With aspectra, your application is powerful and highly available. Redundant systems take over in the case of failures. We protect your application against attacks physically and in the network.
The aspectra engineers design an appropriate IT environment for every application. The architecture is developed in the solution workshop. We then set up your environment in phases – with you accepting each individual phase.
We guarantee highly available operation for business-critical applications. For this purpose, we offer dedicated systems, redundant architectures and load balancers. Not to mention a systems engineer as a personal contact for each customer.
Whether dedicated physical or virtual servers, dedicated private cloud, Amazon Web Services or containers with OpenShift and Kubernetes: We adapt the infrastructure to your requirements until it fits like a glove.
On-premise DDoS mitigation, Web Application Firewalls (WAF), Identity and Access Management (IAM), regular vulnerability scans, server- and host-based intrusion detection systems and reliable backup solutions guarantee the security of your data and applications.
A dedicated contact person is available to assist you during operation. Backed by a comprehensive monitoring system that tracks all relevant parameters and alerts you in the event of deviations, we reduce the workload on your employees and help to save costs.
Secure, uninterrupted connections with the highest bandwidth to the Internet and uninterrupted service provision guarantee the performance and availability of your applications.
Since being founded in 2000, aspectra has been a leader in the operation of business-critical applications. We set great store by direct contact, providing aspectra customers with personal contact persons.
We are a well-coordinated team made up of systems engineers, developers, apprentices, project managers and service providers.
Our partners in the fields of technology and services are experienced specialists in their fields. Our collaboration has stood the test of time.
aspectra operates business-critical systems for banks, e-business providers, public authorities, online shops and many other organisations.
The defense against DDoS attacks is like an arms race: As the defense measures improve, the attacks become more dangerous.
When we launch new products or exchange hardware, taking risks is not on the cards. The case of Pure Storage exemplifies how thoroughly aspectra evaluates and tests a new product to guarantee the security of a solution.
Murteda Al Kaysi
IT is a rapidly changing world. The term "container" has only been known in this context now for a few years. No sooner have experts become familiar with containers though, the technology had already been further developed. One new form, OpenShift, opens up exciting new possibilities and presents us with new challenges.
Containers offer many advantages and are an essential component of DevOps. Now aspectra presents its customers with an OpenShift farm for containers.
A study by the Ponemon Institute concludes that data in the cloud is insufficiently protected. This is not because the clouds do not offer appropriate protection. The problem is that they are not being implemented by customers.
Akamai is one of the hidden champions of the Internet. At any given time, a large part of the world's Internet traffic flows through their networks. But what are the services offered by Akamai and why is aspectra an Akamai partner?
Microsoft's German Azure Cloud does not fully comply with data protection regulations - even though it is operated by the German T-Systems. This is the conclusion of the Magazine for Professional Information Technology iX.
A central log facilitates the analysis of the data and offers additional security against attacks. aspectra offers it to its customers free of charge in a basic configuration.
The US Supreme Court has dropped the data disclosure case against Microsoft. So Microsoft has won... or has it?
Recently, a new DDoS record was set at 1.7 terabits per second. The attack took advantage of incorrectly configured memcached servers as reflectors. How can you protect yourself from such an attack?
In the coming weeks, the U. S. Supreme Court will decide whether or not U. S. cloud providers will have to disclose data to U. S. authorities even if they are stored outside the United States. If the court so judges, the compliance of US cloud providers with the EU-GDPR is fundamentally undermined.
On 25 May 2018, the EU's new General Data Protection Regulation (GDPR) comes into force. All organisations with customers or members in the EU are affected. Failure to comply will result in fines running into the millions. Does ISO 27001 certification of the hosting services provider automatically ensure GDPR compliance?
An error in Cisco's ASA software allows attacks via WebVPN. aspectra has closed the corresponding gap.
The General Data Protection Regulation (GDPR) of the EU is to bring about drastic changes - also for companies in Switzerland. Their applicability in practice remains to be seen.