{"id":13182,"date":"2024-04-26T15:11:58","date_gmt":"2024-04-26T13:11:58","guid":{"rendered":"https:\/\/sits.com\/produkte\/vulnerability-scanning\/"},"modified":"2024-06-11T10:06:56","modified_gmt":"2024-06-11T08:06:56","slug":"vulnerability-management","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_VulnerabilityScanning-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Bedrohungen rechtzeitig entdecken und beseitigen \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Vulnerability Management \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Beratung anfordern<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Schwachstellenanalyse durch kontinuierliche 360-Grad-Scans<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Eine einzige IT-Schwachstelle kann das gesamte Unternehmensnetzwerk gef\u00e4hrden. Das Vulnerability Management ist daher wichtig, um Sicherheitsl\u00fccken zu identifizieren und zu schlie\u00dfen, bevor sie ausgenutzt werden. Das Expertenteam von SITS bietet umfassende Scanning-Dienste, die Schwachstellen nicht nur aufdecken, sondern auch bewerten und priorisieren.<\/p>\n<p>Mit unseren Assessments erfahren Sie, welche IT-Systeme in Ihrem Unternehmen angreifbar sind und welche Anwendungs-Exploits Hacker nutzen k\u00f6nnen. Dar\u00fcber hinaus erhalten Sie klare Handlungsempfehlungen.<\/p>\n<ul>\n<li><strong>Umfassende Schwachstellenerkennung:<\/strong> Mit modernsten und KI-gest\u00fctzten Scanning-Methoden erkennen wir Sicherheitsl\u00fccken in Ihrer IT-Landschaft.<\/li>\n<li><strong>Risikobewertung und Priorisierung:<\/strong> Wir helfen Ihnen, identifizierte Risiken nach Dringlichkeit zu ordnen, damit Sie wissen, wo Handlungsbedarf besteht.<\/li>\n<li><strong>Handlungsempfehlungen:<\/strong> Nach der Risikoanalyse erhalten Sie konkrete Empfehlungen, um die Sicherheit Ihrer Systeme zu erh\u00f6hen.<\/li>\n<li><strong>Regelm\u00e4\u00dfige Berichte:<\/strong> Mit unseren detaillierten Berichten bleiben Sie \u00fcber den Sicherheitsstatus Ihrer IT immer informiert.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"title\">\n                            Jetzt Gespr\u00e4ch vereinbaren                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h2 smx-headline \">Unentdeckte Schwachstellen<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">Erkennung vor, w\u00e4hrend und nach dem Ernstfall<\/div>\n<p>[\/vc_column_text][vc_column_text]Durch ungepatchte Software, Netzwerkl\u00fccken oder unbekannte Ger\u00e4te im Firmennetzwerk gelangen Angreifer schnell auf die Rechner Ihrer Mitarbeitenden und k\u00f6nnen betr\u00e4chtlichen Schaden anrichten. Zu den gr\u00f6\u00dften Sicherheitsrisiken geh\u00f6ren:[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Ihre Herausforderungen<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <h2 class=\"text-image-slide_headline headline h4\">\n                            Die Herausforderungen f\u00fcr Unternehmen                        <\/h2>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li>Schwachstellen, die bis zum Ernstfall unbemerkt bleiben<\/li>\n<li>Unentdeckte L\u00fccken durch unbekannte und nicht verwaltete Ger\u00e4te \u2013 eine offene T\u00fcr f\u00fcr Cyber-Kriminelle (\u201eShadow IT\u201c)<\/li>\n<li>Nicht aktuelle Betriebssysteme und Anwendungen: Ungepatchte Software ist f\u00fcr Hacker ein gefundenes Fressen.<\/li>\n<li>Korrekte Bewertung und Priorisierung im Angriffsfall<\/li>\n<li>Zeit- und Ressourcenmangel: IT-Teams sind oft \u00fcberlastet und k\u00f6nnen nicht alle Sicherheitsrisiken abdecken.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div><div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Sicherheit mit einem Klick!                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Unsere Experten f\u00fcr Assessment &amp; Advisory stehen Ihnen zur Verf\u00fcgung: Von Penetrationstests bis Compliance - wir schmieden ma\u00dfgeschneiderte Strategien, um Ihre IT-Sicherheit auf das n\u00e4chste Level zu bringen.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#kontakt\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Jetzt Kontakt aufnehmen<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h2 smx-headline \">Vulnerability Management as a Service<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">Komplettpr\u00fcfung Ihrer IT-Systeme auf Schwachstellen und Exploits<\/div>\n<p>Das Vulnerability Management as a Service von SITS durchleuchtet Ihre Systeme intern und extern auf Schwachstellen und potenzielle Einfallstore f\u00fcr Cyber-Angreifer. Mit unseren Scans decken wir Ihr komplettes Netzwerk ab. Hier ein \u00dcberblick \u00fcber unser Angebot:[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-3 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Automatisierte Scans                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir f\u00fchren unsere Scans au\u00dferhalb Ihrer Gesch\u00e4ftszeiten durch, der Betrieb wird also nicht unterbrochen. Dabei pr\u00fcfen wir auf Wunsch auch Netzwerkger\u00e4te an Remote-Standorten.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Anpassbare Scans                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Sie k\u00f6nnen eigene Scan-Intervalle w\u00e4hlen, die Tiefe der Scans festlegen \u2013 und bestimmen, ob wir neben lokalen Ressourcen auch Ger\u00e4te und Dienste in der Cloud \u00fcberpr\u00fcfen.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Umfassende Auswertung                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    In unserer Auswertung der Scans erhalten Sie einen detaillierten \u00dcberblick \u00fcber Daten und Schwachstellen, die f\u00fcr Hacker vor dem Eindringen ins System ersichtlich sind.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=\"2\/3\"]<h3  class=\"h2 smx-headline \">Vulnerability Management: Unsere Pakete<\/h3>[vc_column_text]Das Vulnerability-Management-Angebot der SITS Group bietet ein breites Spektrum an Optionen.