As a "Business Partner", we have been hosting our customers' applications uniformly on managed flex servers from Profihost GmbH in Hanover for almost 10 years. In addition to the flexible scaling of performance, we benefit from personal contact and extremely fast response times far from any hotline queue.
The systems are continuously provided with updates, patches and optimizations by Profihost and use the Gaia OS platform of the Israeli security company Checkpoint.

With the location in Germany, data protection can be implemented in accordance with German and European data protection laws.

Systems & Technologies

  • Lamp Stack
  • Podman Containering
  • Elastic Search
  • Pimcore

Services

  • Installation
  • Setup
  • Management
  • Monitoring
  • Scaling

As a "Business Partner", we have been hosting our customers' applications uniformly on managed flex servers from Profihost GmbH in Hanover for almost 10 years. In addition to the flexible scaling of performance, we benefit from personal contact and extremely fast response times far from any hotline queue.
The systems are continuously provided with updates, patches and optimizations by Profihost and use the Gaia OS platform of the Israeli security company Checkpoint.

With the location in Germany, data protection can be implemented in accordance with German and European data protection laws.

Systems & Technologies

  • Lamp Stack
  • Podman Containering
  • Elastic Search
  • Pimcore

Services

  • Installation
  • Setup
  • Management
  • Monitoring
  • Scaling

As a "Business Partner", we have been hosting our customers' applications uniformly on managed flex servers from Profihost GmbH in Hanover for almost 10 years. In addition to the flexible scaling of performance, we benefit from personal contact and extremely fast response times far from any hotline queue.
The systems are continuously provided with updates, patches and optimizations by Profihost and use the Gaia OS platform of the Israeli security company Checkpoint.

With the location in Germany, data protection can be implemented in accordance with German and European data protection laws.

Systems & Technologies

  • Lamp Stack
  • Podman Containering
  • Elastic Search
  • Pimcore

Services

  • Installation
  • Setup
  • Management
  • Monitoring
  • Scaling

We specialize in the WordPress content management system and operate WordPress installations of any size. Thereby we can look back on 12 years of experience.

Systems & Technologies

Services

  • Front-end programming
  • Backend programming
  • Plugins
  • APIs
  • Hardening
  • Updates & Patches
  • Security
  • Service & Support

We link your applications and services via interfaces and thus realize integrated architectures.

Systems & Technologies

Services

  • Interface development
  • Documentation

We generally rely on OpenSource frameworks to implement individual requirements for front- and backend systems.

Systems & Technologies

  • Zend2
  • React
  • Vue.js
  • uvm.

Services

  • Front-end development
  • Backend development

GREEN-M relies on the global cloud solution from Cloudflare, Akamai and Sectigo and the centralized and active approach to managing firewall rules to protect applications. With Myra, we offer a WAF solution for critical infrastructures.

Systems & Technologies

Services

  • Connection
  • Configuration
  • Monitoring

GREEN-M relies on the US-based provider Cloudflare, recommended by the German Federal Office for Information Security (BSI), to protect web servers.

Systems & Technologies

Services

  • Connection
  • Configuration
  • Monitoring

To optimize application access times worldwide and reduce the load on our own servers, we rely on content delivery networks.

Systems & Technologies

  • Akamai
  • AWS
  • Cloudflare

Services

  • Connection
  • Configuration

With our partner Securai GmbH from Ingolstadt, we offer professional penetration testing and simultaneously eliminate the vulnerabilities found in an application. Detailed reporting on the vulnerabilities helps to implement your compliance requirements in the area of application security.

Services

  • Planning
  • Implementation
  • Reporting
  • Vulnerability remediation