IT security for more protection

We support you in securing your IT environment and introducing technical and organizational measures to ward off malware and cybercrime.

  • Firewall systems
  • Anti-malware and ransomware
  • Secure authentication
  • Content control and filtering
  • VPN

Request an offer

Firewall for network protection

Firewalls are basic building blocks for securing IT infrastructure. In addition to classic network access control, Next Generation firewalls are increasingly controlling the content of data streams. A special feature for the analysis of special data streams are the web application firewalls and database firewalls. Web application firewalls protect complex web applications from attacks and are able to prevent the exploitation of unknown errors in these applications. Database firewalls have full visibility of traffic, reducing the vulnerability of unpatched database servers and stopping complex targeted attacks. It prevents costly data breaches by reliably protecting your databases from attacks, data loss, and theft. Firewalls policies are becoming more complex as the size of the network increases. Therefore, high demands are made on the user-friendliness and clarity of the management interface in order to rule out errors in the administration as far as possible.

We use pfSense firewalls, which are characterized by an excellent price / performance ratio.

Anti-malware and ransomware

In addition to the attacks on the lower network levels, more and more applications are being attacked today. Next Generation Threat Prevention combines several methods to protect applications and endpoints, e.g. Antivirus, Antibot, IPS, application control and URL filtering to prevent new attacks and exploit previously unknown vulnerabilities. Next Generation Threat Prevention provides through processes such as Sandboxing very high demands on IT resources. Therefore, a close integration with the network firewall makes sense, in order to block the source of the attacks in the future at network level.

Content control and filtering

Content security includes a system that stands between user and Internet. This filters out unwanted content – both incoming and outgoing. This can be web traffic and email traffic. As a rule, manufacturers of IT security solutions understand the following components under a content security strategy:

Untersuchung von Webseiten auf Schadcode

The exploitation of vulnerabilities by attackers such as Cross-site scripting is a common way to smuggle malicious code into enterprise networks. A content security solution analyzes the traffic, detects changed content and protects the user from an infection.

Categorization of web pages

When categorizing websites, it is on the one hand to deposit in the content security policy that certain categories of websites may not be called (subject categorization such as shopping portals, online games, …) and on the other hand to legal requirements for, for example, underage employees fulfill.

Investigation of emails on malicious code

Malicious code can be injected into emails in the form of links to infected pages, malware in attachments (such as PDF, JPEG, Zip files, etc.) or phishing emails for spying on personal data, passwords, etc. in the corporate network. As a result, a content security solution usually also includes a module that analyzes and possibly blocks e-mail content.

Secure authentication

Authentication is a process that determines whether a person or a system is what he or she pretends to be. In real life, we distinguish ourselves by signatures, identity cards and cards. Simple authentication is usually done with username and password, which is easily attacked. Therefore, stronger mechanisms such as certificates, biometrics or tokens are used. The secure operation of VPNs and access to networks requires certificates or two-factor authentication. In two factor authentication, what you know (e.g., password or PIN) is combined with something you are or have (e.g., biometrics, tokens, or cards). In connection with the “authentication”, the term “authentication” often appears as well. “Authentication” means that a person or machine must identify himself to a communication partner. A user authenticates himself to a computer / server etc.

Connection solutions via WAN and VPN

A Wide Area Network (WAN) is a computer network that, unlike a LAN or MAN, covers a very large geographical area. The number of connected computers is unlimited. WANs span across countries or even continents. WANs are used to connect different LANs as well as individual computers. Some WANs are owned and used by specific organizations. Other WANs are being built or expanded by Internet service providers to provide access to the Internet.

For inter-site networking, more and more Internet is being used today instead of dedicated point-to-point connections. This is realized with the help of VPNs, which also encrypt the traffic and thus ensure the integrity and confidentiality of the data. Likewise with VPNs the access of mobile terminals on the company infrastructure is realized. Use your resources company-wide and integrate branch offices, home offices or even suppliers and partners into your own network. A VPN is compared to leased lines a much cheaper alternative and therefore the most widely used option to integrate these decentralized locations firewall-secured in their own network.

Do you have any further questions?

Contact our sales team. We are happy to help and are available for live demos of our products at any time.

    ServerBase AG
    Schlosserstrasse 5
    CH-8180 Bülach

    +41 44 515 90 80
    sales@serverbase.ch


    Monday – Thursday
    08:00 – 12:00 | 13:30 – 17:00

    Friday
    08:00 – 12:00 | 13:30 – 16:00

    Outside of opening hours, our on-call service is available.

    ServerBase Produkt-AssistentProduct Assistant
    ServerBase Product Assistant

    Product Assistant

    Our product assistant helps you to find the right products.

    In-house IT know-how

    Do you have in-house IT personnel or know-how?

    Server or services

    Would you like to buy entire servers or just specific services?

    Availability or price

    Is high availability or a low price more important to you?

    Number of servers

    We can only achieve high availability with virtual servers. How many VMs do you want to operate?

    We found something for you!

    Success

    Cluster VPS

    Cluster VPS are virtual servers with extremely high availability, which continue to run without interruption even if our server hardware fails.

    Shared or dedicated hardware

    Do your VMs need to be separated from other customers only logically (IaaS) or even physically (dedicated Private Cloud)?

    We found something for you!

    Success

    Virtual Datacenter

    Virtual Datacenter (VDC) is the flexible and completely autonomously manageable IaaS solution from ServerBase.

    We found something for you!

    Success

    Private Cloud

    Our highly available Private Cloud offers simple, web-based management with the flexibility and security of an on-premises environment.

    Server type

    Do you prefer dedicated bare metal servers or virtual servers?

    We found something for you!

    Success

    Dedicated server

    Rent dedicated physical server hardware that is entirely dedicated to you and completely free to manage.

    We found something for you!

    Success

    Standard VPS

    Cost-effective servers for standard applications without special requirements with SSD or HDD storage.

    We found something for you!

    Success

    Which service are you looking for?

    Full outsourcing

    Would you like to outsource your complete IT and have it managed by us?

    We found something for you!

    Success

    My Workplace 2.0

    With My Workplace 2.0, you store all your data and applications in our secure Swiss data centers and access them from anywhere.

    We found something for you!

    Success

    What would you like to outsource?