FAQs

Here are answers to some of the most common questions we receive. If you can't find what you're looking for here, don't hesitate to contact us. We are happy to provide further assistance.

General

What is the advantage of Cloud Rebels?

With our IT-as-a-service model, you only pay for the resources you use.

+ No personnel costs
+ No office costs
+ No infrastructure costs
+ No vacation
+ No outages

This can save your company a lot of money.

With Cloud Rebels, you can easily adapt your IT resources to business needs. Our highly qualified IT professionals can always help design and implement effective IT solutions.

I have problems with my company's IT, can Cloud Rebels help me?

Our core competence is providing ITaaS (IT-as-a-Service) for companies.

Imagine us as your internal IT department, but with a fraction of the personnel costs and a wide range of knowledge and sophisticated processes that can be tailored to almost any company, whether small or large.

We are ready to take over your entire IT operation, but can also handle specific modules or individual projects, all within a very concise training period.

I've founded a startup and don't want to handle my IT myself. Can Cloud Rebels take care of that?

Cloud Rebels is particularly suitable for startups without their own IT department. With an easy-to-understand flat-rate model, we take over your IT operations in no time. You only pay a fixed amount per user per month, and we'll take care of the rest.

What is my CR service portal?

A service portal in IT is a web-based platform that provides users with a central location to access and request IT services.

Cloud Rebels utilizes it to manage and track service requests, offering you information and resources. The service portal boasts a user-friendly interface, enabling easy searches and service requests for tasks like software installation, hardware maintenance, or technical support.

It also provides features like knowledge bases and self-service tools that assist you in resolving common issues on your own.

How can we determine if Cloud Rebels aligns with our requirements?

Cloud Rebels provides you with everything you need to run successful IT without the need to hire an in-house IT staff.

Our lean and experienced team handles every aspect of your IT needs. Simply add your favorite services, and let's get started.

In the rare case that we are unable to assist you, we will transparently communicate this before you invest any money.

Services

I have concerns about the security of our systems.
Does Cloud Rebels provide guidance for us?

Yes, information security is a cornerstone of our service and is always considered in everything we do.

We also collaborate with specialists in network security and endpoint protection, such as CrowdStrike. Additionally, we prioritize email and domain security as crucial factors.

Cloud Rebels is your full-service IT provider! Simply talk to us, and we can swiftly enhance your entire IT.

How does the SaaS Connect system work?

Cloud Rebels leverages a sophisticated technology stack to seamlessly integrate almost any SaaS application through our App Connect service. We analyze predominantly manual efforts, enhance application collaboration, and ensure everything is encrypted and GDPR-compliant, of course.

Does Cloud Rebels offer on-site support?

Cloud Rebels typically does not provide on-site support.

While we believe in our ability to address problems or implement your cloud project in a purely remote-controlled and innovative manner, we only consider on-site visits for special occasions.

However, if we have set up your network and encounter a problem that can only be resolved on-site, we will certainly dispatch a technician to address it.

Can we buy devices such as laptops from Cloud Rebels?

Cloud Rebels provides a flexible device leasing program, but purchasing is also easily available. Just choose your preferred device from our catalog, and it will be in your hands in no time.

We are also pleased to outfit your device with EDR and MDM systems and manage your entire hardware fleet. So you don't have to worry because Cloud Rebels takes care of all administrative aspects.

Dealing with the issue of certain emails from my company being marked as SPAM is a concern. Can Cloud Rebels effectively resolve this matter for us?

Give Cloud Rebels a call and let us assist you in analyzing your mailing infrastructure. We can pinpoint the root causes of any issues and provide swift solutions. With expertise in common mailing setup challenges, rest assured, we've got your back. Reach out and let us know how we can assist you.

Does Cloud Rebels secure and manage my rented devices?

We provide a range of options for you to choose from. Whether you prefer a straightforward device or comprehensive endpoint management, let's discuss your needs, and together we'll determine the setup that best suits you.

Can Cloud Rebels help accelerate our company's adoption of cloud services?

In today's landscape, companies should move beyond relying solely on existing on-premise IT infrastructure. Legacy IT poses challenges like time-consuming maintenance, uncertainty, and significant effort, often necessitating a team of individuals for proper management.

We're here to expedite your business and guide you through a seamless transition to the cloud. We firmly believe that this shift will bring you numerous benefits and an exceptional experience.

Termini

DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a protocol designed to mitigate email abuse by enhancing email authentication.

DKIM

DomainKeys Identified Mail (DKIM) is a security protocol used to verify the authenticity of email senders. It is designed to combat unsolicited emails, including spam and phishing attempts. DKIM allows the sender to digitally sign email messages, providing a mechanism for the recipient to confirm that the message has not been altered in transit and that it genuinely originated from the stated sender's domain.

DNS-Records

An entry in the Domain Name System (DNS), commonly known as a DNS record or resource record, facilitates users' access to Internet services, such as visiting a website. Users input the domain name into their browser's URL address line. Subsequently, the DNS performs a lookup, searching the global registration database for the IP address associated with the entered domain. This IP address is essential for establishing a connection to the desired online destination.

