New: Flexible service plans for Myra WAF. Learn more!
Home>
Akamai Alternative
Data risks, surveillance, supply chain dependencies
When choosing a cloud service provider, technological factors are not the only thing that matters – the provider's legal environment is also crucial. Companies based in the US are subject to specific legal obligations that make them vulnerable to government surveillance and supply chain disruptions.
This is particularly critical in light of geopolitical tensions, an increasingly interventionist US government, and a understanding of data protection that differs significantly from European standards.
US laws with consequences for your data sovereignty
Authorizes US intelligence services to monitor electronic communications of non-US persons outside the United States for the purpose of gathering information in a foreign intelligence context.
Requires US service providers to disclose electronic data to investigative authorities – even if it is stored on servers outside the US.
Introduced as an anti-terrorism law, it allows US authorities extensive access to communications and business data – often without the knowledge of those affected.
TLS termination
TLS encryption reliably protects digital communication from unauthorized access – but makes it difficult to detect cyber threats in encrypted data traffic. In order to identify malicious content, security solutions must temporarily decrypt (TLS termination) and analyze the encrypted data stream – similar to security checks at events.
This technical intervention is sensitive: confidential information also becomes visible in the process. TLS termination therefore places high demands on data protection, legal security, and technical expertise – requirements that not all providers are able to meet in a legally compliant and GDPR-compliant manner.
How it works
Incoming connections are decrypted in a legally compliant manner in accordance with the GDPR exclusively in data centers in Germany.
The data remains entirely within the EU without being forwarded abroad.
Independent of the sphere of influence of US surveillance laws
Legal uncertainty due to possible data transfers to the US
Directly affected by US legislation (FISA 702, PATRIOT Act, CLOUD Act)
Access by US authorities permitted – even to encrypted data or data stored in the EU
BSI ISO 27001 based on IT-Grundschutz certified | ||
KRITIS operator in accordance with Section 8a (3) BSI Act | ||
BSI C5 Type 2 audited (Cloud Computing Compliance Criteria Catalogue) | ||
Full score (37/37) in the BSI comparison for DDoS mitigation providers | ||
Legally GDPR compliant (not subject to US CLOUD Act and FISA Section 702) | ||
IDW PS 951 Type 2 (ISAE 3402) | ||
ISO 9001 quality management | ||
Option to exclusively process data in German data centers | ||
Technology development in EU / Germany | ||
Company management based in EU / Germany | ||
EU / German law applies | ||
Enhanced business continuity through default direct connect to the protection infrastructure | ||
User-defined escalation paths | ||
Regular, spontaneous testing by reputable third-party providers | ||
Real-time support for Splunk/Vector/SIEM |