Search Results:

Home 2023 – Official – Copy

Login Defend yourself beforeit’s too lateDiscover our servicesSOC as a Service [NGS] cyber security at your serviceDiscover our servicesEthical Hacking – VulnerabilityAssessment & Penetration TestDiscover our services Previous slide Next slide About us. Secure Online Desktop – The company Secure Online Desktop is a Managed Security Service Provider (MSSP) specializing in providing comprehensive security solutions for businesses of all sizes….

View

What is threat intelligence?

I dati di threat intelligence forniscono alle aziende approfondimenti rilevanti e tempestivi necessari per comprendere, prevedere, rilevare e rispondere alle minacce alla sicurezza informatica. Le soluzioni di intelligence sulle minacce raccolgono, filtrano e analizzano grandi volumi di dati grezzi relativi a fonti esistenti o emergenti di minacce. Il risultato sono feed di threat intelligence e rapporti di gestione. I data…

View

What is it for? Hadoop Security Data Lake (SDL)

New cybersecurity threats continue to emerge every day and hackers develop new intrusion techniques to access sensitive data and breach IT systems. This is why it is necessary to collaborate with high-level experts who keep track of new developments in the field of IT security. With the birth and continuous evolution of Big Data, the concept of Data Lake and…

View

Auditing IT della sicurezza: guida completa all’analisi proattiva di vulnerabilità e conformità

Eseguire controlli di sicurezza regolari e approfonditi sull’infrastruttura IT è fondamentale per identificare e mitigare rischi cyber ed eventuali vulnerabilità prima che vengano sfruttate dagli attaccanti. In questo articolo esaminiamo l’importanza di implementare un programma continuativo di auditing della sicurezza IT e come esternalizzarlo a fornitori specializzati. Cos’è l’auditing della sicurezza IT? L’auditing IT consiste nell’analizzare nel dettaglio configurazioni, policy,…

View

Deception: Tricking Hackers to Secure Your Network

Deception: Comparison with Hackers on Their Ground “We pay hackers their own coin by using the same defenses and techniques that malware uses against computer systems by modeling the attackers’ decision-making process.” Introduction to Deception Deception is a proactive cybersecurity approach that uses traps or decoys to trick attackers into revealing their presence. By transforming the computer system into a…

View

CSIRT: respond to IT incidents to protect the business

Introduction In recent years, cybersecurity has become a priority for all companies of all sizes. Cyber attacks are increasingly sophisticated and can cause serious damage, both economic and reputational. To protect themselves from attacks, companies must adopt 360-degree cybersecurity solutions, which include not only prevention tools but also incident detection and response tools. In this context, the CSIRT (Computer Security…

View

Home 2023 – Official

Login Defend yourself beforeit’s too lateDiscover our servicesSOC as a Service [NGS] cyber security at your serviceDiscover our servicesEthical Hacking – VulnerabilityAssessment & Penetration TestDiscover our services Previous slide Next slide About us. Secure Online Desktop – The company Secure Online Desktop is a Managed Security Service Provider (MSSP) specializing in providing comprehensive security solutions for businesses of all sizes….

View

Coordination between CTI and SOC: how to further raise the defenses

The Cyber Threat Intelligence (CTI) and a Security Operations Center (SOC) are two important parts in a company’s security process. They help identify and mitigate the risks involved in the digital world. CTI is a proactive measure that helps identify potential threats, while SOC is a reactive measure that helps detect and mitigate an attack. Together, CTI and SOC are…

View

SIEM monitoring: best practices

As the cybersecurity threat landscape becomes increasingly sophisticated, service providers, such as SOD, need to take additional precautions to protect their customers’ networks. An information management system and monitoring SIEM is an excellent choice in this respect. This system, in fact, helps mitigate cybersecurity threats from two different angles, all from a single interface . The SIEM monitoring system collects…

View

Cyber Threat Intelligence (CTI) – greater effectiveness for IT security

Cyber threat intelligence identify dangers before they cause damage Find threats before they become a problem Cyber Threat Intelligence is evidence-based knowledge about an emerging threat or a risk to one’s assets. The service, performed by a Cyber Threat Hunter , assumes that a threat is present, before to have the evidence . The research exploits indicators of compromise and…

View

SOAR: coordination for cyber security

SOAR (Security Orchestration, Automation and Response) technology helps coordinate, execute and automate activities between people and tools, enabling companies to respond quickly to cyber security attacks. The aim is to improve their overall security position. SOAR tools use playbooks (strategies and procedures) to automate and coordinate workflows which may include security tools and manual tasks. How does SOAR help in…

View

SIEM in computer science: history

A SIEM solution in IT is one of the essential components of a SOC (Security Operation Center). Its task is to collect information and analyze it in search of anomalies and possible breaches in the system. But the defense process hasn’t always been that simple. What we now call SIEM, Security Information and Event Management, is the union of two…

View

SIEM software: what it is and how it works

Evolving beyond its roots in log file management, today’s security information and event management (SIEM) software vendors are introducing AI, advanced statistical analysis and other analytical methods into their products. . But what is SIEM software and what are its uses? SIEM software Acronym for Security Information and Event Management, it is a product that provides cyber security professionals in…

View

ownCloud

ownCloud is a way to have personal file on Cloud become an affiliate [btnsx id=”3391″] Your personal files on Cloud Access from anywhere, from multiple platform whenever you want Share files and collaborate with your team Personal files on Cloud Access, Sync and Share Your Data, Under Your Control! own Cloud is a self-hosted file sync and share server. It…

View

Public Cloud Reggio Emilia

public cloud reggio emilia Public cloud Reggio Emilia, the offer of the Public Cloud in Reggio Emilia of the Secure Online Desktop. The Public Cloud or Public Cloud is one of the models of cloud computing, where a Service Provider (or Cloud Provider in this case) makes publicly available on the Internet resources such as applications and storage. Public Cloud…

View

Customers

Newsletter

{subscription_form_1}