Cloudflare

Cloudflare offers a range of secure global network services that ‘make the internet better’.

With Cloudflare, your end customers can:

  • Protect their website
    With no code changes and the same hosting provider – your customers can set up a Cloudflare domain in less than 5 minutes and protect and accelerate all their websites, apps, and APIs.
  • Implement zero-trust access
    End customers can protect their global apps, workforce and data with no additional hardware, software, or complicated licensing.
  • Build serverless apps
    With Cloudflare, your customers can instantly run serverless code globally, with exceptional performance, reliability, and scale.

DDoS Protection

DDoS protection can be used to protect against so-called distributed denial-of-service (DDoS) attacks, in which a large number of infected systems are maliciously used to attack a single target. The target system is usually unable to handle the large amount of requests and is therefore no longer accessible to its users; the flood of incoming messages forces a shutdown of the system and therefore also of the services provided to legitimate users via this system.

Advanced Threat Detection

Advanced Threat Detection is a broad term for solutions that use certain types of analysis to increase the security of systems. Among other things, these solutions can analyse and evaluate downloads or other user activities from various systems risk-free in a sandbox.

Application Layer Gateway

Application layer gateways are placed between the secure and insecure network; a proxy server is set up on them for each service to be monitored, which, unlike packet filtering, can be used to monitor the content. In this way, active content such as ActiveX controls or Java applets can be filtered out of HTML pages or the e-mail can be scanned for viruses.

Firewall (inkl. UTM & NG)

Modern firewall systems now offer a much broader range of integrated features in addition to the conventional functions of a firewall; UTM firewalls provide everything a security expert needs: Firewall, anti-virus, filtering features for web content,emails, application control and network functions (e.g. routing and load balancing) in just one appliance.

Network IPS

Intrusion prevention systems (IPS for short) are intrusion detection systems (IDS for short) that go beyond the mere generation of events to provide functions that can also block a detected attack. Network IPS includes all solutions that can provide centralised protection for the company network.

VPN / SSL / ZTNA

A conventional VPN is a virtual, self-contained communication network that uses an existing communication network as a transport medium. It is used to connect participants in the existing communication network with another network. In addition to traditional networking via VPN gateways, SSL VPN is also increasingly being used to connect individual end devices. With ZTNA administrators can granularly control access to internal resources and restrict access based on the client’s health state.

Web Security

Web security solutions protect end devices from infections and implement company guidelines by using the following technologies: URL filtering, blacklisting, whitelisting, detection and filtering of malicious content, application control of known applications such as Skype.

Secure Access Service Edge (SASE)

Email security refers to solutions for protecting emails against spam, viruses and malware. These are placed in the network as a gateway solution or in the cloud as hosted solution.