Anyone who has been providing infrastructures for over 11 years knows the complex challenges in secure IT operations. During this time, we have found and developed a range of measures that we use to protect against external attacks, to keep applications available, and to support our customers in meeting compliance requirements.
Data Centers and Fiberoptics “Made in Germany”
Our company and our data centers are located in Germany – which means that German law and strict data protection regulations apply to us – especially regarding the General Data Protection Regulation (GDPR). Data stored by us will not be passed on to third parties without an explicit agreement.
In Berlin, we also operate our own fail-safe fiber ring with over 500 Gbit/s capacity, which leads directly to our two data centers and is connected to the most important nodes, including the DE-CIX exchange node. This gives us greater stability and security for all connections and provides more protection against DDoS attacks.
Security through availability of resources and data
Secure operations require services and applications to be accessible at all times. Redundancies at various levels provide a high level of reliability. This is made possible and implemented by two geographically separate data centers, which are connected through our redundant fiberoptic ring: They are the basis for highly available, distributed setups. We also distribute backups across the data centers to eliminate the risk of data loss.
Comprehensive measures for IT security against external attacks
We implement secure, exclusive access to the instances of your setup in detail through a VPN, with which applications such as external exchange tools and ERP systems can be connected. The availability of the VPN tunnels can be monitored.
We have a catalog of measures to prevent and avert DDoS attacks: With a fast reaction time, our system recognizes the vectors of an attack and fends them off. Our Web Application Firewall complements our DDoS protection and also detects attacks in the form of brute force, SQL injection, cookie poisoning, or session hijacking.
We are a proud member of
Get in touch
What security challenges can we solve for you? Please do not hesitate get in touch with us: We would love to hear about your project and are there to support you with our security measures.