Anniversario aziendale Giacomo Lanzi

Secure Online Desktop 10 years later: our corporate anniversary

Ten years ago, on June 16, 2011, Secure Online Desktop was born. Many things have changed in ten years and we have always done our best to keep up with the times and offer cutting-edge solutions to our customers. We want to celebrate our company anniversary by retracing the key milestones of these years by sharing them with you.

The products offered today are focused on corporate security and decentralization of services, but that wasn’t always the case. Originally our services were limited and only with the experience in the field have we been able to improve and grow the offer, meeting the needs of our customers.

Corporate anniversary

The origins

The first service offered, which also gave our company its name, was a secure desktop online that brought the customer remote computing power , easy to use and definitely user friendly . The decentralization of machines and computing , the underlying concept of cluod computing , was still under development in 2011 and certainly not as far-reaching as it is today. The large international companies in the sector had recently ventured into offering this type of service. In fact, Microsoft Azure entered the market in 2010 and Amazon’s AWS was born in 2006.

Things have changed a lot since then, of course. In ten years of technological growth, services have improved, been consolidated and new ones have been born. We at SOD, on the day of our company anniversary, can say that we have done everything possible to always keep up with the times.

SOD’s services on the company’s 10th anniversary

The services offered today are varied and well structured. A high standard of security has been maintained as an added value. The nature of the services is always based on Cloud Computing , but includes much more than just a simple remote desktop.

Today’s services range from virtualized applications , Cloud Server , data storage space and hosting , but also complete infrastructures in the Cloud.

All products are scalable, which allow the optimization of the customer’s economic resources. A SaaS (Software as a Service) delivery model is used which allows easy customization and high scalability.

On the 10th anniversary of the company, Secure Online Desktop is an Italian company still growing, a cloud provider with excellent quality services, whose values are cyber security and customer care.

Turnkey projects

What we offer are solutions and not just services. This means that the services provided are highly customizable and we are able to generate ad hoc solutions for every company and every need.

We like to be tested, so we “challenge” our customers to submit specific situations and problems to us and then offer tailored solutions that always leave the final customer and his employees satisfied.

SOD in the market

We can’t deny that competing with giants like Amazon or Microsoft, to name just the best known, isn’t easy at all. However, what sets us apart is the customer care and the attention we put into offering our services .

By necessity, for big companies , having tens of thousands of customers can only lower the level of personalization of the service provided. Inevitably, this leads some customers to be dissatisfied with the service.

We, on the other hand, who are a much smaller international company, can invest more time in assistance and product customization operations. The result is always satisfied customers, perfect services in every detail and constant growth in the number of customers. As an added value, we engage in constant research to improve and expand our range of services offered.

We are extremely satisfied with the results achieved over the past ten years, and we say it with some satisfaction on our company anniversary.

Our most recent social initiatives

Furthermore, we must not forget that over time we have also got involved in the social sphere. In the last year alone, two new initiatives have been promoted to help entrepreneurs and companies in difficulty following the outbreak of the COVID-19 pandemic.

We offered a free Cloud Storage service ( ownCloud ) to support companies in introducing a telecommuting plan for their employees. In addition, we have long supported Folding @ Home , a distributed computing project aimed at simulating protein dynamics , in particular the folding process. Through the use of software made available, it is possible to offer the computing power of a computer as an active resource for research. & nbsp;

The Folding @ Home initiative helped research against COVID-19 by focusing the computational power offered by the participants on virus analysis.

We haven’t pulled back even as regards the realities of our territory, which we regularly support. For example, Civil Protection of Albinea uses our web hosting and online presence management services under the title free. Furthermore, we actively help the association AGiReCoN ( Associazione Giovani Reggiani Against Cancer ) with IT support and in the development of apps to facilitate doctor / patient communication.

Agirecon

The evolution of our services

As I mentioned before, many services have been added to the first Online Desktop offering, but I want to celebrate this day in a complete way by offering a chronological overview of the major services offered.

2011

Cloud Desktop, Vulnerability Assessment & amp; Penetration Test , Physical Security , Cloud CRM , ICT Consulting

2012

IaaS Cloud Server, SuperCloud, ownCloud, WebHosting

2013

Cloud Conference, Cloud Backup, Log Management

2014

ICT Monitoring Service, Mobile app penetration test and code review

2019

Business VPN, Ethical Phising, Acronis Cyber Protect Cloud

2020

Procedural secuirty analisys, SOCaaS, Cyber Threat Intelligence

We work on our services to always offer the best for our customers.

