According to Microsoft, there are seven ways businesses can better protect data, and they suggest the following actionable steps that can help reduce vulnerability.
Reduce threats with identity and access management: Identity and access management can help reduce the risk. • Eliminate the need for multiple credentials with a single identity to access cloud and on-premise resources • Limit individual access to what employees need to do their jobs. • Revoke access privileges when an employee changes roles, leaves the company, or no longer requires access to certain shares. • Enforce second factor authentication based on risky behaviors.
Manage mobile device and apps: Begin with the basics: • Don’t disrupt the user flow; make it easy and natural for them to comply. Consider managing important applications rather than the entire device. • Be transparent about what IT is doing to employee devices. • Protect only the corporate data. Look for solutions that enable employees to freely use the device for their personal purposes.
Leverage conditional access: What are your first steps to getting a policy in place? • Define a mobile device access policy that works for your business. You can either require full management of the device or just management of critical applications like Outlook to access corporate email. • Leverage dynamic groups to give employees access to the applications they need based on their roles. • Enforce multi-factor authentication this adds a layer of protection by requiring users to authenticate themselves two ways. The first method may be the traditional user name and password combination. The second often involves a physical component that would be virtually impossible to duplicate. For example, swiping a card key and entering a PIN, logging into a website and using a one-time password, logging in via a VPN client with a digital certificate, or scanning a user’s fingerprint.
Increase enterprise data protection: To get started: • Ensure devices are fully encrypted in case they are lost or stolen. • Enable EDP in your enterprise environment, which will allow you to manage and regulate apps and data without making unnecessary changes.
Prevent data loss: Start by reducing the likelihood of a leak: • Learn more about the data loss prevention (DLP) capabilities within your ecosystem to protect your data where it is stored, when it is moved, and when it is shared. For example, an email can be limited to distribution within an organization or carry a digital rights management qualification that restricts who can open it. • Extend DLP beyond email as well. Certain word processor, spreadsheets, and presentation programs also offer restricted access options that prevent unauthorized users from opening files.
Enable secured collaboration: Offer a flexible, easy-to-use, secured solution that meets their needs. • Establish secured tools for sharing information, and ensure the right workers have access. This includes a secured document sharing solution, such as a SharePoint, restricted-access network share, or cloud based solution. • Require a digital rights management or other secured email solution to be used when sending sensitive materials through email. • Provide easy and secured information-sharing workflow to enable both internal and external collaboration.
Reduce malware exposure: Education is your first line of defense. • Ask employees to read basic guidance and/or complete training that details common methods of malware attack. • Teach users to double check URLs in email to make sure they seem relevant, accurate, and legitimate. And consider implementing email protection solutions that can help prevent malware and phishing attempts from reaching employees’ inboxes. • Suggest that workers limit their app usage to those downloaded from a reputable source.

Welcome!

Schweizer Host welcomes you to data protection, cloud security, privacy protection, safe and reliable hosting, all in bank-grade datacenters in Zürich and Geneva, Switzerland. We also offer optimized WordPress hosting, private servers, mail servers, encrypted email service, and s3-compatible file and object storage. Our trade marks are Swiss Data Vault, Postarmail. Our services only feature top quality components and guarantee 99.5% uptime, with monitoring 365x7x24. Give us a try!

According to Swiss secure email provider ProtonMail, Switzerland has a long history of privacy and security, dating back over a century, and its laws are much more protective of individual privacy rights. In the US and EU, gag orders can be issued to prevent an individual from knowing they are being investigated or under surveillance. While these type of orders also exist in Switzerland, the prosecutors have an obligation to notify the target of surveillance, and the target has an opportunity to appeal in court. There are no such things as National Security Letters, and all surveillance requests must go through the courts. Furthermore, while Switzerland is party to international assistance treaties, such requests for information must hold up under Swiss law, which has much stricter privacy provisions.

