Let us manage your network security!

Our services include the design, monitoring, operation and support of network perimeter protection (firewall, WAF) and encrypted private networks (VPNs).

Click to check the optional elements of our service!

map on screens photo
Network security illustration

Network security is an essential consideration in the design of most IT systems. We know this well, which is why we recommend that you contact us with confidence as early as the concept development stage.

If you choose us, then…

Network security illustration
shield image

…if required, we will design and implement the complete border security system.

sliders image

…your choice falls on a flexible solution that meets your needs.

dollar sign image

save yourself from unnecessary costs. You only pay for what you have used.

award image

…we are at your disposal with over 20 years of experience in information security systems.

phone call image

…if needed, you can expand your team with information security experts available 24 hours a day.

Optional elements of our service

They can be selected in any combination and be varied during use

Network perimeter protection / firewall solutions

Proprietary ALF firewall-based solutions to protect web applications (LB/WAF) and internal networks.

Secure corporate mailing solutions

Mail-independent spam and virus filtering, special scanning, modification, and removal of attachments on demand.

Penetration detection and prevention / IDS-IPS solutions

Our pattern-based, centrally maintained data and knowledge base tools are built on open-source solutions to detect and, if necessary, prevent dangerous network activity.

Encrypted private network / VPN solutions

IPSEC and SSL-based VPN solutions, even with MFA authentication.

Surveillance / monitoring (health checks)

Zabbix, Nagios, Prometheus, Grafana-based solutions.

Central log collection and storage

Own log collection based on Syslog/Logstash/ELK/Graylog. See also our SOC service.

references

Our customers have said

blog

Case studies and professional
publications on the subject

contact

Get in touch

The field is required.
The field is required.
Please enter an email address.
Please enter a phone number. Example: '+44 20 1234-5678'
The field is required.
The field is required.
The field is required.