New: Flexible service plans for Myra WAF. Learn more!

Key Visual Security as a Service Plattform

Made in Germany

Your European F5 alternative

Myra is the secure and GDPR-compliant F5 alternative for organizations that do not compromise on the availability and reliability of their digital infrastructure.
 

✔   Sovereign and highly available cybersecurity solutions from Germany/EU

✔   Expert support from Germany

✔   Protection against US access in accordance with the CLOUD Act, FISA 702, and PATRIOT Act

Learn more

1&1 Versatel LogoLogo BarmeniaMunich Security ConferenceFinance customer of Myra: DSV IT Servicellb1861 LogoFinance customers of Myra: flatexDEGIROCancomPartner of Myra: WitcomLogo cps coding powerful systems]init[NFONPartner of Myra: heinleinDSwissLogo UserlikeLogo calensoLogo Staatsministerium Baden-WürttembergStadt Regensburg LogoSecuritas1822direkt LogoAKDB Logo

Highest requirements as benchmark

Compliance security from Germany

Myra, as an F5 alternative, operates a Security-as-a-Service platform entirely in Germany – legally compliant with GDPR and in accordance with German and European laws. These require security providers to offer maximum data protection, availability, and resilience.
 
With new regulations such as NIS-2, the Cyber Resilience Act (CRA) and DORA, the level of security in Europe is constantly increasing – a clear advantage over less regulated providers outside the EU.

 

  • Certifications such as ISO 27001 based on BSI IT-Grundschutz, BSI C5 Type 2, PCI-DSS, IDW PS 951 Type 2 (ISAE 3402) and quality management according to ISO 9001 prove Myra's high security standard.

  • As a KRITIS operator in accordance with Section 8a (3) BSIG, Myra meets the highest regulatory requirements – the ideal choice for companies with particularly strict compliance requirements.


Myra vs. typical US competitors

  • BSI ISO 27001 based on IT-Grundschutz certified

    KRITIS operator in accordance with Section 8a (3) BSI Act

    BSI C5 Type 2 audited (Cloud Computing Compliance Criteria Catalogue)

    Full score (37/37) in the BSI comparison for DDoS mitigation providers

    Legally GDPR compliant (not subject to US CLOUD Act and FISA Section 702)

    IDW PS 951 Type 2 (ISAE 3402)

    ISO 9001 quality management

    Option to exclusively process data in German data centers

    Technology development in EU / Germany

    Company management based in EU / Germany

    EU / German law applies

    Enhanced business continuity through default direct connect to the protection infrastructure

    User-defined escalation paths

    Regular, spontaneous testing by reputable third-party providers

    Real-time support for Splunk/Vector/SIEM

    BSI ISO 27001 based on IT-Grundschutz certified

    KRITIS operator in accordance with Section 8a (3) BSI Act

    BSI C5 Type 2 audited (Cloud Computing Compliance Criteria Catalogue)

    Full score (37/37) in the BSI comparison for DDoS mitigation providers

    Legally GDPR compliant (not subject to US CLOUD Act and FISA Section 702)

    IDW PS 951 Type 2 (ISAE 3402)

    ISO 9001 quality management

    Option to exclusively process data in German data centers

    Technology development in EU / Germany

    Company management based in EU / Germany

    EU / German law applies

    Enhanced business continuity through default direct connect to the protection infrastructure

    User-defined escalation paths

    Regular, spontaneous testing by reputable third-party providers

    Real-time support for Splunk/Vector/SIEM

    MYRA SECURITY
    TYPICAL US COMPETITOR

    BSI ISO 27001 based on IT-Grundschutz certified

    KRITIS operator in accordance with Section 8a (3) BSI Act

    BSI C5 Type 2 audited (Cloud Computing Compliance Criteria Catalogue)

    Full score (37/37) in the BSI comparison for DDoS mitigation providers

    Legally GDPR compliant (not subject to US CLOUD Act and FISA Section 702)

    IDW PS 951 Type 2 (ISAE 3402)