<\/p>\n<p>Das Basispaket besteht aus einem einmaligen Beratungsgespr\u00e4ch und einem initialen Scan. So erhalten Sie einen klaren Einblick in die aktuelle Sicherheitslage Ihres Unternehmens.<\/p>\n<p>Mit unserem fortlaufenden Managed Service werden Ihre Sicherheitsma\u00dfnahmen viertelj\u00e4hrlich evaluiert und weiterentwickelt. Am umfassendsten ist unser ma\u00dfgeschneiderter Custom Service, der sich nahtlos in die Strukturen Ihres Unternehmens integriert.<\/p>\n<p>Unser Angebot im Einzelnen:[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\"1\/3\"][\/vc_column_inner][\/vc_row_inner]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"service-levels_wrapper\">\n    <div class=\"service-levels_container\">\n\n                <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Beratung                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Level 1                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Unkomplizierte Beratung <\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Aktuelle Momentaufnahme der Schwachstellen Ihrer IT-Infrastruktur<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Priorisierte Empfehlungen f\u00fcr Abhilfema\u00dfnahmen<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\" title=\"Title\">\n                                Kontakt                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Managed Service                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Level 2                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Nachhaltige L\u00f6sung basiert auf viertelj\u00e4hrlichen Snapshots Ihrer IT-Sicherheitsrisiken<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Priorisierte Handlungsempfehlungen<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Verfolgung von Ma\u00dfnahmen und Fortschritte \u00fcber einen l\u00e4ngeren Zeitraum<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\" title=\"Title\">\n                                Kontakt                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Custom Service                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Level 3                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Ma\u00dfgeschneiderte L\u00f6sung<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Gestaltet nach den spezifischen Anforderungen und Bed\u00fcrfnissen Ihres Unternehmens<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Implementiert und betrieben von uns.<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\" title=\"title\">\n                                Kontakt                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n            \n\n    <\/div>\n<\/div>\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div id='festes_grid'>\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Assessmentandadvisory-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <h3 class=\"h2 smx-headline\">\n                    Vulnerability Management: Ihre Vorteile \n                <\/h3 >\n            <\/div>\n            <div class=\"subheadline\">\n                 \n            <\/div>\n            <div class=\"text\">\n                Dank kontinuierlicher Scans wissen Sie stets \u00fcber die Schwachstellen Ihrer Systeme Bescheid. Ihre Vorteile: \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-3  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Einhaltung-1.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Einhaltung von Compliance und Cyber-Sicherheitsvorschriften                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Die Regelwerke NIS2, PCI DSS und HIPAA betonen die Bedeutung des Schwachstellen-Scannings zum Schutz sensibler Daten. Doch es geht nicht nur um das Erf\u00fcllen von Richtlinien: Sie erhalten damit wirksamen Schutz f\u00fcr Ihre Unternehmens-IT.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Abwehr-1.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                24\/7-Abwehr                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Die kontinuierliche Optimierung der Schwachstellenscans st\u00e4rkt die Abwehrkraft Ihres Unternehmens gegen Cyber-Angriffe.\n<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Update-1.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Stets up to date                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Regelm\u00e4\u00dfige Reviews und Analysen zu m\u00f6glichen Schwachstellen und die Erweiterung der Scan-Methoden auf Basis der neuesten Entwicklungen sch\u00fctzen Sie besser vor aktuellen Bedrohungen.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                            <\/div>\n    <\/div>\n<\/div>\n\n<\/div >\n\n\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/kommunikation-und-koordination-bei-einem-cyber-angriff\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Kommunikation und Koordination bei einem Cyber-Angriff                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/wie-widerstandsfaehig-ist-ihre-unternehmens-it-wirklich\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png 1200w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-300x157.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-1024x535.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Resilient Workplace<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Wie widerstandsf\u00e4hig ist Ihre Unternehmens-IT wirklich?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/ab-1-april-2025-meldepflicht-fuer-cyberangriffe-auf-kritische-infrastrukturen-in-der-schweiz\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>SITS<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Ab 1. April 2025: Meldepflicht f\u00fcr Cyberangriffe auf kritische Infrastrukturen in der Schweiz                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/blog-managed-soc\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed SOC: Vorteile, Kosten & Top-Anbieter finden (Checkliste)                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/sicherheit-von-identitaeten-aktuelle-trends\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Sicherheit von Identit\u00e4ten: Aktuelle Trends                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/microsoft-entra\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1830\" height=\"1190\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg 1830w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-300x195.