cyber
security
services

  • Solutions for industry
  • OpenVPN
  • Secure Boot Stick
  • Cloud and client solutions
  • Provision of any number of IP addresses
  • Balancing and Backup with BGP
  • Traffic and anomaly analysis in your customer area
  • Notification of anomalies by e-mail
  • Competitive prices for traffic generators
  • Security Controls
  • 24/7 manned control points
  • Personnel Locks
  • Trusted Site Infrastructure (TSI)
  • ISO 27001 data center
  • Support during the work on site

Cyber Security Solutions

Cyber security is one of the biggest challenges of today. With increasing digitalization, the danger of cyber attacks is also growing.

Due to our proximity to the industry, we can always state that confidentiality, integrity and availability of IT systems, data and the associated processes must be guaranteed. The innovations and key technologies of medium-sized companies are a popular target for cyber attacks.

Wherever you need a cyber security solution – our Cyber Security Service is location-independent!

cloudKleyer Website Protection

Comprehensive service for the protection of company websites, online stores or business portals. In addition to high-quality DDoS protection, the service includes other services to accelerate data transfer.

There is no need to move data, change server settings or install additional software – activation only takes a few minutes.

cloudKleyer Website Protection
Comparison of the separate services based on the scope of the protected web resource. An individual combination is possible on request.

     Start-up Medium-sized company Corporate
Content Delivery Network (CDN) Start-upYes Medium-sized companyYes CorporateYes
Multi-layer cache Start-upYes Medium-sized companyYes CorporateYes
Cache control header Start-upYes Medium-sized companyYes CorporateYes
Caching of static content Start-upYes Medium-sized companyYes CorporateYes
Update frequency in the cache Start-upEvery 30 minutes Medium-sized companyEvery minute CorporateEvery minute or less
Maximum file size Start-up100 MB Medium-sized company250 MB Corporate500+ MB
HTTP/2 and SPDY support Start-upYes Medium-sized companyYes CorporateYes
     Start-up Medium-sized company Corporate
Additional traffic scrubbing Start-upNo Medium-sized companyNo CorporateYes
OWASP TOP-10 Protection Start-upYes Medium-sized companyYes CorporateYes
Web Application Firewall (WAF) Start-upYes Medium-sized companyYes CorporateYes
Addresses on the blacklist/whitelist Start-up05. May Medium-sized company20/20 Corporate50/50
Comprehensive IP address protection Start-upNo Medium-sized companyNo CorporateYes
Extended support Start-upNo Medium-sized companyYes CorporateYes
Advanced DDoS protection Start-upNo Medium-sized companyNo CorporateYrs
Guaranteed cleaning bandwidth (scrubbing) Start-up1.5 Tbps/500 Mpps Medium-sized company1.5 Tbps/500 Mpps Corporate1.5 Tbps/500 Mpps
Extended subdomain management Start-upNo Medium-sized companyYes CorporateYes
Various subdomain SSL certificates Start-upNo Medium-sized companyYes CorporateYes
Free SSL certificate Start-upYes Medium-sized companyYes CorporateYes
SSL activation time Start-upImmediately Medium-sized companyImmediately CorporateImmediately
SSL/TLS 1.2 & 1.3 support Start-upYes Medium-sized companyYes CorporateYes
Transparent SSL processing (processing HTTPS traffic without decryption) Start-upYes Medium-sized companyYes CorporateYes
Custom SSL Certificates Start-upYes Medium-sized companyYes CorporateYes
Unlimited scrubbing bandwidth Start-upYes Medium-sized companyYes CorporateYes
Reputation-based DDoS protection Start-upYes Medium-sized companyYes CorporateYes
     Start-up Medium-sized company Corporate
Protected DNS Start-upYes Medium-sized companyYes CorporateYes
Global DNS Start-upYes Medium-sized companyYes CorporateYes
Wildcard-DNS Start-upYes Medium-sized companyYes CorporateYes
DNS-Records Management Start-upYes Medium-sized companyYes CorporateYes
Load distribution Start-upYes Medium-sized companyYes CorporateYes
Permitted number of back-end web servers Start-upYes Medium-sized companyYes CorporateYes
Unlimited legitimate bandwidth Start-up2 Medium-sized company10 Corporateunlimited
     Start-up Medium-sized company Corporate
Activity and RTT diagrams Start-upYes Medium-sized companyYes CorporateYes
Heatmap of the requests Start-upYes Medium-sized companyYes CorporateYes
List of blocked IPs Start-upYes Medium-sized companyYes CorporateYes
Detailed attack reports Start-upNo Medium-sized companyNo CorporateYes
Authorization of social networks Start-upYes Medium-sized companyYes CorporateYes
Express Visitor Validation Start-upYes Medium-sized companyYes KonzernYes
Immediate Service Activation Start-upYes Medium-sized companyYes CorporateYes
Service Management API Start-upYes Medium-sized companyYes CorporateYes
Two-Factor Authentication Start-upYes Medium-sized companyYes CorporateYes

DDoS Network Protection

In the event of a cyber attack on the infrastructure, it can no longer be accessed by the user.

cloudKleyer provides DDoS protected IP transit to the infrastructure, whether it is located in our data center or at the customer site, e.g. Berlin, Munich or Wolfsburg.

The customer receives comprehensive network (server) protection against DDoS attacks. This service offers not only channel protection, but also protection for online services, regardless of the protocols used.

In combination with all the traffic processing capabilities, the cloudKleyer network protection service is not only a full-fledged alternative to the traditional CDN, but also an advance in its development. Communications service providers, hosting providers, data centers, and enterprise customers have access to endless options for protecting, optimizing, and delivering traffic.

    Connectivity options:

  • Tunnel through a public network (GRE, IPIP)
  • L2/L3 channels via the other operators and cloudKleyer partners
  • Direct connection to our network in one of the data centers

Managed Firewall

Managed Firewall

A managed firewall makes the difference between effectively protecting against cyber attacks and being one of the many companies that report data loss due to the attack.

The firewall is one of the critical components for IT infrastructure and network security and is more than just an interface between the network and the Internet.

Incorrect management of the firewall results in policy conflicts, gaps in protection, and decreased network performance. The managed firewall service is based on Juniper SRX hardware.

Secure Access (VPN)

Tier 3 + Datacenter

Video surveillance of outdoor areas with recording over a period of three months
Optional: Video surveillance in rooms
The facility is surrounded by a fence equipped with detection
On-site control center manned around the clock – error messages are reported by a central control systemt
Security personnel on site around the clock
Strict access authorization program available
Optional: Biometric access control system
Datacenter meets TIER3 classification with optional multi-level assigned areas
Available areas on site for the construction of private TIER4 data centers
Datacenter is certified according to IDW PS951 (German equivalent of Statement on Auditing Standards (SAS) No. 70)
Datacenter is certified according to ISO 27001: 2005

Consulting request

Contact Information

 

Phone:  +49 (0)69 66 169 67-80
e-mail:     info@cloudkleyer.de

 

If you send the data entered in the contact form by clicking on the following button, you declare that you have taken note of the data protection declaration and agree to the electronic collection and storage of the data provided.

The data will only be used strictly for the purpose of processing and answering your inquiry. By sending the contact form, you declare that you agree to the processing of your data. You can revoke your consent at any time with effect for the future. In the event of revocation, your data will be deleted immediately.

Please enable JavaScript in your browser to complete this form.

Fill out hte application and wait for a call from our specialists