DDoS Protection
DDoS protection can be used to protect against so-called distributed denial-of-service (DDoS) attacks, in which a large number of infected systems are maliciously used to attack a single target. The target system is usually unable to handle the large amount of requests and is therefore no longer accessible to its users; the flood of incoming messages forces a shutdown of the system and therefore also of the services provided to legitimate users via this system.
Single Sign On (SSO)
Single sign-on (SSO) is an authentication process for a user’s session. It allows a user to enter a name and password to gain access to multiple applications. The process authenticates the user for all applications to which they have been granted access. There are no further prompts for identification. This allows the user to conveniently switch back and forth between applications in one session.
Application Layer Gateway
Application layer gateways are placed between the secure and insecure network; a proxy server is set up on them for each service to be monitored, which, unlike packet filtering, can be used to monitor the content. In this way, active content such as ActiveX controls or Java applets can be filtered out of HTML pages or the e-mail can be scanned for viruses.
Data Loss Prevention (DLP)
“Data loss prevention” and “data leakage prevention” are usually used synonymously, but some specialists also differentiate between them in technical discussions: “Data loss prevention” is protection against the unwanted outflow of data that causes damage and is also noticed, while “data leakage prevention” stands for protection against the suspected but unmeasurable and sometimes undetectable passing on of information to unwanted recipients.
Managed MDR (Managed Detection Response)
Managed Detection and Response (MDR) is a security service that prioritises the handling of detection and response capabilities on behalf of a customer. MDR enables companies to operate a turnkey Security Operations Centre (SOC) at a low percentage of the cost of building their own programme.
Endpoint Security
Modern firewall systems now offer a much broader range of integrated features in addition to the conventional functions of a firewall; firewalls provide everything a security expert needs: Firewall, anti-virus, filter functions for web content and emails, application control and network functions (e.g. routing and load balancing) in just one appliance.
Vulnerability Assesment
Vulnerability management is a proactive approach to ensuring network security and consists of identifying, classifying, priorisation and eliminating vulnerabilities in systems, particularly in relation to software and firmware.
This systematic approach focuses on reducing the risk of security breaches and attacks by ensuring that potential vulnerabilities are recognised and remedied before they can be exploited by cyber criminals or pose potential risks to the system. Vulnerability management includes tasks such as vulnerability scanning, penetration testing and patch management. The purpose is to create a comprehensive security concept that can protect systems and data from unauthorised access, modification or destruction.
VPN / SSL / ZTNA
A conventional VPN is a virtual, self-contained communication network that uses an existing communication network as a transport medium. It is used to connect participants in the existing communication network with another network. In addition to traditional networking via VPN gateways, SSL VPN is also increasingly being used to connect individual end devices. With ZTNA administrators can granularly control access to internal resources and restrict access based on the client’s health state.




