{"id":13357,"date":"2024-04-26T15:54:05","date_gmt":"2024-04-26T13:54:05","guid":{"rendered":"https:\/\/sits.com\/produkte\/implementation-von-zero-trust\/"},"modified":"2024-07-23T16:05:54","modified_gmt":"2024-07-23T14:05:54","slug":"zero-trust-network-access","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/","title":{"rendered":"Zero Trust Network Access"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_ZeroTrust-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Trust No One: Mit Zero Trust zum Schutz Ihrer Identit\u00e4ten \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Zero Trust Network Access \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Beratung anfordern<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Zero Trust Network Access auf einen Blick<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Zero Trust Network Access ist ein mittlerweile etabliertes Sicherheitskonzept f\u00fcr Unternehmen. Es geht davon aus, dass Bedrohungen jederzeit au\u00dferhalb und innerhalb des Netzwerks oder der Cloud auftreten k\u00f6nnen \u2013 oder die IT-Infrastruktur bereits infiziert ist. Unabh\u00e4ngig vom Standort wird deshalb keinem Ger\u00e4t und keinem Nutzer vertraut: Das Konzept setzt auf Verifizierung, Autorisierung und kontinuierliche Validierung.<\/p>\n<p>Die SITS bietet Ihnen die Implementierung einer starken Zero-Trust-Architektur an. Dazu geh\u00f6ren Identit\u00e4ts- und Zugriffsverwaltungen, mehrstufige Authentifizierungsprozesse und Mikrosegmentierung f\u00fcr Ihre Netzwerke.<\/p>\n<p>So wird sichergestellt, dass nur verifizierte Personen oder Ger\u00e4te Zugriff auf Ihre IT-Ressourcen erhalten. Unsere Zero-Trust-Implementierung sorgt f\u00fcr einen Rundumschutz Ihrer IT:<\/p>\n<ul>\n<li>Mit klaren Zugriffsbeschr\u00e4nkungen hilft Zero Trust, Bedrohungen durch Datenlecks oder Insider, Netzwerk- und Remote-Schwachstellen sowie Compliance-Probleme zu reduzieren.<\/li>\n<li>SITS implementiert eine \u201eNever trust, always verify\u201c-Philosophie in Ihrem Unternehmen \u2013 etwa mit Tools wie Cloud Access Network Broker und Sicherheitstrainings.<\/li>\n<li>Unsere Fachleute bieten proaktiven, vollst\u00e4ndig skalierbaren Schutz, sorgen f\u00fcr Compliance und 24\/7-Erreichbarkeit.<\/li>\n<li>Dank unserer Zero-Trust-Expertise erhalten Sie klare Einblicke in m\u00f6gliche Sicherheitsvorf\u00e4lle \u2013 und im Ernstfall proaktive Unterst\u00fctzung bei der Wiederherstellung Ihrer IT.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"\">\n                            Jetzt Gespr\u00e4ch vereinbaren                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline \">Zero Trust Identity Management: Wie sicher ist sicher?<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">Neuartige Gefahren verlangen neuartige Sicherheitsphilosophien.<\/div>\n<p>[\/vc_column_text][vc_column_text]In den letzten Jahren haben Malware-Angriffe und Datendiebst\u00e4hle aufgrund schwacher oder gestohlener Passw\u00f6rter und fehlender Zugriffskontrollen massiv zugenommen. Um sich zu sch\u00fctzen, m\u00fcssen Unternehmen unter anderem f\u00fcr eine klare Identit\u00e4ts- und Zugriffsverwaltung sorgen.[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Wie sicher ist sicher?<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_ZeroTrust.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <h2 class=\"text-image-slide_headline headline h4\">\n                            Zero Trust Network Access - Sicherheitsl\u00fccken durch fehlende Kontrollen                        <\/h2>\n                        <div class=\"text-image-slide_text\">\n                            \u201eWieso hatte unser Praktikant Zugriff auf die Daten unseres neuen Projekts?\u201c<br \/>\n\u201eWeshalb konnte sich unser Ex-Mitarbeiter ins System einloggen?\u201c<br \/>\n\u201eWie erm\u00f6glichen wir Kollegin Meyer sicheres Arbeiten aus dem Caf\u00e9?\u201c \u201eWer greift gerade wie auf unser Netzwerk zu?\u201c<\/p>\n<p>In Zeiten von Remote Work, Cloud-Diensten und quer \u00fcber den Globus verteilten Ger\u00e4ten m\u00fcssen sich Unternehmen mit zahlreichen neuen Fragen auseinandersetzen. Diese betreffen insbesondere Sicherheitsl\u00fccken, die durch eine unklare Zuteilung von Zugriffsrechten, mangelhafte Zugangskontrollen und unsichere Datenverbindungen entstehen.<\/p>\n<p>Mit Zero Trust schaffen wir Abhilfe: Das Konzept sorgt f\u00fcr klare Regeln, Sicherheitsbewusstsein der Mitarbeitenden und Kontrolle. So vermeiden Sie eine Reihe von Gefahren. Dazu geh\u00f6ren unter anderem:<\/p>\n<ul>\n<li><strong>Unbefugte Zugriffe &amp; Datenpannen: <\/strong>Zugriffe von Unbefugten bedrohen die Netzwerksicherheit und sensible Daten.<\/li>\n<li><strong>Insider-Bedrohungen: <\/strong>Insider, die dank mangelnder Zugangskontrollen unautorisiert auf Daten zugreifen k\u00f6nnen, stellen ein massives Sicherheitsrisiko dar.<\/li>\n<li><strong>Schwachstellen im Homeoffice: <\/strong>Die Sicherung von Homeoffice-Arbeitspl\u00e4tzen fordert durchg\u00e4ngige Zugriffsrichtlinien und sichere Verbindungen.<\/li>\n<li><strong>Netzwerk-Exploits &amp; Malware: <\/strong>Mangelhafte Zugangssegmentierung und -kontrolle erh\u00f6hen das Risiko von Netzwerk-Exploits und Malware-Infektionen<\/li>\n<li><strong>Compliance und Regulierung: <\/strong>Datenlecks aufgrund fehlender Zugriffskontrollen k\u00f6nnen zu Strafen und Sanktionen f\u00fchren.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_SecurityITSolutions-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Ihre Workload &amp; Network Security Experten                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Kontaktieren Sie unsere Experten f\u00fcr fortgeschrittene Netzwerk- und Workload-Sicherheitsl\u00f6sungen wie Zero Trust Access, Next-Gen Firewalls und SASE. Wir bieten ma\u00dfgeschneiderte Sicherheitsstrategien und -management f\u00fcr umfassenden Schutz.