With aspectra, your application is powerful and highly available. Redundant systems take over in the case of failures. We protect your application against attacks physically and in the network.
The aspectra engineers design an appropriate IT environment for every application. The architecture is developed in the solution workshop. We then set up your environment in phases – with you accepting each individual phase.
We guarantee highly available operation for business-critical applications. For this purpose, we offer dedicated systems, redundant architectures and load balancers. Not to mention a systems engineer as a personal contact for each customer.
Whether dedicated physical or virtual servers, dedicated private cloud, Amazon Web Services or containers with OpenShift and Kubernetes: We adapt the infrastructure to your requirements until it fits like a glove.
On-premise DDoS mitigation, Web Application Firewalls (WAF), Identity and Access Management (IAM), regular vulnerability scans, server- and host-based intrusion detection systems and reliable backup solutions guarantee the security of your data and applications.
A dedicated contact person is available to assist you during operation. Backed by a comprehensive monitoring system that tracks all relevant parameters and alerts you in the event of deviations, we reduce the workload on your employees and help to save costs.
Secure, uninterrupted connections with the highest bandwidth to the Internet and uninterrupted service provision guarantee the performance and availability of your applications.
Since being founded in 2000, aspectra has been a leader in the operation of business-critical applications. We set great store by direct contact, providing aspectra customers with personal contact persons.
We are a well-coordinated team made up of systems engineers, developers, apprentices, project managers and service providers.
Our partners in the fields of technology and services are experienced specialists in their fields. Our collaboration has stood the test of time.
With integrated cyber security solutions and Cyber Risk Resilience® Services, the CymbiQ Group - consisting of Anovis, aspectra, ISPIN and KOCH-IT - creates new synergies and strengthens the European IT security market.
aspectra operates business-critical systems for banks, e-business providers, public authorities, online shops and many other organisations.
Following Infosecurity Europe in London, Roger Barranco, Vice President, Global Security Operations, Akamai Technologies, visited Switzerland. We had the chance to meet him and get answers to some of the most pertinent questions about the current state of cyber security, especially with regard to DDoS Attacks.
How aspectra protects secrets and why that is so important, about long-standing relationships and new tasks, and what we have planned for the summer of 2022, when we are not busy managing your IT services - all this and more, learn in this issue.
DDoS attacks continue to be popular with cyber criminals. Particularly in the wake of the Russian invasion of Ukraine, a significant increase in such attacks has been recorded. Good to know that defensive measures have been stepped up as well.
Aspectra relies on an open source analysis tool for web statistics: Matomo can be used GDPR-compliant and enables meaningful and accurate data collection.
We had the pleasure of welcoming the new apprentice Lauri Neuenschwander at aspectra on 3 August 2020.
Two years ago, the project "Tracking System" was launched with the aim of more quickly rescuing mountain hikers in distress and optimising the planning and execution of rescue operations with the support of modern technology. What has been achieved so far?
Until recently, the SSDs on the aspectra Shared ESX Farm were housed in the same storage as the HDD. The performance advantages of the SSD could therefore only be partially exploited. Thanks to the purchase of an all-flash array from Pure Storage, the IOPS could be significantly improved.
The physical RSA token has been increasingly replaced by the software token over the last few years. Hardware tokens as key rings or software tokens as apps on your smartphone? What are the pros and cons for the user?
Many web servers still support the encryption protocols TLS 1.0 and TLS 1.1, although all standard browsers have long been compatible with TLS 1.2. How do you exclude legacy TLS standards on the server side and what should you pay attention to?