Cloud Server di Secure OD Giacomo Lanzi

Your virtual machine with Cloud Server

The Cloud Server service allows flexible management of the resources of a remote virtual server (VPS). That is, the concrete advantage of having complete control over the server machines without the disturbance of their physical management. There will be no need to update, manage or restart a physical machine.

The servers created through the Secure Online Desktop (SOD) service are always online, if one server were to have problems, this would be immediately replaced by another to guarantee the continuity of the virtual machine service.

Create the Cloud Server in a few clicks

It is possible to set up a VPS in a few steps by accessing the management panel. From this you can create and delete servers, as well as manage the resources allocated to the single virtual machine.

Payment is limited to the time of use of the service, without any contractual obligation. It is possible to stop the service at any time without any problems or additional costs.

Through the functionalities offered, it is possible to manage the created virtual machines in an extremely flexible way. The cost will always be linked to the actual resources used.

Resources automatically assigned

The Secure Online Desktop Cloud Server service allows you to set autoscaling rules for each virtual machine involved. Through this feature, it is possible to resize RAM memory, CPU and storage resources automatically, respecting customizable rules.

Resources are not wasted by avoiding that you pay for unused computing power or memory. This intelligent use of resources is managed by customizable rules for scalability.

For example: a rule could force the RAM memory to increase by 1024 Mb if the virtual machine uses more than 90% of it for a period longer than 10 minutes. You can also further limit this parameter to a maximum increase of 5 Gb within 24 hours.

Keep in mind that once RAM, CPU and disk have increased through this system, they will not automatically decrease thereafter. If the greatest demand for resources had been only a momentary peak, it will be necessary to set the starting parameters of the VPS again.

In addition, some operating systems offered as templates allow the resizing of RAM and CPU resources without restarting the machine. The reboot is however necessary in the case of resizing the storage disk or if the added RAM memory exceeds 16 Gb.

Virtual Machine backup system

SOD’s Cloud Server service also offers an automatic backup system. No additional backup management software, therefore, that can be set with four restore points: daily, weekly, monthly and yearly.

Note that the data of the machines created remain in your possession and can be downloaded locally at any time.

Virtual machine that can be managed from any device anywhere in the world

Operating systems included in the offer

SOD’s Cloud Server plans include operating system templates ready to be installed on the virtual machine. Numerous operating systems are available Windows, Linux and FreeBSD, 32bit as well as 64bit. In a few clicks it is possible to activate a VM, install an operating system and switch it on.

In addition to operating systems, it is also possible to have access to a JumpBox library of Open Source web applications. The offer of software available for VPS is really rich and accessible wherever you are.

No license fees for operating systems available, it’s all included in the cost of the service.

Firewall and security

With the Cloud Server of the Secure Online Desktop, a firewall is available included in the price, customizable with any rule based on the specific needs of the customer and the specific use to be made of the machine.

You won’t have to worry about anything in the security field. SOD will take care of guaranteeing always safe and robust infrastructures.

In terms of reliability, the Server Cloud service has enterprise architectures for managing redundancy. If one server turns out to be unreachable, another will take over immediately, guaranteeing the continuity of the service.

Offer and prices

There are four plans available for the Cloud Server service and can satisfy every VPS need. The costs are monthly without any time constraint, therefore it is possible to completely stop the service from one month to the next.

It is possible to take advantage of all these features through the control panel accessible from every platform: Apple, Windows and mobile. Manage your VPS in complete freedom from any device.

Create and manage your virtual server in minutes with SOD Cloud Server. You can also try the service for free for a day!