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#kontakt\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Jetzt Kontakt aufnehmen<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline  center\">Mit Zero Trust Network Access zu mehr Sicherheit<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Schluss mit klassischem Passwortschutz<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Gem\u00e4\u00df den drei Grundprinzipien von Zero Trust (<a href=\"https:\/\/sits.com\/ch\/ressourcen\/cisco-zero-trust-cheat-sheet\/\">Zero Trust Workplace, Workload und Workforce \u2013 siehe unser Cheat Sheet) \u202f<\/a>verbessern wir nachhaltig den Schutz Ihrer digitalen Konten und Identit\u00e4ten. Dazu dienen folgende Ma\u00dfnahmen:<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-4 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Mit Zero Trust zu mehr Sicherheit                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Durch Multi-Factor-Authentification sch\u00fctzen wir Sie vor Account-\u00dcbernahmeangriffen. Die SITS-Fachleute richten eine sichere Authentifizierung ein, die das Risiko unautorisierten Zugriffs minimiert.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Mikrosegmentierung                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir isolieren kritische Workloads in Ihrem Netzwerk, um sie vor unbefugtem Zugriff zu sch\u00fctzen und die Sicherheit Ihrer Daten zu gew\u00e4hrleisten.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Zugriff mit minimalen Rechten                                 <\/div>\n                                <div class=\"iconbox--content\">\n                                    Durch die Implementierung des \u201ePrinzips der geringsten Rechte\u201c begrenzen wir den Zugang zu sensiblen Informationen, reduzieren die Angriffsfl\u00e4che und minimieren das Risiko von Datenverletzungen.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    24\/7 Monitoring                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unsere Spezialisten \u00fcberwachen Ihr Netzwerk in Echtzeit, erkennen Bedrohungen sofort und reagieren bei Sicherheitsvorf\u00e4llen umgehend, um Ihre Daten und Systeme zu sch\u00fctzen.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h3 class=\"summary-headline headline h2\">Die Zero-Trust-Strategie von SITS<\/h3>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Als 360\u00b0-Dienstleister identifizieren wir Schwachstellen in allen Bereichen Ihres Unternehmens und implementieren \u00fcberall Zero Trust. Sie erhalten damit einen Rundumschutz vor unerlaubten Zugriffen. Dazu dienen folgende Elemente:<\/p>\n<p><strong>Reaktive Zero-Trust-Network-Access-Implementierung<\/strong><br \/>\nUnser Fokus liegt auf der Verhinderung von Sicherheitsverletzungen, bevor sie \u00fcberhaupt auftreten: Wir implementieren Zero Trust f\u00fcr Konten, Daten und Apps. Im Gegensatz zu traditionellen Perimeter-Verteidigungen setzen wir auf eine Zero-Trust-L\u00f6sung, die sich jeder Situation anpasst \u2013 ohne zu h\u00e4ufig oder unn\u00f6tig nach Verifikation zu fragen.<\/p>\n<p><strong>Next-Gen-Technologien<\/strong><br \/>\nMit KI-Unterst\u00fctzung steigern wir die Leistungsf\u00e4higkeit unserer Zero-Trust-Implementierung. Unsere L\u00f6sung \u00fcberwacht gesetzeskonform das Verhalten von Diensten und die Zugriffe von Mitarbeitenden auf das IT-System \u2013 und erkennt dank Machine Learning Anomalien zunehmend besser. Sie umfasst auch adaptive Zugriffsrechte, die sich je nach Standort des Mitarbeitenden oder Sicherheitsstatus seines Ger\u00e4ts \u00e4ndern.<\/p>\n<p>Au\u00dferdem bieten wir:<\/p>\n<ul>\n<li><strong>Schulungsprogramme<\/strong>: Mit umfangreichen Trainings st\u00e4rken wir die Awareness und die Sicherheitspraktiken Ihres Teams.<\/li>\n<li><strong>Sicherheit dank Compliance:<\/strong> Unsere Zero-Trust-L\u00f6sung bietet vollst\u00e4ndige Compliance. Wir f\u00fchren alle n\u00f6tigen Kontrollen zur Einhaltung von Standards wie FINMA, BAFIN oder HIPTA durch.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/kommunikation-und-koordination-bei-einem-cyber-angriff\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Kommunikation und Koordination bei einem Cyber-Angriff                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/wie-widerstandsfaehig-ist-ihre-unternehmens-it-wirklich\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png 1200w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-300x157.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-1024x535.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Resilient Workplace<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Wie widerstandsf\u00e4hig ist Ihre Unternehmens-IT wirklich?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/ab-1-april-2025-meldepflicht-fuer-cyberangriffe-auf-kritische-infrastrukturen-in-der-schweiz\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>SITS<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Ab 1. April 2025: Meldepflicht f\u00fcr Cyberangriffe auf kritische Infrastrukturen in der Schweiz                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/blog-managed-soc\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed SOC: Vorteile, Kosten & Top-Anbieter finden (Checkliste)                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/sicherheit-von-identitaeten-aktuelle-trends\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Sicherheit von Identit\u00e4ten: Aktuelle Trends                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/microsoft-entra\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1830\" height=\"1190\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg 1830w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-300x195.