EDR

Endpoint Detection and Response (EDR) is a security measure for end devices, including PCs, laptops, mobile phones, and Internet of Things (IoT) devices. Unlike traditional antivirus software that solely scans files, EDR goes further by examining the behavior of the device for anomalies. This investigation can occur on the device itself, or the data can be transmitted to a platform for analysis. EDR provides a comprehensive approach to detecting and responding to potential security threats on endpoint devices.

EU-DSGVO (GDPR)

The General Data Protection Regulation (GDPR) is a regulation of the European Union that establishes standardized rules for processing personal data by most controllers, both private and public, across the EU. Its objectives include ensuring the protection of personal data within the European Union and facilitating the free movement of data within the European internal market. The GDPR aims to enhance individuals' control over their personal information and harmonize data protection practices across EU member states.

GRC

Large international companies with complex structures, especially those listed on the stock exchange, often need to navigate intricate operational landscapes while acting in the best economic interests of both the company and its shareholders. The Governance, Risk & Compliance Model (GRC) plays a crucial role in facilitating seamless collaboration across various locations and departments, both domestically and internationally. This model encapsulates the three fundamental pillars necessary for the effective management of a company:

1. Governance involves corporate management guided by defined principles. This encompasses establishing corporate objectives, determining the methodology for their implementation, and planning the requisite resources to attain these goals.

2. Risk represents risk management involving both known and unknown risks through specified risk analyses. A crucial aspect is addressing risks proactively, devising strategies to mitigate them, and creating contingency plans to handle losses when risks materialize.

3. Compliance involves adhering to internal and external standards governing the provisioning and processing of information. This encompasses requirements from standardization initiatives, access regulations for data, and the legal framework governing its use. Compliance encompasses the entire moral and ethical value system of a company.

IAM

Identity and Access Management (IAM) enables you to authenticate and authorize your employees in a uniform, secure, and consistent manner.

Incident Management

IIncident management, or IT fault management, typically encompasses the entire organizational and technical process of responding to identified or suspected security incidents or operational disruptions in IT areas, as well as preparatory measures and processes. The spectrum of possible incidents ranges from technical problems and vulnerabilities to specific attacks on the IT infrastructure. In a narrower sense, IT incident management must address detailed organizational, legal, and technical issues.

ISO-27001

The international standard ISO/IEC 27001, titled "Information technology — Security techniques — Information security management systems — Requirements," specifies the requirements for establishing, implementing, maintaining, and continually improving a documented information security management system, considering the context of an organization. Additionally, the standard outlines requirements for the assessment and treatment of information security risks based on the unique needs of the organization.

MDM

Mobile device management (MDM) is a proven method and set of tools designed to provide employees with mobile productivity tools and applications while safeguarding corporate data.

PBX

PBX stands for Private Branch Exchange. It is a private telephone system used within a company.

SaaS

Software as a Service (SaaS) is a cloud-based software delivery model where the provider develops, maintains, and delivers software applications over the internet to customers. Users access the software through a web browser, and the provider handles updates and maintenance. SaaS is typically offered on a subscription or pay-as-you-go basis.

SAML/SCIM

SAML stands for Security Assertion Markup Language, which primarily facilitates single sign-on (SSO), allowing users to access multiple web applications with a single set of credentials.

The System for Cross-Domain Identity Management (SCIM) is a combination of application-level protocols that enable the automated provision of data using various authentication methods.

service catalog

A service catalog is a structured and curated collection of business and information technology services within your organization. It serves as a knowledge management tool, providing named answers to questions and inquiries related to the listed services.

SLA

A service level agreement (SLA) is a formal agreement or contract that defines the framework for recurring services and outlines the expectations and responsibilities between the client and the service provider.

SPF

SPF, or Sender Policy Framework, is an email authentication protocol designed to detect email spoofing and prevent unauthorized senders from sending messages on behalf of a specific domain.

SoC2

SOC 2, pronounced “Sock Two” and officially known as Service Organization Control 2, is a standard according to which service organizations report on the status of specific internal control parameters. These include security, availability, processing integrity, confidentiality, and data protection.

SSO

Single sign-on (SSO) is an authentication method that allows users to securely authenticate to multiple applications and websites using only one set of login credentials.

VPN

A virtual private network, or VPN for short, is a virtual network where various end devices are not directly physically connected to each other or to a central router, unlike a home network. Instead, the connection is established through secure tunnels over the Internet, providing a secure and encrypted communication channel for data transmission between devices.

WAF

A web application firewall (WAF) is a type of firewall that monitors, filters, and blocks data packets as they travel to and from a website or web application. It can be implemented as a network-based, host-based, or cloud-based solution, providing an additional layer of security by analyzing and controlling HTTP traffic to prevent potential cyber threats and attacks on web applications.

Zero Trust

The zero trust security model, also known as zero trust architecture and sometimes referred to as perimeterless security, describes an approach to the strategy, design, and implementation of IT systems. In this model, trust is not assumed for any entity, whether internal or external to the network. Instead, verification is required from everyone trying to access resources within the network, regardless of their location or the device they are using. This approach helps enhance security by minimizing the potential for unauthorized access and reducing the risk of internal threats.

Still having questions?

Contact us