High levels of privacy

Although not a member of the European Union, all data stored in Switzerland is protected by GDPR (General Data Protection Regulation), set out by the EU. The GDPR ensures that all personal and identifiable data is highly protected.

Data stored in Switzerland is also protected by the FADP (Federal Act on Data Protection). The FADP is a Swiss act, passed in 1992, to protect the privacy and the fundamental rights of persons when their data is processed. With the strict federal laws and regulations in place, Switzerland is an established location to consider for hosting personal or private data. The EU has found Switzerland to provide an adequate level of data protection, and therefore data can be transferred freely between the EU and Switzerland.

Political stability

Due to its political stability, Switzerland is considered one of the safest countries in the world, year after year. Before deciding where to store data, it is crucial to consider stability as a key factor.

Data is stored on physical servers that need to be protected from any possibility of physical damage, so storing data in a politically stable country greatly reduces the risk of damage to the physical locations. Political stability also means that the laws under which your data is stored and protected are likely to remain the same long term.

Business continuity

Geography is another key factor to consider when deciding where to host your data. Natural disasters such as floods, earthquakes and hurricanes can take down a data center, causing data to be lost and websites to go down for prolonged periods of time. Switzerland has a temperate climate and alpine landscape, keeping it safe from many natural disasters. Data hosted in Switzerland is therefore generally well protected from the detrimental effects that natural disasters can have.

Why Switzerland?

Switzerland is often viewed internationally as representing the following values – stability, neutrality, discretion and trustworthiness based on its banking history. For example Swiss law is often used in international contracts by non-European customers when there is a disagreement about which law is to apply to the contract.

Confidentiality

Currently many global companies use data centers located in the USA. However, when dealing with European customers, suppliers often encounter problems with customer concerns about the application of certain US laws which permit US authorities to access customer data stored in the USA, under certain circumstances. 

An additional benefit of using a Swiss data center is that generally data stored in Switzerland is not traceable to a named person, but only to a number.

Safe Harbor not adequate

Increasingly customers, particularly in Germany and North America, India and certain parts of Asia and South America, are raising concerns about the adequacy of the safe harbor status of data centers, as this certification is seen as little more than a paper exercise which in practice does not actually equate to Swiss levels of data protection.

Compliance with EU data protection laws

An added advantage of using Swiss data centers is that Switzerland is accepted by the EU as having equivalent protection to EU data protection laws. Therefore no additional consents are required from customers to enable the supplier to store and process customer data in Switzerland.

Schweizer Host offers shared and VPS hosting in Switzerland

Schweizer Host is your choice in web hosting and virtual private server hosting. Our infrastructure is located in Switzerland, as is our company, at two ultra-secure datacenters in the Zürich area.

Lupfig datacenter (ZH-2)

 10 000 m2 of data center space with independent data center modules
 Tier-IV-Level ISO 27001 certified
 24/7-monitoring 24/7-security personnel on-site with state-of-the-art biometric access control
 Completely independent power lines, 40 MW power from two separate substations
 Multiple diesel generators, 7 days autonomous power, redundant UPS systems
 Redundant cooling systems
 Energy efficiency of PUE 1.19
 ISO 50001 certified and compliant with ISAE 3402


Schweizer Host offers shared, WordPress, VPS and cloud hosting in Switzerland’s most advanced datacenters

Based within the Exoscale infrastructure, we are multihomed on all locations and connected directly to different Tier 1 and Tier 2 transit providers with multiple 10 Gbps links. Several peering connections with major local actors grant first in class performance in our geographical area. Internal networking is supported by a robust 100 Gbps backbone.

Zurich CH-DK-2 (ZH5)

Zurich’s CH-DK-2 (ZH-5) is the latest datacenter from Equinix in Switzerland. Built for scale, it can grow in building blocks providing plenty forthcoming capacity for Schweizer Host. Built with state-of-art technologies with an unrivaled accumulated experience, it is also home to Switzerland densest network exchange point.