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1024x666.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-768x499.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1536x999.jpeg 1536w\" sizes=\"auto, (max-width: 1830px) 100vw, 1830px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Entra: Portr\u00e4t einer vielseitigen Produktfamilie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/identitaet-trifft-resilience\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Identit\u00e4t trifft Resilience                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/nis2-penetrationstests-technik-nis2-konform-in-griff-kriegen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Penetrationstests: Technik NIS2-konform in Griff kriegen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/resilienz-durch-identitaet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Resilienz durch Identit\u00e4t                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/verschluesselung-in-den-griff-bekommen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Verschl\u00fcsselung in den Griff bekommen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/microsoft-sentinel-als-azure-siem-vorteile-kosten\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Sentinel als Azure SIEM \u2013 Vorteile & Kosten                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/ki-attacken-abwehren-so-lassen-sich-daten-und-systeme-schuetzen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            KI-Attacken abwehren: So lassen sich Daten und Systeme sch\u00fctzen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO-27001-Zertifizierung ohne Umwege                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/mit-managed-services-gegen-den-fachkraeftemangel\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Mit Managed Services gegen den Fachkr\u00e4ftemangel                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security mit SASE, so funktioniert\u2019s                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/ch\/blog\/devops-sicherheit-belastungstest-fuer-kultur-und-technologie\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps-Sicherheit: Belastungstest f\u00fcr Kultur und Technologie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"kontakt\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Ihre Sicherheit ist unsere Leidenschaft.        <\/div>\n        <div class=\"subheadline\">\n            Kontaktieren Sie uns f\u00fcr robusten Schutz Ihres Unternehmens.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '165db93c-10f1-45b7-8c24-2c695aeb32ca'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SecurityITSolutions-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Julia Wagner                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Managerin, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>\u201eZero Trust\u201c ist ein mittlerweile etabliertes Sicherheitskonzept f\u00fcr Unternehmen. Es geht davon aus, dass Bedrohungen jederzeit au\u00dferhalb und innerhalb des Netzwerks oder der Cloud auftreten k\u00f6nnen.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13357","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS<\/title>\n<meta name=\"description\" content=\"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-23T14:05:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/\",\"name\":\"Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\"},\"datePublished\":\"2024-04-26T13:54:05+00:00\",\"dateModified\":\"2024-07-23T14:05:54+00:00\",\"description\":\"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Network Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS","description":"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS","og_description":"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!","og_url":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/","og_site_name":"SITS","article_modified_time":"2024-07-23T14:05:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/","url":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/","name":"Zero Trust Network Access | Optimale Netzwerksicherheit mit SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#website"},"datePublished":"2024-04-26T13:54:05+00:00","dateModified":"2024-07-23T14:05:54+00:00","description":"Zero Trust Network Access: 24\/7 Monitoring \u2713 Mikrosegmentierung \u2713 Next-Gen-Technologien \u2713 Sicherheit dank Compliance \u2713 \u25b6 Hier anfragen!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/ch\/security-it-solutions\/zero-trust-network-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/ch\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Network Access"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/ch\/#website","url":"https:\/\/sits.friendventure.dev\/ch\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/ch\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/ch\/","logo":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":1,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13357\/revisions"}],"predecessor-version":[{"id":15100,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/produkte\/13357\/revisions\/15100"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media?parent=13357"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/product_categories?post=13357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}