head background

Cyber security

Complete, all-round security

From 25 May 2018, the General Data Protection Regulation (GDPR), the new European regulations relating to data protection, will be actively enforced. Are your organization and services ready for this? We offer technical solutions and advice for your organization.

DDoS protection

Availability when you’re under attack

Unfortunately, Distributed Denial of Service (DDoS) attacks have become a fact of life. More and more organizations have to deal with them, sometimes on a daily basis. To be able to mitigate them successfully, regular network equipment is often not good enough. The use of specialist equipment is therefore indispensable.

Our Anti-DDoS service provides real-time security for your hosting and cloud-based applications against direct and indirect DDoS attacks. As part of Cyso’s managed security services, we provide a DDoS mitigation service that can automatically mitigate attacks based on Intrusion Detection behavior.

Important benefits are:

  • Network and application downtime is minimal
  • Malicious bot traffic will be dropped
  • DDoS mitigation starts automatically within 30 seconds
  • Always an up-to-date solution
  • An anti-DDoS solution available instantly
  • No high investment required to protect against DDoS attacks

Enterprise Load Balancing

The most intelligent solution for your applications

Naturally, having lots of visitors is good for your business, but the resulting load can also adversely affect the performance and availability of your application. That’s obviously something you want to prevent. We can help you avoid possible overload and failures in your platform by using intelligent load balancing and content delivery solutions specifically tailored to your applications and services.

Some examples:

  • Distribution of connections based on capacity available
  • Smart distribution of incoming connection
  • Automatic detection of failures and overload
  • Limiting the number of connections per server/application
  • Caching of content on the load balancer

Advanced Firewalling

Prevent abuse by malicious individuals

With a firewall, you can control how contact with your platform and systems can be established. But a regular firewall can’t really see if strange anomalies occur in traffic through the authorized channels. By using Application Firewalls and Intrusion Detection/Prevention Systems, the content of the traffic can be checked in much greater detail. Besides checking and filtering traffic based on IP address and port, you can do so at the protocol and application level.

Using Layer 7 filtering and DPI (Deep Packet Inspection) you can detect and block malicious traffic based on patterns (such as SQL injects, XSS, malware and viruses). You can scan the contents of the data in order to detect whether there may be attempts to exploit potential vulnerabilities in an application or system. We offer various solutions using specialized equipment to make this possible.

VDOMs and security profiles

Custom protection for your applications

To even more clearly create the conditions for correct use of your services and applications, we offer solutions for customized security profiles. You can use your own VDOMs in which you establish rules that correspond to the particulars of your services. With a VDOM, your gain access to your own dedicated, independent virtual security appliance. Each VDOM has its own interfaces, security profiles, routing, administration and many other options. This way, you can have a system that you can configure and customize to your own needs, without having to invest in expensive equipment yourself.


Access anwhere, but still safe

Often, you don’t want your services to be open up to the entire world, but sometimes you do not know from what location your users need access. The use of a Virtual Private Network (VPN) is a widely used solution for this.

You do not have to know where your users are located beforehand, as long as they can identify themselves. If a user does not have the right security credentials, access can already be blocked on the network level. Our specialized equipment includes functionality for configuring and managing different types of VPNs.

Identity management

Improved control using two-factor authentication

To establish more control over one who gets access to your systems and applications, you can add additional controls to establish their identity.

Besides the regular user name and password, you can deploy additional techniques. You can consider using private keys, security tokens, one-time passwords and other methods to provide two-factor authentication. Let us advise you and facilitate the right solution for you.

Do you need help with security and GDPR compliance?

Please contact one of our account managers for a non-binding intake or a personal quote.

Quality. Committed. Honest.
  • 24/7 service support
  • Dutch data centers
  • ISO 27001 certified
vmware enterprise service provider