Feeds

Another one bites the dust: AVG kills its remote access service

Borrows from LogMeIn playbook as all Crossloop accounts stop ... now!

Combat fraud and increase customer satisfaction

AVG has shut down its remote access service Crossloop.

The security company acquired Crossloop in 2012, to support what it says is a “ rapidly growing AVG CloudCare offering”. Despite the @crossloop Twitter account boasting it connected “ 20,000 computer support experts” AVG shuttered the service last Friday.

Users aren't happy because AVG seems to have offered no notice whatsoever: a document.lastModified query on the service's home page produces a date of January 31st, the same day the letter now resident on that page is dated.

That letter offers a helpful link to Crossfire's terms of service, which points out “CrossLoop may modify, suspend or discontinue the CrossLoop Services at any time, for any reason, in its sole discretion.”

Users aren't happy: the Tweets below are typical of responses to the closure, which some seem to say took place before advice about it was posted.

Full refunds are on offer for paid accounts.

AVG doesn't say why it's killing off Crossloop. Let's imagine that it simply wasn't turning a profit on the service.

Let's speculate, also, that perhaps the up-sell rate from the free service to the paid offering was lower than hoped-for.

Any minute now, someone's going to write an article arguing that the deaths of LogMeIn and Crossloop represent the moment the freemium software-as-a-service business business model was diagnosed with a terminal illness. This is not that article, but let's hope the hypothetical screed points out comparable remote access features are baked into major operating systems, making Crossloop and LogMeIn less-than-stellar examples of innovation that may not have had much of a chance of success whatever models they adopted. Let's also hope that article points out that cloud services cost actual money to run, and that without cash flowing in from paying customers even the small sums one can pay to rent a server these days may not be sustainable. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.