Our comprehensive security concept
In addition to our cloud solutions, we offer comprehensive services relating to security and cybersecurity. Because the volume and intensity of criminal activity on the internet is steadily rising. This in turn increases a company’s risk of suffering financial and image losses as a result of DDoS attacks, hacking or data theft. Our solutions keep you on the safe side.
We manage your cybersecurity
For us, the managed cloud means that we do more than just provide you with infrastructure. We want your business-critical processes to be available at all times with high performance levels, and for your valuable data to always be well protected. This is why our security concept considers both our internal controls and procedures, as well as all security services for our customers.
As part of plussecurity, we support you in:
Effectively avoiding unintentional data loss or information leaks
Minimising the risk of deliberate attacks
Monitoring your entire data flow as well as access to the data and applications
Protecting your systems from excessive and harmful traffic
Your tool to combat vulnerabilities
The more your business model relies on digital applications, the more important it is to protect your data and applications from access, theft and manipulation by third parties. Identifying weak points is crucial in this endeavour. Potential weak points include open ports, expired certificates, failed updates or incorrect configurations. The Vulnerability Scanner checks the security of your IP-based network systems using authenticated and unauthenticated scans with variable test depths from an attacker’s perspective.
The Vulnerability Scanner uses various scans to check the weak points of your infrastructure.
Modern dashboard with clear graphics
In the dashboard, the results of the scans are summarised in a clear, graphic way on the web-based graphical user interface. The current processing status of the scans and the degree of severity of security holes found can be read off at a glance. The dashboard display can be customised.
Detailed reports keep you on the safe side
The clear reports show any weak points found, offers suggestions for solving these issues and prioritises the security messages according to their urgency. Upon request, we will automatically email you the test report from your scans.
All the services of the Vulnerability Scanner at a glance:
Unlimited number of scans per month
Full access rights for individual scans
Scanning of complete network environments
Check of all applications and services
Automatic update of the test routines (NVTs)
Extensive test report with clear classification
The latest version of the leading OpenVAS framework
Use cloud security to effectively protect your valuable data and applications. Our team will be happy to advise you on finding the right solution for your application. Nik Schmidt, Alliance Manager
our solutions for your data security
Web Application Protector (WAP)
Fully automated WAF and DDoS protection
Kona Site Defender (KSD)
WAF and DDoS protection for the highest demands
Bot Manager Standard
and manage bots
Bot Manager Premier
Stop misuse of credentials
Even more security and faster data
Accelerate the global delivery of your data with a Content Delivery Network (CDN). It also increases your protection against DDoS attacks, as they are distributed across various nodes rather than burdening a single environment.
Together with Akamai, one of the leading providers of website performance solutions, we provide a CDN product for challenging projects. The Akamai platform is just one network hop away from 90 percent of the world’s internet users. With more than 200,000 servers in over 3,300 locations in 122 countries, Akamai brings you closer to your end users, wherever they are. This helps us to deliver your content more quickly, enable closer collaboration between your employees and improve the performance of your business applications.
Downtime cost simulator
What is the cost of downtime for your company?
Do you know how much the temporary failure of your infrastructure could actually cost you? Simply enter a few figures and see how an attack on your infrastructure would affect you financially.