These first 10 years of business have been exciting and have brought many exciting challenges. We want to continue at this pace to improve and always offer the best IT services for our customers!

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • [REVIVE-SA-2026-001] Revive Adserver Vulnerabilities January 15, 2026
    Posted by Matteo Beccati on Jan 14======================================================================== Revive Adserver Security Advisory REVIVE-SA-2026-001 ------------------------------------------------------------------------ https://www.revive-adserver.com/security/revive-sa-2026-001 ------------------------------------------------------------------------ Date: 2026-01-14 Risk Level: High Applications affected: Revive...
  • Defense in depth -- the Microsoft way (part 95): the (shared) "Start Menu" is dispensable January 11, 2026
    Posted by Stefan Kanthak via Fulldisclosure on Jan 10Hi @ll, the following is a condensed form of and . Windows Vista moved the shared start menu from "%ALLUSERSPROFILE%\Start Menu\" to "%ProgramData%\Microsoft\Windows\Start Menu\", with some shortcuts (*.lnk) "reflected" from the (immutable) component store below %SystemRoot%\WinSxS\ JFTR:...
  • Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) January 11, 2026
    Posted by Art Manion via Fulldisclosure on Jan 10Hi, CVE IDs *can* be assigned for SaaS or similarly "cloud only" software. For a period of time, there was a restriction that only the provider could make or request such an assignment. But the current CVE rules remove this restriction: 4.2.3 CNAs MUST NOT consider the […]
  • RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser January 11, 2026
    Posted by Ron E on Jan 10A stack-based buffer overflow vulnerability exists in the RIOT OS ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer (serial->frame) without verifying that the current write index […]
  • RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction January 11, 2026
    Posted by Ron E on Jan 10A stack-based buffer overflow vulnerability exists in the tapslip6 utility distributed with RIOT OS (and derived from the legacy uIP/Contiki networking tools). The vulnerability is caused by unsafe string concatenation in the devopen() function, which constructs a device path using unbounded user-controlled input. Specifically, tapslip6 uses strcpy() and strcat() […]
  • TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio January 11, 2026
    Posted by Ron E on Jan 10A stack-based buffer overflow vulnerability exists in the mcp2200gpio utility due to unsafe use of strcpy() and strcat() when constructing device paths during automatic device discovery. A local attacker can trigger the vulnerability by creating a specially crafted filename under /dev/usb/, resulting in stack memory corruption and a process […]
  • TinyOS 2.1.2 printfUART Global Buffer Overflow via Unbounded Format Expansion January 11, 2026
    Posted by Ron E on Jan 10A global buffer overflow vulnerability exists in the TinyOS printfUART implementation used within the ZigBee / IEEE 802.15.4 networking stack. The issue arises from an unsafe custom sprintf() routine that performs unbounded string concatenation using strcat() into a fixed-size global buffer. The global buffer debugbuf, defined with a size […]
  • KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking January 8, 2026
    Posted by KoreLogic Disclosures via Fulldisclosure on Jan 08KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking Title: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking Advisory ID: KL-001-2026-001 Publication Date: 2026-01-08 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2026-001.txt 1. Vulnerability Details      Affected Vendor: yintibao      Affected Product: Fun Print Mobile      Affected […]
  • Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) January 6, 2026
    Posted by Yuffie Kisaragi via Fulldisclosure on Jan 05UPDATE: Following the publication of these vulnerabilities and the subsequent CVE assignments, the CVE identifiers have now been revoked. The vendor (EQS Group) contacted the CVE Program (via a CNA) and disputed the records, stating that the affected product is an exclusively hosted SaaS platform with no customer-managed […]
  • Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure January 6, 2026
    Posted by Ron E on Jan 05Panda3D’s egg-mkfont utility contains an uncontrolled format string vulnerability that allows disclosure of stack-resident memory. The -gp (glyph pattern) command-line option allows users to specify a formatting pattern intended for generating glyph texture filenames. This pattern is passed directly as the format string to sprintf() without validation or sanitization. […]

Customers

Newsletter

{subscription_form_1}