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • Backdoor.Win32.Delf.eg / Unauthenticated Remote Command Execution October 3, 2022
    Posted by malvuln on Oct 03Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/de6220a8e8fcbbee9763fb10e0ca23d7.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Delf.eg Vulnerability: Unauthenticated Remote Command Execution Description: The malware listens on TCP port 7401. Third-party adversarys who can reach infected systems can issue commands made available by the...
  • Backdoor.Win32.NTRC / Weak Hardcoded Credentials October 3, 2022
    Posted by malvuln on Oct 03Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/273fd3f33279cc9c0378a49cf63d7a06.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.NTRC Vulnerability: Weak Hardcoded Credentials Family: NTRC Type: PE32 MD5: 273fd3f33279cc9c0378a49cf63d7a06 Vuln ID: MVID-2022-0646 Disclosure: 10/02/2022 Description: The malware listens on TCP port 6767....
  • Wordpress plugin - WPvivid Backup - CVE-2022-2863. October 3, 2022
    Posted by Rodolfo Tavares via Fulldisclosure on Oct 03=====[ Tempest Security Intelligence - ADV-15/2022 ]========================== Wordpress plugin - WPvivid Backup - Version < 0.9.76 Author: Rodolfo Tavares Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents]================================================== * Overview * Detailed description * Timeline of disclosure * Thanks & Acknowledgements * References =====[ […]
  • ZKBioSecurity 3.0.5- Privilege Escalation to Admin (CVE-2022-36634) October 1, 2022
    Posted by Caio B on Sep 30#######################ADVISORY INFORMATION####################### Product: ZKSecurity BIO Vendor: ZKTeco Version Affected: 3.0.5.0_R CVE: CVE-2022-36634 Vulnerability: User privilege escalation #######################CREDIT####################### This vulnerability was discovered and researched by Caio Burgardt and Silton Santos. #######################INTRODUCTION####################### Based on the hybrid biometric technology and...
  • ZKBiosecurity - Authenticated SQL Injection resulting in RCE (CVE-2022-36635) October 1, 2022
    Posted by Caio B on Sep 30#######################ADVISORY INFORMATION####################### Product: ZKSecurity BIO Vendor: ZKTeco ( https://www.zkteco.com/en/ZKBiosecurity/ZKBioSecurity_V5000_4.1.2) Version Affected: 4.1.2 CVE: CVE-2022-36635 Vulnerability: SQL Injection (with a plus: RCE) #######################CREDIT####################### This vulnerability was discovered and researched by Caio Burgardt and Silton Santos....
  • Backdoor.Win32.Augudor.b / Remote File Write Code Execution September 27, 2022
    Posted by malvuln on Sep 27Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/94ccd337cbdd4efbbcc0a6c888abb87d.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Augudor.b Vulnerability: Remote File Write Code Execution Description: The malware drops an empty file named "zy.exe" and listens on TCP port 810. Third-party adversaries who can reach the infected […]
  • Backdoor.Win32.Psychward.b / Weak Hardcoded Credentials September 27, 2022
    Posted by malvuln on Sep 27Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/0b8cf90ab9820cb3fcb7f1d1b45e4e57.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Psychward.b Vulnerability: Weak Hardcoded Credentials Description: The malware listens on TCP port 8888 and requires authentication. However, the password "4174" is weak and hardcoded in cleartext within the PE...
  • Backdoor.Win32.Bingle.b / Weak Hardcoded Credentials September 27, 2022
    Posted by malvuln on Sep 27Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/eacaa12336f50f1c395663fba92a4d32.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bingle.b Vulnerability: Weak Hardcoded Credentials Description: The malware is packed using ASPack 2.11, listens on TCP port 22 and requires authentication. However, the password "let me in" is weak […]
  • SEC Consult SA-20220923-0 :: Multiple Memory Corruption Vulnerabilities in COVESA (Connected Vehicle Systems Alliance) DLT daemon September 27, 2022
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Sep 27SEC Consult Vulnerability Lab Security Advisory < 20220923-0 > ======================================================================= title: Multiple Memory Corruption Vulnerabilities product: COVESA DLT daemon (Diagnostic Log and Trace) Connected Vehicle Systems Alliance (COVESA), formerly GENIVI vulnerable version:
  • Backdoor.Win32.Hellza.120 / Authentication Bypass September 20, 2022
    Posted by malvuln on Sep 19Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/2cbd0fcf4d5fd5fb6c8014390efb0b21_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hellza.120 Vulnerability: Authentication Bypass Description: The malware listens on TCP ports 12122, 21. Third-party adversarys who can reach infected systems can logon using any username/password combination....

Customers

Newsletter