Secure IT Operations

Better safe than sorry

Anyone who has been providing infrastructures for over 11 years knows the complex challenges in secure IT operations. During this time, we have found and developed a range of measures that we use to protect against external attacks, to keep applications available, and to support our customers in meeting compliance requirements.

Security symbol green
ScalingIcons_Fresh_Green-150x150

Data Centers and Fiberoptics “Made in Germany”

Our company and our data centers are located in Germany – which means that German law and strict data protection regulations apply to us – especially regarding the General Data Protection Regulation (GDPR). Data stored by us will not be passed on to third parties without an explicit agreement.

In Berlin, we also operate our own fail-safe fiber ring with over 500 Gbit/s capacity, which leads directly to our two data centers and is connected to the most important nodes, including the DE-CIX exchange node. This gives us greater stability and security for all connections and provides more protection against DDoS attacks.

SecureContainersIcons_Fresh_Green

Comprehensive measures for IT security against external attacks

We implement secure, exclusive access to the instances of your setup in detail through a VPN, with which applications such as external exchange tools and ERP systems can be connected. The availability of the VPN tunnels can be monitored.

We have a catalog of measures to prevent and avert DDoS attacks: With a fast reaction time, our system recognizes the vectors of an attack and fends them off. Our Web Application Firewall complements our DDoS protection and also detects attacks in the form of brute force, SQL injection, cookie poisoning, or session hijacking.

SecureWebSitesIcons_Fresh_Green-1

Security through
availability of resources and data

Secure operations require services and applications to be accessible at all times. Redundancies at various levels provide a high level of reliability. This is made possible and implemented by two geographically separate data centers, which are connected through our redundant fiberoptic ring: They are the basis for highly available, distributed setups. We also distribute backups across the data centers to eliminate the risk of data loss.

Let's get in touch

What security challenges can we solve for you? Please do not hesitate get in touch with us: We would love to hear about your project and are there to support you with our security measures.