Our comprehensive security concept
In addition to our cloud solutions, we offer comprehensive services relating to security and cybersecurity. Because the volume and intensity of criminal activity on the internet is steadily rising. This in turn increases a company’s risk of suffering financial and image losses as a result of DDoS attacks, hacking or data theft. Our solutions keep you on the safe side.
We manage your cloud security
For us, the managed cloud means that we do more than just provide you with infrastructure. We want your business-critical processes to be available at all times with high performance levels, and for your valuable data to always be well protected. This is why our security concept considers both our internal controls and procedures, as well as all security services for our customers.
As part of plussecurity, we support you in:
Effectively avoiding unintentional data loss or information leaks
Minimising the risk of deliberate attacks
Monitoring your entire data flow as well as access to the data and applications
Protecting your systems from excessive and harmful traffic
Your tool to combat vulnerabilities
The more your business model relies on digital applications, the more important it is to protect your data and applications from access, theft and manipulation by third parties. Identifying weak points is crucial in this endeavour. Potential weak points include open ports, expired certificates, failed updates or incorrect configurations. The Vulnerability Scanner checks the security of your IP-based network systems using authenticated and unauthenticated scans with variable test depths from an attacker’s perspective.
Ein modernes Dashboard fasst die Ergebnisse der Scans in Form von übersichtlichen Grafiken zusammen. Der aktuelle Bearbeitungsstatus der Scans sowie die Schweregrade der entdeckten Sicherheitslücken lassen sich auf einen Blick ablesen. Zudem erhalten Sie einen ausführlichen und übersichtlichen Bericht mit den gefundenen Schwachstellen und Lösungsvorschlägen.
The Vulnerability Scanner uses various scans to check the weak points of your infrastructure.
All the services of the Vulnerability Scanner at a glance:
Unlimited number of scans per month
Full access rights for individual scans
Scanning of complete network environments
Check of all applications and services
Automatic update of the test routines (NVTs)
Extensive test report with clear classification
The latest version of the leading OpenVAS framework
Use cloud security to effectively protect your valuable data and applications. Our team will be happy to advise you on finding the right solution for your application. Nik Schmidt, Alliance Manager
our solutions for your data security
Web Application Protector (WAP)
Fully automated WAF and DDoS protection
Kona Site Defender (KSD)
WAF and DDoS protection for the highest demands
Bot Manager Standard
and manage bots
Bot Manager Premier
Stop misuse of credentials
CDN: Even more security and faster data
Accelerate the global delivery of your data with a Content Delivery Network (CDN). It also increases your protection against DDoS attacks, as they are distributed across various nodes rather than burdening a single environment.
Together with Akamai, one of the leading providers of website performance solutions, we provide a CDN product for challenging projects. The Akamai platform is just one network hop away from 90 percent of the world’s internet users. With more than 200,000 servers in over 3,300 locations in 122 countries, Akamai brings you closer to your end users, wherever they are. This helps us to deliver your content more quickly, enable closer collaboration between your employees and improve the performance of your business applications.
Downtime cost simulator
What is the cost of downtime for your company?
Do you know how much the temporary failure of your infrastructure could actually cost you? Simply enter a few figures and see how an attack on your infrastructure would affect you financially.