{"id":13193,"date":"2024-04-26T15:19:15","date_gmt":"2024-04-26T13:19:15","guid":{"rendered":"https:\/\/sits.com\/?post_type=produkte&#038;p=13193"},"modified":"2024-07-18T11:13:39","modified_gmt":"2024-07-18T09:13:39","slug":"schwachstellenmanagement","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/","title":{"rendered":"Schwachstellenmanagement"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_AttackPathManagement-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Proaktiv statt reaktiv: Hackerperspektive einnehmen, Angriffe verhindern \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Schwachstellenmanagement \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Beratung anfordern<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Breach &amp; Attack Simulation<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Unser Schwachstellenmanagement ermittelt IT-Schwachstellen und die komplette Angriffskette aus Hackersicht. Der Ansatz geht \u00fcber einfaches <a href=\"\/de\/assessment-advisory\/pentesting\/\">Pentesting<\/a> hinaus: Statt die menschliche Perspektive einzunehmen, nutzen wir hochautomatisierte Tools. Pentests erfolgen dagegen punktuell und manuell.<br \/>\nAttack Path Management (APM) sorgt f\u00fcr eine kontinuierliche \u00dcberwachung und Analyse Ihrer Sicherheitslage und schl\u00e4gt im Ernstfall Alarm. Mit unserem APM-Service identifizieren wir Risiken und unterst\u00fctzen Sie bei der sofortigen Behebung. So sch\u00fctzen Sie effizient Ihre wichtigsten Ressourcen, Nutzer und Anwendungen.<\/p>\n<ul>\n<li>Wir ermitteln, wie sich ein Eindringling in Ihrer IT-Infrastruktur bewegen w\u00fcrde und wie Sie Angriffspfade unterbrechen k\u00f6nnen.<\/li>\n<li>Wir decken das schw\u00e4chste Glied in der IT-Kette Ihres Unternehmens auf.<\/li>\n<li>Unser Service kombiniert die marktf\u00fchrenden und automatisierten L\u00f6sungen von XM Cyber mit einem Beratungsangebot.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"\">\n                            Jetzt Gespr\u00e4ch vereinbaren                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h2 smx-headline \">Die (un)bekannte Bedrohung<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">Gefahren durch Wissen bek\u00e4mpfen<\/div>\n<p>[\/vc_column_text][vc_column_text]Die gr\u00f6\u00dfte Bedrohung in jeder IT-Umgebung ist das Unbekannte. Wenn Hacker unbekannte Schwachstellen ausnutzen, ben\u00f6tigen sie im Schnitt nur vier Schritte, um Zugang zu 94 Prozent* der kritischen Unternehmensressourcen zu erhalten. Eine einzige Sicherheitsl\u00fccke reicht aus, um im Handumdrehen Zugriff auf Dutzende weiterer Ressourcen und Systeme zu erhalten.<\/p>\n<p>*Quelle: <a href=\"https:\/\/www.govinfosecurity.com\/attack-paths-just-4-steps-compromise-94-assets-a-19285\" target=\"_blank\" rel=\"noopener\">XM Cyber<\/a>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Mit vorbeugenden Ma\u00dfnahmen k\u00fcnftige Angriffe erschweren<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/BusinessChallenge_AttackPathManagement.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <h2 class=\"text-image-slide_headline headline h4\">\n                            Schwachstellenmanagement: Ein wirksamer Schutz                        <\/h2>\n                        <div class=\"text-image-slide_text\">\n                            Im Vergleich zu den potenziellen Auswirkungen von Cyber-Angriffen sind die Kosten f\u00fcr pr\u00e4ventive Ma\u00dfnahmen unbedeutend \u2013 und Unternehmen k\u00f6nnen von der Implementierung eines Attack Path Management Services massiv profitieren. So berichtete eine Forrester-Studie von einem repr\u00e4sentativen Unternehmen, das durch die Implementierung einer XM-Cyber-L\u00f6sung innerhalb von drei Jahren einen ROI von 394 Prozent erzielte.*<br \/>\nIm Einzelnen brachte die APM-Implementierung:<\/p>\n<ul>\n<li>Kosteneinsparungen von 12,4 Millionen US-Dollar durch die Vermeidung von Wiederherstellungsma\u00dfnahmen, Bu\u00dfgeldern, Umsatzeinbu\u00dfen und Reputationsverlust<\/li>\n<\/ul>\n<ul>\n<li>Einsparungen von 1,4 Millionen Dollar bei den Kosten von Penetrationstests<\/li>\n<\/ul>\n<ul>\n<li>Senkung der Arbeitskosten im Zusammenhang mit Patching und dem Beheben von Sicherheitsl\u00fccken um 700.000 Dollar<\/li>\n<\/ul>\n<ul>\n<li>Verringerung der Wahrscheinlichkeit eines schwerwiegenden Sicherheitsvorfalls um 90 Prozent<\/li>\n<\/ul>\n<p>*Quelle: XM Cyber                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h2 smx-headline  center\">Pr\u00e4ventivschutz f\u00fcr Ihre IT<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Bedrohungen beseitigen durch vorausschauende Analyse<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Mit unserer L\u00f6sung steht Ihre IT ab sofort unter 24\/7-\u00dcberwachung durch unseren Schwachstellenmanagement Service: Wir decken potenzielle Einfallstore aus Hackerperspektive auf und identifizieren die schw\u00e4chsten Glieder in der Kette. So wissen Sie, an welchen Stellen Ihre IT-Umgebung gef\u00e4hrdet ist und welche Sicherheitsl\u00fccken Sie vorrangig schlie\u00dfen sollten.<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-6 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Schnelle Behebung                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir erg\u00e4nzen die XM-Cyber-L\u00f6sung durch die Implementierung einer aktiven Schutzfunktion und die Umsetzung von Sicherheitsstrategien. So k\u00f6nnen Sie sofort auf erkannte Bedrohungen reagieren.