With aspectra, your application is powerful and highly available. Redundant systems take over in the case of failures. We protect your application against attacks physically and in the network.
The aspectra engineers design an appropriate IT environment for every application. The architecture is developed in the solution workshop. We then set up your environment in phases – with you accepting each individual phase.
We guarantee highly available operation for business-critical applications. For this purpose, we offer dedicated systems, redundant architectures and load balancers. Not to mention a systems engineer as a personal contact for each customer.
Whether dedicated physical or virtual servers, dedicated private cloud, Amazon Web Services or containers with OpenShift and Kubernetes: We adapt the infrastructure to your requirements until it fits like a glove.
On-premise DDoS mitigation, Web Application Firewalls (WAF), Identity and Access Management (IAM), regular vulnerability scans, server- and host-based intrusion detection systems and reliable backup solutions guarantee the security of your data and applications.
A dedicated contact person is available to assist you during operation. Backed by a comprehensive monitoring system that tracks all relevant parameters and alerts you in the event of deviations, we reduce the workload on your employees and help to save costs.
Secure, uninterrupted connections with the highest bandwidth to the Internet and uninterrupted service provision guarantee the performance and availability of your applications.
Since being founded in 2000, aspectra has been a leader in the operation of business-critical applications. We set great store by direct contact, providing aspectra customers with personal contact persons.
We are a well-coordinated team made up of systems engineers, developers, apprentices, project managers and service providers.
Our partners in the fields of technology and services are experienced specialists in their fields. Our collaboration has stood the test of time.
With integrated cyber security solutions and Cyber Risk Resilience® Services, the CymbiQ Group - consisting of Anovis, aspectra, ISPIN and KOCH-IT - creates new synergies and strengthens the European IT security market.
aspectra operates business-critical systems for banks, e-business providers, public authorities, online shops and many other organisations.
Keys and certificates are used routinely and widely in IT environments to secure the transmission and encryption of data. In order to manage the multitude of keys and certificates efficiently, a central key management system (KMS) is essential.
Why Managed OpenShift is as versatile as a Swiss Army knife, how our team has grown recently and what has been going on in our customer portfolio.
Secure data transmission and the protection of privacy are fundamental factors for a safe Internet. We at aspectra are also committed to these values and practice them, thorough our services, on a daily basis. A donation to Let's Encrypt was therefore only natural.
Whether food, refrigerators or cars: Certifications and labels attest that the products are eco-friendly, safe or "fair". Such attributes, in particular those pertaining to security, are also relevant for the IT. So what are the implications for the financial sector?
Judith Hirschi / Interxion
You may well have already come across the term "Tier" in connection with data centres. Now one might ask oneself, what is meant by this? In data center geek-speak it quite simply stands for "category of performance".
Since 2011 aspectra has undergone annual information security audits by KPMG. The 2017 audit demonstrated for the seventh time in a row that our processes and services meet the highest standards.
Many web servers still support the encryption protocols TLS 1.0 and TLS 1.1, although all standard browsers have long been compatible with TLS 1.2. How do you exclude legacy TLS standards on the server side and what should you pay attention to?
On 25 May 2018, the EU's new General Data Protection Regulation (GDPR) comes into force. All organisations with customers or members in the EU are affected. Failure to comply will result in fines running into the millions. Does ISO 27001 certification of the hosting services provider automatically ensure GDPR compliance?