    ISO 9001 quality management

    Option to exclusively process data in German data centers

    Technology development in EU / Germany

    Company management based in EU / Germany

    EU / German law applies

    Enhanced business continuity through default direct connect to the protection infrastructure

    User-defined escalation paths

    Regular, spontaneous testing by reputable third-party providers

    Real-time support for Splunk/Vector/SIEM

    Espionage, data leaks, supply chain risks

    Why US providers pose a security risk

    When choosing a cloud service provider, it is not only technological aspects that count – the legal framework is also crucial. Providers subject to US law pose significant risks in terms of surveillance, data protection, and supply chain security. This aspect is becoming increasingly important, especially in light of geopolitical tensions, a potentially authoritarian US government, and diverging data protection laws in the EU.

    US laws with critical implications for your data

    CLOUD Act

    Requires US companies to hand over electronic data – even if it is stored on servers outside the US.

    FISA 702

    Authorizes US intelligence agencies to monitor the communications of non-US citizens outside the US for the purpose of gathering intelligence.

    PATRIOT Act

    Enables comprehensive government access to communications and business data – originally intended for counterterrorism, but now a risk to corporate data.

    TLS-Terminierung

    Digital backpack checks as a data protection challenge

    TLS encryption effectively protects confidential data from unauthorized access – but at the same time makes it more difficult to detect cyber attacks. In order to detect threats in encrypted data traffic, security systems must temporarily decrypt it (TLS termination) – similar to checking bags when entering large events.

    Since this also reveals sensitive content, TLS termination is a particularly sensitive process from a data protection and compliance perspective. Only providers with in-depth expertise and the highest data protection standards can implement this technology in a legally compliant and GDPR-compliant manner.

    How it works

    Myra Security

    • Decryption takes place exclusively in certified data centers in Germany

    • All data remains entirely within the EU legal area

    • No access by US authorities – outside the reach of FISA, CLOUD Act & Co.

    US providers

    • Risk of data transfers to the US – legal uncertainties

    • Directly subject to US laws such as FISA 702, CLOUD Act, PATRIOT Act

    • Access to data possible – even when stored within the EU

    Service from the SOC

    Round-the-clock support from real IT professionals

    Unlike purely automated support solutions, Myra Security offers powerful F5 alternatives and personal 24/7 support directly from experienced specialists at its own Security Operations Center (SOC) in Germany.
     

    • A Net Promoter Score of 46 reflects our customers' high level of trust in our security, availability, and service quality.

    • With a customer satisfaction score of 4.47 out of 5, our customer success and operations teams demonstrate their excellent performance every day.

    Network

    Debate on data protection & compliance

    Legal certainty of US data transfers under scrutiny

    The basis for data transfers between the EU and the US is politically unstable and poses a significant compliance risk for companies.
     

    ✔   The current adequacy decision is based on a revocable executive order by Joe Biden.

    ✔   Donald Trump announced in his Agenda 47 that he would reverse all of his predecessor's measures.

    ✔   The first steps toward undermining the data protection framework have already been taken with the dismissal of Democratic members of the Privacy Oversight Board.

    Learn more

    This is what other say about us

    SUCCESS STORY

    Federal Ministry of Health

    Industry: Public Sector

    Employees: > 500
     

    The collaboration between Myra and coding.powerful.systems enables the Federal Ministry of Health to keep its TYPO3 website constantly highly available and performant. Even with high visitor numbers, the ministry's website is quickly and stably accessible.

    Read MoreCheck out All Case Studies

     

    Protect Your Digital Assets – Book a Free Demo

     
    See Myra's cybersecurity solutions in action, get tailored advice from specialists and answers to all of your questions.
     

    Book a demo

    Certificate ISO 27001 BSI certified on the basis of IT-GrundschutzCertificate PCI DSSBSIG KRITIS qualified logoBSI C5 Testat Typ2Zertifikat Trusted CloudIDW WPS 951 Type 2 CertificateKRITIS LogoISO 9001