Security
Services

In demand like never before - SECURITY! Cyberattacks pose major challenges for IT infrastructures Hchallenges. We close the gaps and live the "Zero Trust Strategy".

Zero Trust Architecture

The zero trust model is a security concept based on the principle of not trusting any device, user or service inside or outside one's own network. It requires extensive measures to authenticate all users and services and to audit network traffic.

Secure Access Service Edge (SASE)

As the number of remote workers grows and enterprises increasingly use cloud services to run applications, offers Secure Access Service Edge (SASE) a convenient, agile, cost-effective and scalable SaaS product for networking and security. SASE describes a cloud architecture model that integrates network and securityas-a-Service functions and delivers them as a common cloud service. SASE enables organizations to unify their networking and security tools into a single management console. This provides a simple security and networking tool that is independent of where employees and resources are located. SASE requires little to no on-premises hardware and leverages the widespread connectivity of cloud technology to combine SD-WAN with network security capabilities, including:

Firewalls as a Service (FaaS)

Software as a Service (SaaS)

Secure Web Gateways (SWG)

Cloud Access Security Broker (CASB)

Zero Trust Network Access

Endpoint Detection & Response (EDR)

Detect security incidents early and respond to them quickly and effectively? - the right EDR solution makes this possible.

Cybercriminals act quietly, stealthily, and strike unexpectedly. Security measures help you increase the attacker's effort, but rarely actually stop them. That's why it's especially important to be able to detect attacks quickly and respond to them even faster.

Securing your endpoints - PCs, laptops, mobile devices, but also servers and multifunction devices in your corporate network - plays a special role here. These endpoints are the central interface between users and information technology within your company.

Therefore counts Endpoint-security is one of the biggest challenges!

Here is a brief overview

1

Endpoint Detection & Response (EDR) records all events on endpoints (user logins, opening files, registry accesses, memory accesses...).

2

This data is then stored either on the devices or in a central database and combined with the help of other databases to create vulnerabilities and cyber threats.

3

Behavioral analysis techniques are used to examine this data for signs of possible intrusion by unauthorized persons or unauthorized activity by internal perpetrators.

4

Now the "response" component of the EDR comes into play and allows to react quickly, purposefully and appropriately in order to minimize the damage of the attack.

Together we will find the optimal EDR solution for you to protect your sensitive data effectively and efficiently.

Managed Firewall Services

The entrance door to your company belongs in the hands of security specialists. With our Managed Firewall Services, you receive an all-round service based on a defined security strategy tailored to your needs. We use Next Generation Firewalls (NGFWs) for our Managed Firewall Services. NGFWs filter network traffic to protect a company from internal and external threats. In addition to all the features of a traditional stateful inspection firewall, NGFWs provide more comprehensive capabilities for more thorough content inspection. These NGFW capabilities can identify and block attacks, malware and other threats. With an NGFW, your organization gains critical security capabilities such as SSL inspection, application control, and intrusion prevention, as well as advanced visibility across the attack surface.

These new security features are a must today - for several reasons: Innovations such as co-locations and multi-clouds bring not only benefits, but also new threats, exacerbating the threat landscape in ever shorter timeframes. At the same time, companies need to grow to meet increasing customer demands. Traditional firewalls can no longer effectively secure this expanded attack surface, degrading the user experience with agonizingly slow network connections and thus weakening the security profile of the entire enterprise. NGFWs, on the other hand, not only block malware, but are also inherently designed for easy updates. They can be flexibly adapted to the threat situation, so that your network is also securely protected against new threats. Next Generation Firewalls are an essential component for implementing meaningful network security.

Cyber Protect Cloud

Cyber Protect Cloud extends classic data backup with an intelligent security solution for your data environment. It also protects against viruses, ransomware, malware, cyber attacks and data loss. This protection solution supports over 20 platforms, reducing the complexity of your IT infrastructure.

Cyber Protect Cloud provides you with high flexibility and transparency: You can adapt the functions exactly to the environment and workloads and only pay for the services you receive in the respective month.

Your backups are stored in a Green Datacenter in Switzerland, according to certified security standards and under Swiss jurisdiction.

Security protection against attacks

Protection through latest AI solution

Antivirus and anti-malware/ransomware

Correction of security gaps through patch management

Vulnerability Assessment

Backup and restore

File and image backup of workstations, virtual machines and servers

Disaster Recovery

Storage locally or in the cloud

Cyber Protection

Management of backups in groups

Dashboards and reports

Centralized management for user-friendly, intuitive administration

We accompany you from the initial requirements analysis to the transition to daily operations.
Our team supports you in planning, procurement and implementation even under the most difficult conditions.

Kurt Balanica

CEO (Chief Executive Officer) 

Scroll to Top

Contact us