Zurich Datacenters

Certifications and Standards
Our datacenters are certified to meet rigorous environmental and energy-management standards.

Datacenter ZH5 Highlights
Zurich colocation services and datacenter ZH5 is centrally located at Allmendstrasse for network service providers that deliver into the banking district to interconnect partners and customers.

Power Redundancy: N+1
Cooling Redundancy: N+1 Chillers; N+20% CRAC units
Certifications:
SOC 1 Type II
SOC 2 Type II
ISO 27001
PCI DSS
OHSAS 18001
ISO 9001:2015
ISO 22301
ISO 14001:1015
ISO 50001
See detailed specifications:

Datacenter ZH5

Datacenter ZH5 detailed specifications


Geneva CH-GVA-2 (GV2)

Placed close to European financial ecosystems and global markets, CH-GV-2 is hosted by the Equinix datacenter facility. Our Geneva datacenter is a modern facility with plenty of space to grow and host high density workloads. It runs on fully renewable energy sourced from the local energy supplier. It is home to the CIXP internet exchange peering point and thanks to its proximity to HTTP Internet birth site at CERN, holds key Internet architecture.

Geneva datacentersCertifications and Standards
Our datacenters are certified to meet rigorous environmental and energy-management standards.

Datacenter GV2 Highlights
Our Geneva data center is ideally located for telecom and internet providers serving multinational corporations and European banks and has direct access to CIXP, the world’s core internet exchange.

Power Redundancy: N+1
Cooling Redundancy: N+1
Certifications:
SOC 1 Type II
SOC 2 Type II
ISO 27001
PCI DSS
OHSAS 18001
ISO 9001:2015
ISO 22301
ISO 14001:1015
ISO 50001
See detailed specifications.

Datacenter GV2

Datacenter GV2 detailed specifications

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application’s resources, making the application unavailable to legitimate users. DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet.

Schweizer Host’s services are protected by Microsoft Azure’s infrastructure DDoS Protection. The scale and capacity of the globally deployed Azure network provides defense against common network-layer attacks through always-on traffic monitoring and real-time mitigation. DDoS Protection requires no user configuration or application changes. DDoS Protection helps protect all Schweizer Host services at Azure datacenters in Switzerland.

Azure DDoS Protection, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks. It is automatically tuned to help protect your resources against cyberattacks. Protection is automatically enabled on all new or existing customer accounts, and it requires no application or resource changes.

Features

Native platform integration: Natively integrated into Microsoft Azure infrastructure. Automatic configuration by Schweizer Host. DDoS Protection  is customized to your resources and resource configuration.
Turnkey protection: Simplified configuration immediately protects all resources as soon as DDoS Protection is enabled. No customer intervention or user definition is required.
Always-on traffic monitoring: Your application traffic patterns are monitored 24 hours a day, 7 days a week, looking for indicators of DDoS attacks. DDoS Protection instantly and automatically mitigates the attack, once it is detected.
Adaptive tuning: Intelligent traffic profiling learns your application’s traffic over time, and selects and updates the profile that is the most suitable for your service. The profile adjusts as traffic changes over time.
Multi-Layered protection: Deployed with a web application firewall (WAF), DDoS Protection protects both at the network layer (Layer 3 and 4, included in Azure DDoS Protection) and at the application layer (Layer 7, offered by a WAF). 
Extensive mitigation scale: Over 60 different attack types can be mitigated, with global capacity, to protect against the largest known DDoS attacks.
Attack analytics: Microsoft provides Schweizer Host with detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to Azure Sentinel or an offline security information and event management (SIEM) system for near real-time monitoring during an attack.
Attack metrics: Summarized metrics from each attack are made available to Schweizer Host by Microsoft.
Attack alerting: Alerts are configured at the start and stop of an attack, and over the attack’s duration, using built-in attack metrics. Alerts integrate into Schweizer Host’s operational software.
DDoS Rapid Response: The DDoS Protection Rapid Response (DRR) team helps with attack investigation and analysis.