20 e 25 gradi centigradi
  • ♦ Umidità: tra 40% e 60%

Prevenzione incendi:

Il servizio che acquisti include la fruizione del sistema di protezione/soppressione incendi interno al Datacenter, costituito da elementi passivi e da elementi attivi.

  • ♦ Elementi passivi. Sono localizzati in aree e parti dell’edificio dove richiesto dalle norme costruttive vigenti.
  • ♦ Elementi attivi. Consistono in un sistema elettronico di rilevamento situato all’interno dei pavimenti e/o nei contro-soffitti. Il sistema è realizzato in conformità alle norme vigenti.
  • ♦ Sistema di soppressione incendi. Il sistema è realizzato tramite un sistema di soppressione a gas, basato principalmente su FM 200 o Inert55 (miscela di azoto e Argon), o altro componente a norma di legge.

Pavimento a canaline:

Le sale dati sono dotate di pavimento flottante con le seguenti caratteristiche:
Capacità di carico: 1.200 Kg/m2
Altezza minima:  50 cm

Cablaggi apparecchiature: canaline “aeree”

Controlli ambientali:

Il servizio che acquisti include la fruizione dei seguenti controlli ambientali:

  • ♦ Protezione da scariche elettriche – Presente
  • ♦ Protezione da fulmini – Il complesso di via Caldera è dotato di sistemi per la protezione da fulmini situati sul tetto di ciascun edificio.
  • ♦ Filtri antipolvere/polline – Presenti
  • ♦ Sistema anti allagamento: Presente

Il nostro Datacenter è stato costruito secondo le normi vigenti e possiede la certificazione ISO 27001.

[btnsx id=”2929″]

Link utili:

 

Condividi


RSS

Piu’ articoli…

Categorie …

Tags

RSS CSIRT

RSS Dark Reading

RSS Full Disclosure

  • APPLE-SA-2023-01-24-1 tvOS 16.3 Gennaio 27, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 26APPLE-SA-2023-01-24-1 tvOS 16.3 tvOS 16.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213601. AppleMobileFileIntegrity Available for: Apple TV 4K (all models) and Apple TV HD Impact: An app may be able to access user-sensitive data Description: This issue was addressed […]
  • [SYSS-2022-047] Razer Synapse - Local Privilege Escalation Gennaio 27, 2023
    Posted by Oliver Schwarz via Fulldisclosure on Jan 26Advisory ID: SYSS-2022-047 Product: Razer Synapse Manufacturer: Razer Inc. Affected Version(s): Versions before 3.7.0830.081906 Tested Version(s): 3.7.0731.072516 Vulnerability Type: Improper Certificate Validation (CWE-295) Risk Level: High Solution Status: Open Manufacturer Notification: 2022-08-02 Solution Date: 2022-09-06 Public Disclosure:...
  • [RT-SA-2022-002] Skyhigh Security Secure Web Gateway: Cross-Site Scripting in Single Sign-On Plugin Gennaio 26, 2023
    Posted by RedTeam Pentesting GmbH on Jan 26RedTeam Pentesting identified a vulnerability which allows attackers to craft URLs to any third-party website that result in arbitrary content to be injected into the response when accessed through the Secure Web Gateway. While it is possible to inject arbitrary content types, the primary risk arises from JavaScript […]
  • t2'23: Call For Papers 2023 (Helsinki, Finland) Gennaio 24, 2023
    Posted by Tomi Tuominen via Fulldisclosure on Jan 23Call For Papers 2023 Tired of your bosses suspecting conference trips to exotic locations being just a ploy to partake in Security Vacation Club? Prove them wrong by coming to Helsinki, Finland on May 4-5 2023! Guaranteed lack of sunburn, good potential for rain or slush. In […]
  • Re: HNS-2022-01 - HN Security Advisory - Multiple vulnerabilities in Solaris dtprintinfo and libXm/libXpm Gennaio 24, 2023
    Posted by Marco Ivaldi on Jan 23Hello again, Just a quick update. Mitre has assigned the following additional CVE IDs: * CVE-2023-24039 - Stack-based buffer overflow in libXm ParseColors * CVE-2023-24040 - Printer name injection and heap memory disclosure We have updated the advisory accordingly: https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt Regards, Marco
  • APPLE-SA-2023-01-23-8 Safari 16.3 Gennaio 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-8 Safari 16.3 Safari 16.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213600. WebKit Available for: macOS Big Sur and macOS Monterey Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: The issue was addressed with […]
  • APPLE-SA-2023-01-23-7 watchOS 9.3 Gennaio 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-7 watchOS 9.3 watchOS 9.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213599. AppleMobileFileIntegrity Available for: Apple Watch Series 4 and later Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened […]
  • APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3 Gennaio 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3 macOS Big Sur 11.7.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213603. AppleMobileFileIntegrity Available for: macOS Big Sur Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling […]
  • APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 Gennaio 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 macOS Monterey 12.6.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213604. AppleMobileFileIntegrity Available for: macOS Monterey Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened runtime. CVE-2023-23499: […]
  • APPLE-SA-2023-01-23-4 macOS Ventura 13.2 Gennaio 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-4 macOS Ventura 13.2 macOS Ventura 13.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213605. AppleMobileFileIntegrity Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened runtime. CVE-2023-23499: […]

Customers

Newsletter