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Breach & Attack Simulations                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unsere APM-L\u00f6sung pr\u00fcft automatisch Ihre IT-Sicherheit und simuliert kontinuierlich Angriffe. Dank des toolgest\u00fctzten Ansatzes von XM Cyber nutzen wir dabei keine internen Ressourcen Ihres Unternehmens.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Intensive Analyse Ihrer IT                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unsere Analysen geben Aufschluss \u00fcber Schwachstellen Ihrer IT, ohne die Verf\u00fcgbarkeit Ihrer Systeme zu beeintr\u00e4chtigen.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Klare Handlungsempfehlungen                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir priorisieren identifizierte Schwachstellen nach Schweregrad. Auf dieser Basis erstellen wir eine Roadmap f\u00fcr die Implementierung der wichtigsten Ma\u00dfnahmen zur Verbesserung Ihrer IT-Sicherheit.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Integration in Ihre Systeme                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unser APM bindet sich nahtlos in Ihre IT und Infrastruktur ein und arbeitet mit Sicherheitsl\u00f6sungen von Drittanbietern zusammen. So erhalten Sie sie einen konsolidierten \u00dcberblick \u00fcber alle IT-Schwachstellen.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    30-Tage-Assessment                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Sie m\u00f6chten Ihre IT schnell auf Herz und Nieren pr\u00fcfen? Dann probieren Sie unser 30-t\u00e4giges Exposure Assessment! N\u00e4here Infos finden Sie hier.                                 <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" id='#'>\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Ihr Assessment &amp; Advisory Team                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Unsere Experten stehen parat f\u00fcr die Implementierung von Vulnerability Scans, Penetrationstests, BCM und mehr \u2013 optimieren Sie Ihre IT-Sicherheit und Compliance.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#kontakt\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Jetzt Kontakt aufnehmen<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=\"2\/3\"]<h3  class=\"h1 smx-headline \">Schwachstellenmanagement: Unsere Angebote f\u00fcr Sie<\/h3>[vc_column_text]Unser Attack Path Management ist Ihr Schutzschild gegen Cyber-Angriffe. In Zusammenarbeit mit XM Cyber bieten wir Ihnen ein dreistufiges Servicepaket. Das Angebot reicht von der Ersteinrichtung samt Konfiguration und Schulung Ihres Security Teams bis hin zur 24\/7-\u00dcberwachung und -Probleml\u00f6sung.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\"1\/3\"][\/vc_column_inner][\/vc_row_inner]<div class=\"service-levels_wrapper\">\n    <div class=\"service-levels_container\">\n\n                <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Einrichtung &amp; Training                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Bronze                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Application Management <\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Expert Training<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Einrichtung des Tenants<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Management                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Silber                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Alle Bronze-Inhalte plus:<br>Bedrohungsmanagement<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Integration in Sicherheitsprozesse<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Tenant Management<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        24\/7 Management &amp; Automatisierung                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Gold                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Alle Silver-Inhalte plus:<br>24\/7 Management des APM und Reaktion auf schwerwiegende Vorf\u00e4lle<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Automatisierte Bearbeitung und Integration in Ihr Incident-Management<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n            \n\n    <\/div>\n<\/div>\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/test\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Test                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/kommunikation-und-koordination-bei-einem-cyber-angriff\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Kommunikation und Koordination bei einem Cyber-Angriff                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/wie-widerstandsfaehig-ist-ihre-unternehmens-it-wirklich\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png 1200w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-300x157.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-1024x535.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Resilient Workplace<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Wie widerstandsf\u00e4hig ist Ihre Unternehmens-IT wirklich?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/ab-1-april-2025-meldepflicht-fuer-cyberangriffe-auf-kritische-infrastrukturen-in-der-schweiz\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>SITS<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Ab 1. April 2025: Meldepflicht f\u00fcr Cyberangriffe auf kritische Infrastrukturen in der Schweiz                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/managed-soc-vorteile-kosten-top-anbieter-finden-checkliste-2\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed SOC: Vorteile, Kosten & Top-Anbieter finden (Checkliste)                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/sicherheit-von-identitaeten-aktuelle-trends\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Sicherheit von Identit\u00e4ten: Aktuelle Trends                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/microsoft-entra\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1830\" height=\"1190\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg 1830w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-300x195.