With aspectra, your application is powerful and highly available. Redundant systems take over in the case of failures. We protect your application against attacks physically and in the network.
The aspectra engineers design an appropriate IT environment for every application. The architecture is developed in the solution workshop. We then set up your environment in phases – with you accepting each individual phase.
We guarantee highly available operation for business-critical applications. For this purpose, we offer dedicated systems, redundant architectures and load balancers. Not to mention a systems engineer as a personal contact for each customer.
Whether dedicated physical or virtual servers, dedicated private cloud, Amazon Web Services or containers with OpenShift and Kubernetes: We adapt the infrastructure to your requirements until it fits like a glove.
On-premise DDoS mitigation, Web Application Firewalls (WAF), Identity and Access Management (IAM), regular vulnerability scans, server- and host-based intrusion detection systems and reliable backup solutions guarantee the security of your data and applications.
A dedicated contact person is available to assist you during operation. Backed by a comprehensive monitoring system that tracks all relevant parameters and alerts you in the event of deviations, we reduce the workload on your employees and help to save costs.
Secure, uninterrupted connections with the highest bandwidth to the Internet and uninterrupted service provision guarantee the performance and availability of your applications.
Since being founded in 2000, aspectra has been a leader in the operation of business-critical applications. We set great store by direct contact, providing aspectra customers with personal contact persons.
We are a well-coordinated team made up of systems engineers, developers, apprentices, project managers and service providers.
Our partners in the fields of technology and services are experienced specialists in their fields. Our collaboration has stood the test of time.
With integrated cyber security solutions and Cyber Risk Resilience® Services, the CymbiQ Group - consisting of Anovis, aspectra, ISPIN and KOCH-IT - creates new synergies and strengthens the European IT security market.
aspectra operates business-critical systems for banks, e-business providers, public authorities, online shops and many other organisations.
The world's largest technology companies turned into surveillance brokers for U.S. authorities.
How aspectra is colaboratinging with Akamai to provide a sophisticated mitigation solution against the increasing DDoS attacks, what the prime benefits of the latest Airlock WAF and IAM updates are, and why we are inviting our customers to join us in a world of games.
The Bavarian DPA has banned the use of Mailchimp, the ECJ has ruled that the USA fails to provide an adequate level of protection and the Swiss Federal Data Protection Commissioner calls the USA an "unsafe third country". Microsoft is planning an EU Data Boundary for the MS Cloud. US clouds offer services from Switzerland. Are Swiss companies allowed to store personal data in US clouds or not?
A new generation of firewalls has been in operation at aspectra since July. With the powerful Next Generation Firewalls from Fortinet we have further strengthened our first line of defense. All our customers benefit from this.
A study by the Ponemon Institute concludes that data in the cloud is insufficiently protected. This is not because the clouds do not offer appropriate protection. The problem is that they are not being implemented by customers.
Akamai is one of the hidden champions of the Internet. At any given time, a large part of the world's Internet traffic flows through their networks. But what are the services offered by Akamai and why is aspectra an Akamai partner?
DDoS mitigation solution against new and evolving threats stops attacks already in front of our firewalls and front routers.
Many web servers still support the encryption protocols TLS 1.0 and TLS 1.1, although all standard browsers have long been compatible with TLS 1.2. How do you exclude legacy TLS standards on the server side and what should you pay attention to?
Recently, a new DDoS record was set at 1.7 terabits per second. The attack took advantage of incorrectly configured memcached servers as reflectors. How can you protect yourself from such an attack?
The use of web application firewalls is becoming standard. However, costs and complexity still pose an obstacle for many projects - unless you use them as a service.
Increasing security requirements in day-to-day online activities can be a real hassle for today's creatures of habit and are known to spoil the digital experience. Risk-based authentication is a way to make life easier without taking major risks.
When operating e-health projects, tasks and responsibilities must be clearly separated. The most important learnings from Aspectra's collaboration with e-health providers.