New: Flexible service plans for Myra WAF. Learn more!
Home>
Cloudflare Alternative
Data leaks, espionage, supply chain risks
When selecting a cloud service provider, in addition to the technology, the legal framework within which the provider operates is also of central importance. Companies that are subject to US legislation, for example, are particularly affected by surveillance and supply chain risks. This is particularly relevant in light of the ongoing geopolitical tensions, the rise of authoritarianism in the US administration, and legislation on data protection that is at odds with the EU's stance.
Laws with far-reaching consequences for your data
Regulates the disclosure of electronic data by US companies for law enforcement purposes, even if the data is stored outside the US.
Allows US intelligence agencies to monitor and collect electronic communications from non-US citizens outside the US for the purpose of obtaining “foreign intelligence information.”
Originally enacted after 9/11 to combat terrorism, the PATRIOT Act allows US authorities to collect telephone and internet data on a massive scale and access business data.
TLS termination
TLS encryption effectively protects data from prying eyes and manipulation – but at the same time makes it more difficult to detect threats. To ward off attacks in encrypted traffic, security solutions must therefore temporarily break the encryption (TLS termination) and analyze the data stream in a targeted manner – similar to a backpack check when visiting large events.
Since TLS termination also makes sensitive data visible, this process is particularly sensitive from a data protection and compliance perspective, as not every service provider has the necessary expertise and meets the required data protection standards to perform TLS termination in a legally compliant manner in accordance with the GDPR.
How it works
Incoming connections are decrypted exclusively in data centers in Germany – legally compliant with the GDPR.
The data remains entirely within the EU legal area – there is no transfer to other countries.
Outside the scope of US surveillance laws
Possibility of data transfers to the US (legal uncertainty)
Directly affected by US legislation (FISA 702, CLOUD Act, PATRIOT Act)
Potential access by US authorities even to encrypted data or data stored in the EU
BSI ISO 27001 based on IT-Grundschutz certified | ||
KRITIS operator in accordance with Section 8a (3) BSI Act | ||
BSI C5 Type 2 audited (Cloud Computing Compliance Criteria Catalogue) | ||
Full score (37/37) in the BSI comparison for DDoS mitigation providers | ||
Legally GDPR compliant (not subject to US CLOUD Act and FISA Section 702) | ||
IDW PS 951 Type 2 (ISAE 3402) | ||
ISO 9001 quality management | ||
Option to exclusively process data in German data centers | ||
Technology development in EU / Germany | ||
Company management based in EU / Germany | ||
EU / German law applies | ||
Enhanced business continuity through default direct connect to the protection infrastructure | ||
User-defined escalation paths | ||
Regular, spontaneous testing by reputable third-party providers | ||
Real-time support for Splunk/Vector/SIEM |