Better safe than sorry
Anyone who has been providing infrastructures for over 11 years knows the complex challenges in secure IT operations. During this time, we have found and developed a range of measures that we use to protect against external attacks, to keep applications available, and to support our customers in meeting compliance requirements.
Data Centers and Fiberoptics “Made in Germany”
Our company and our data centers are located in Germany – which means that German law and strict data protection regulations apply to us – especially regarding the General Data Protection Regulation (GDPR). Data stored by us will not be passed on to third parties without an explicit agreement.
In Berlin, we also operate our own fail-safe fiber ring with over 400 Gbit/s capacity, which leads directly to our two data centers and is connected to the most important nodes, including the DE-CIX exchange node. This gives us greater stability and security for all connections and provides more protection against DDoS attacks.
ISO 27001 certification
In order to meet the high demands on information security, we regularly undergo independent audits: The management of our information security is certified according to ISO 27001 native. The certification not only applies to the data centers, but also to infrastructure components (i.e. server, storage, and network components), buildings, and administration environments in which the platform (in this case: our managed hosting platform) is operated.
Comprehensive measures for IT security against external attacks
We implement secure, exclusive access to the instances of your setup in detail through a VPN, with which applications such as external exchange tools and ERP systems can be connected. The availability of the VPN tunnels can be monitored.
We have a catalog of measures to prevent and avert DDoS attacks: With a fast reaction time, our system recognizes the vectors of an attack and fends them off. Our Web Application Firewall complements our DDoS protection and also detects attacks in the form of brute force, SQL injection, cookie poisoning, or session hijacking.
Security through availability of resources and data
Secure operations require services and applications to be accessible at all times. Redundancies at various levels provide a high level of reliability. This is made possible and implemented by two geographically separate data centers, which are connected through our redundant fiberoptic ring: They are the basis for highly available, distributed setups. We also distribute backups across the data centers to eliminate the risk of data loss.
Let's get in touch
What security challenges can we solve for you? Please do not hesitate get in touch with us: We would love to hear about your project and are there to support you with our security measures.