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1024x666.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-768x499.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1536x999.jpeg 1536w\" sizes=\"auto, (max-width: 1830px) 100vw, 1830px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Entra: Portr\u00e4t einer vielseitigen Produktfamilie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/identitaet-trifft-resilience\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Identit\u00e4t trifft Resilience                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/nis2-penetrationstests-technik-nis2-konform-in-griff-kriegen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Penetrationstests: Technik NIS2-konform in Griff kriegen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/resilienz-durch-identitaet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Resilienz durch Identit\u00e4t                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/verschluesselung-in-den-griff-bekommen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Verschl\u00fcsselung in den Griff bekommen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/microsoft-sentinel-als-azure-siem-vorteile-kosten\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Sentinel als Azure SIEM \u2013 Vorteile & Kosten                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/ki-attacken-abwehren-so-lassen-sich-daten-und-systeme-schuetzen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            KI-Attacken abwehren: So lassen sich Daten und Systeme sch\u00fctzen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO-27001-Zertifizierung ohne Umwege                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/mit-managed-services-gegen-den-fachkraeftemangel\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Mit Managed Services gegen den Fachkr\u00e4ftemangel                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security mit SASE, so funktioniert\u2019s                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/devops-sicherheit-belastungstest-fuer-kultur-und-technologie\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps-Sicherheit: Belastungstest f\u00fcr Kultur und Technologie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"kontakt\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Ihre digitale Festung ist nur einen Klick entfernt.        <\/div>\n        <div class=\"subheadline\">\n            Kontaktieren Sie uns f\u00fcr ma\u00dfgeschneiderte Sicherheitsstrategien.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '0f9c17f7-fa3c-4bc5-a0b5-75cee2a14df9'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Jonas Fischer                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Eine einzige IT-Schwachstelle kann das gesamte Unternehmensnetzwerk gef\u00e4hrden. Vulnerability Scanning ist ein wichtiges Werkzeug, um Sicherheitsl\u00fccken zu identifizieren und zu schlie\u00dfen, bevor sie ausgenutzt werden.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13182","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Management | Sicherheit maximieren<\/title>\n<meta name=\"description\" content=\"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- &amp; Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Management | Sicherheit maximieren\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- &amp; Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-11T08:06:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/\",\"name\":\"Vulnerability Management | Sicherheit maximieren\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\"},\"datePublished\":\"2024-04-26T13:11:58+00:00\",\"dateModified\":\"2024-06-11T08:06:56+00:00\",\"description\":\"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- & Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Management | Sicherheit maximieren","description":"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- & Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Vulnerability Management | Sicherheit maximieren","og_description":"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- & Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!","og_url":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/","og_site_name":"SITS","article_modified_time":"2024-06-11T08:06:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/","url":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/","name":"Vulnerability Management | Sicherheit maximieren","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#website"},"datePublished":"2024-04-26T13:11:58+00:00","dateModified":"2024-06-11T08:06:56+00:00","description":"Vulnerability Management: 24\/7-Abwehr \u2713 stets up to date \u2713 Einhaltung von Compliance- & Cyber-Sicherheitsvorschriften \u2713 \u25b6 Jetzt anfragen!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/ch\/assessment-advisory\/vulnerability-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/ch\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/ch\/#website","url":"https:\/\/sits.friendventure.dev\/ch\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/ch\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/ch\/","logo":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13182\/revisions"}],"predecessor-version":[{"id":15132,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13182\/revisions\/15132"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media?parent=13182"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/product_categories?post=13182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}