Better safe than sorry
Anyone who has been providing infrastructures for more than 11 years knows the complex challenges for secure IT operations. During this time, we have found and developed a range of measures that we use to protect against external attacks, to keep applications available and to support our customers in meeting compliance requirements.
Data Centers and Fiber Optics “Made in Germany”
Our company and our data centers are located in Germany – which means that German law and strict data protection regulations apply to us – especially in view of the General Data Protection Regulation (GDPR). Data stored by us will not be passed on to third parties without an appropriate agreement.
In Berlin we also operate our own fail-safe fiber ring with over 400 Gbit capacity, which leads directly to our two data centers and is connected to the most important nodes, including the DE-CIX exchange node. This gives us greater stability and security for the connections and enables more protection against DDoS attacks.
ISO 27001 certification
In order to meet the high demands on information security, we regularly undergo independent audits: The management of our information security is certified according to ISO 27001 native and according to ISO 27001 pursuant to the IT baseline protection by the Federal Office for Information Security (BSI). The certifications do not only apply to the data centers, but also to infrastructure components (i.e. server, storage and network components), buildings and administration environments in which the platform (in this case: our managed hosting platform) is operated.
Comprehensive measures for IT security against external attacks
We implement secure, exclusive access to the instances of your setup in detail via a VPN, with which applications such as external exchange tools and ERP systems can be connected. The availability of the VPN tunnels can be monitored.
We have a catalogue of measures to prevent and avert DDoS attacks: With a fast reaction time, our system recognizes the vectors of an attack and fends them off. Our Web Application Firewall complements our DDoS protection and also detects attacks in the form of brute force, SQL injection, cookie poisoning or session hijacking.
Security through availability of resources and data
Secure operations require services and applications to be accessible at all times. Redundancies at various levels provide a high level of reliability. This is made possible and implemented by two geographically separate data centers, which are connected via our redundant fiber optic ring: They are the basis for highly available, distributed setups. We also distribute backups across the data centers to eliminate the risk of data loss.
Get in touch with us
What security challenges can we solve for you? Please do not hesitate to contact us: We are curious about your project and support you with our security measures.