InterNetX: Difference between revisions
No edit summary |
|||
Line 14: | Line 14: | ||
[[Daniel Eisenhut]], Int Key Account<br> | [[Daniel Eisenhut]], Int Key Account<br> | ||
[[Claus Barche]], Int Mktg and Social Media<br> | [[Claus Barche]], Int Mktg and Social Media<br> | ||
[[Stefan Legner]], Team Leader of Product Management | [[Stefan Legner]], Team Leader of Product Management | ||
| website = [http://www.internetx.com/ www.internetx.com] | | website = [http://www.internetx.com/ www.internetx.com] |
Revision as of 23:21, 15 March 2011
Industry: | Domain Services, Server Solutions |
Founded: | 1998 |
Founder(s): | Hakan Ali, Curd Bems |
Ownership: | United Internet Holdings (as of 2004) |
Headquarters: | Maximilianstr. 6, D-93047 Regensburg |
Employees: | 75 |
Revenue: | 15 million euros (2006) |
Website: | www.internetx.com |
Twitter: | @InterNetX |
Key People | |
Thomas Moerz, CEO Hakan Ali, Dir of Mktg and Sales |
InterNetX GmbH was founded in 1998 in Regensburg, Germany. The company provides internet business solutions, domain sales, virtual and dedicated servers, as well as customized server solutions for resellers and providers. They manage over 2.9 million domains and more than 1,400 physical servers with a focus on professional users in the European marketplace.[1]
InterNetX is accredited with VeriSign, Afilias, PIR, NeuStar and quite a few other registries, providing domains in over 300 TLDs. Via its subsidiary PSI-USA it is an official ICANN registrar.[2]
Products and Services
- Virtual and dedicated, as well as custom, server solutions
- AutoDNS: Domain registration, DNS and management. In service since 1998 and currently in it's 3rd revision which is available in German, English and Spanish.
- IX-TKÜV is another software developed by the company; created for the purpose of monitoring the contents of email traffic (of course in keeping with national laws). [3]
Recent news
The company recently came under a severe DDoS attack that came close to bringing down its services. Since the attack the firm has devoted considerable resources to understanding the methodology behind the attack. [4]