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1024x666.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-768x499.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1536x999.jpeg 1536w\" sizes=\"auto, (max-width: 1830px) 100vw, 1830px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Entra: Portr\u00e4t einer vielseitigen Produktfamilie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/identitaet-trifft-resilience\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Identit\u00e4t trifft Resilience                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/nis2-penetrationstests-technik-nis2-konform-in-griff-kriegen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Penetrationstests: Technik NIS2-konform in Griff kriegen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/resilienz-durch-identitaet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Resilienz durch Identit\u00e4t                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/verschluesselung-in-den-griff-bekommen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Verschl\u00fcsselung in den Griff bekommen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/microsoft-sentinel-azure-siem-virteile-kosten\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Sentinel als Azure SIEM \u2013 Vorteile & Kosten                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/ki-attacken-abwehren-so-lassen-sich-daten-und-systeme-schuetzen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            KI-Attacken abwehren: So lassen sich Daten und Systeme sch\u00fctzen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO-27001-Zertifizierung ohne Umwege                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/mit-managed-services-gegen-den-fachkraeftemangel\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Mit Managed Services gegen den Fachkr\u00e4ftemangel                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security mit SASE, so funktioniert\u2019s                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"kontakt\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Ihre digitale Festung ist nur einen Klick entfernt.        <\/div>\n        <div class=\"subheadline\">\n            Kontaktieren Sie uns f\u00fcr ma\u00dfgeschneiderte Sicherheitsstrategien.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '0f9c17f7-fa3c-4bc5-a0b5-75cee2a14df9'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Jonas Fischer                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Unser Attack Path Management Service (APM) ermittelt IT-Schwachstellen und die komplette Angriffskette aus Hackersicht. Der Ansatz geht \u00fcber einfaches Pentesting hinaus.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13193","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Schwachstellenmanagement | Minimieren Sie Risiken!<\/title>\n<meta name=\"description\" content=\"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schwachstellenmanagement | Minimieren Sie Risiken!\" \/>\n<meta property=\"og:description\" content=\"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T09:13:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/\",\"name\":\"Schwachstellenmanagement | Minimieren Sie Risiken!\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\"},\"datePublished\":\"2024-04-26T13:19:15+00:00\",\"dateModified\":\"2024-07-18T09:13:39+00:00\",\"description\":\"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schwachstellenmanagement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schwachstellenmanagement | Minimieren Sie Risiken!","description":"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Schwachstellenmanagement | Minimieren Sie Risiken!","og_description":"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!","og_url":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/","og_site_name":"SITS","article_modified_time":"2024-07-18T09:13:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/","url":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/","name":"Schwachstellenmanagement | Minimieren Sie Risiken!","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/de\/#website"},"datePublished":"2024-04-26T13:19:15+00:00","dateModified":"2024-07-18T09:13:39+00:00","description":"Attack Path Management: intensive Analyse Ihrer IT \u2713 30-Tage-Assessment \u2713 klare Handlungsempfehlungen \u2713 \u25b6 Hier anfragen!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/de\/assessment-advisory\/attack-path-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/de\/"},{"@type":"ListItem","position":2,"name":"Schwachstellenmanagement"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/de\/#website","url":"https:\/\/sits.friendventure.dev\/de\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/de\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":8,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13193\/revisions"}],"predecessor-version":[{"id":15901,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13193\/revisions\/15901"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/media?parent=13193"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/product_categories?post=13193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}