{"id":16641,"date":"2024-08-13T10:55:08","date_gmt":"2024-08-13T08:55:08","guid":{"rendered":"https:\/\/sits.com\/?post_type=video-records&#038;p=16641"},"modified":"2025-01-24T09:20:49","modified_gmt":"2025-01-24T08:20:49","slug":"effektive-ueberwachung-von-it-systemen","status":"publish","type":"events","link":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/","title":{"rendered":"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">In der heutigen Zeit sind Unternehmen st\u00e4rker denn je auf robuste Cyber-Defense-Services angewiesen, um den wachsenden Bedrohungen und strikteren Vorschriften gerecht zu werden. Marco Lewin zeigt, wie eine effektive \u00dcberwachung von IT-Systemen mittels Managed Detection &amp; Response Ihr Unternehmen vor Produktionsausf\u00e4llen, Datenverlusten und Reputationssch\u00e4den sch\u00fctzt.<\/span><\/span><\/p>\n<p>Erfahren Sie in unserem Webinar \"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services\", wie die Kombination aus modernster Technologie und Expertenwissen eine fr\u00fchzeitige Erkennung und rasche Reaktion auf Cyberangriffe erm\u00f6glicht. Anhand eines Praxisbeispiels wird deutlich, warum die nahtlose Interaktion von Erkennung und Reaktion essenziell ist.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]In der heutigen Zeit sind Unternehmen st\u00e4rker denn je auf robuste Cyber-Defense-Services angewiesen, um den wachsenden Bedrohungen und strikteren Vorschriften gerecht zu werden. Marco Lewin zeigt, wie eine effektive \u00dcberwachung von IT-Systemen mittels Managed Detection &amp; Response Ihr Unternehmen vor Produktionsausf\u00e4llen, Datenverlusten und Reputationssch\u00e4den sch\u00fctzt. Erfahren Sie in unserem Webinar &#8220;Effektive \u00dcberwachung von IT-Systemen mittels [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":5431,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"video_categories":[258],"class_list":["post-16641","events","type-events","status-publish","has-post-thumbnail","hentry","video_categories-cyber-defense"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text]In der heutigen Zeit sind Unternehmen st\u00e4rker denn je auf robuste Cyber-Defense-Services angewiesen, um den wachsenden Bedrohungen und strikteren Vorschriften gerecht zu werden. Marco Lewin zeigt, wie eine effektive \u00dcberwachung von IT-Systemen mittels Managed Detection &amp; Response Ihr Unternehmen vor Produktionsausf\u00e4llen, Datenverlusten und Reputationssch\u00e4den sch\u00fctzt. Erfahren Sie in unserem Webinar &quot;Effektive \u00dcberwachung von IT-Systemen mittels [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T08:20:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"805\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/\",\"name\":\"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg\",\"datePublished\":\"2024-08-13T08:55:08+00:00\",\"dateModified\":\"2025-01-24T08:20:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg\",\"width\":805,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS","og_description":"[vc_row][vc_column][vc_column_text]In der heutigen Zeit sind Unternehmen st\u00e4rker denn je auf robuste Cyber-Defense-Services angewiesen, um den wachsenden Bedrohungen und strikteren Vorschriften gerecht zu werden. Marco Lewin zeigt, wie eine effektive \u00dcberwachung von IT-Systemen mittels Managed Detection &amp; Response Ihr Unternehmen vor Produktionsausf\u00e4llen, Datenverlusten und Reputationssch\u00e4den sch\u00fctzt. Erfahren Sie in unserem Webinar \"Effektive \u00dcberwachung von IT-Systemen mittels [&hellip;]","og_url":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/","og_site_name":"SITS","article_modified_time":"2025-01-24T08:20:49+00:00","og_image":[{"width":805,"height":1435,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/","url":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/","name":"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services - SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg","datePublished":"2024-08-13T08:55:08+00:00","dateModified":"2025-01-24T08:20:49+00:00","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense3.jpg","width":805,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/de\/webinare\/effektive-ueberwachung-von-it-systemen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/de\/"},{"@type":"ListItem","position":2,"name":"Effektive \u00dcberwachung von IT-Systemen mittels Cyber-Defense-Services"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/de\/#website","url":"https:\/\/sits.friendventure.dev\/de\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/de\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/events\/16641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/types\/events"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":5,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/events\/16641\/revisions"}],"predecessor-version":[{"id":19516,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/events\/16641\/revisions\/19516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/media\/5431"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/media?parent=16641"}],"wp:term":[{"taxonomy":"video_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/video_categories?post=16641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}