{"id":13368,"date":"2024-04-26T15:57:17","date_gmt":"2024-04-26T13:57:17","guid":{"rendered":"https:\/\/sits.com\/?post_type=produkte&#038;p=13368"},"modified":"2024-07-23T16:40:29","modified_gmt":"2024-07-23T14:40:29","slug":"cyber-threat-intelligence","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/","title":{"rendered":"Cyber Threat Intelligence"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CTI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Mit Daten &amp; Insights Bedrohungen besiegen \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Cyber Threat Intelligence \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Beratung anfordern<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Cyber Threat Intelligence mit SITS<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Daten, Analysen, Erkenntnisse: Im Katz-und-Maus-Spiel der Cyber-Sicherheit ist Wissen entscheidend. Bleiben Sie Hackern einen Schritt voraus, indem Sie Online-Bedrohungen, Leaks, Identit\u00e4tsdiebstahl und andere Gefahren rechtzeitig identifizieren.<\/p>\n<p>Mit Cyber Threat Intelligence as a Service (CTIaaS) liefern wir Ihnen st\u00e4ndig aktualisierte Informationen \u00fcber aktuelle und potenzielle Cyber-Bedrohungen. Die L\u00f6sung sammelt, analysiert und interpretiert Daten aus verschiedenen Quellen, um Sie vor neuen Schwachstellen, Malware, Phishing-Kampagnen und anderen Cyber-Angriffen zu warnen. Gleichzeitig kann sie feststellen, ob Daten oder geistiges Eigentum Ihres Unternehmens ins Netz gelangt sind.<\/p>\n<p>Durch unsere Partnerschaft mit SOCRadar sch\u00fctzen wir Sie auf Basis der automatisierten Auswertung von Milliarden kontinuierlich aktualisierter Daten zu Cyber-Bedrohungen. Dank der pr\u00e4zisen API-Integration von SOCRadar ist das System blitzschnell installiert. Es bietet Ihnen umfassenden \u00dcberblick \u00fcber alle Angriffsfl\u00e4chen \u2013 und reduziert Fehlalarme \u00a0auf ein Minimum. Mit unserem kontinuierlichen Monitoring und unserem Takedown-Service sind Sie effizient und umfassend vor den sich st\u00e4ndig wandelnden Cyber-Bedrohungen gesch\u00fctzt.<\/p>\n<p>Unser CTI as a Service auf Basis von SOCRader umfasst:<\/p>\n<ul>\n<li><strong>Web Monitoring, Leak Detection und VIP-Schutz: <\/strong>Wir \u00fcberwachen das Netz auf Datenschutzverletzungen und Leaks Ihrer Mitarbeitenden und F\u00fchrungskr\u00e4fte.<\/li>\n<li><strong>Integration in bestehendes SOC\/SIEM: <\/strong>Unser CTI as a Service ist einzeln als Managed Service oder als Erg\u00e4nzung zu Ihrem <a href=\"\/de\/cyber-defense\/security-operations-center\/\">SOC<\/a>\/<a href=\"\/de\/cyber-defense\/siem\/\">SIEM<\/a> erh\u00e4ltlich (\u201eIndicators of Compromise\u201c, IOC-Feed).<\/li>\n<li><strong>Takedown-Service:<\/strong> Wir unterst\u00fctzen Sie bei der L\u00f6schung von gef\u00e4lschten Inhalten, die unter Ihrem Namen im Netz zirkulieren \u2013 etwa von Phishing- und Malware-infizierten Webseiten, gef\u00e4lschten Social-Media-Auftritten oder mobilen Apps.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"\">\n                            Jetzt Gespr\u00e4ch vereinbaren                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline \">Ein Kompass im Informationsdschungel<\/h2>[vc_column_text]Welche neuen Bedrohungen lauern im Netz? Welche neuen Angriffswege und -taktiken k\u00f6nnen Hacker nutzen? Um Angriffe effizient abzuwehren und im Ernstfall sofort zu reagieren, brauchen Unternehmen Tools, die kontinuierlich aktuelle Bedrohungsdaten sammeln, auswerten und in die Sicherheits-Infrastruktur implementieren. Kurz: Sie brauchen eine <a href=\"\/de\/cyber-defense\/cyber-threat-intelligence\/\">Cyber Threat Intelligence<\/a> Platform.[\/vc_column_text]<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Die Herausforderungen f\u00fcr Unternehmen<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_CTI.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <h2 class=\"text-image-slide_headline headline h4\">\n                            Die Herausforderungen f\u00fcr Unternehmen                        <\/h2>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li><strong>Einsch\u00e4tzung der Gefahrenlage:<\/strong> Um potenzielle Bedrohungen und Angriffsvektoren zu erkennen, ist eine aktuelle und umfassende Datengrundlage erforderlich.<\/li>\n<li><strong>Informationsflut: <\/strong>Die zahlreichen neuen Bedrohungen sorgen f\u00fcr eine Flut an Sicherheitswarnungen \u2013 und es ist oft schwierig, relevante von irrelevanten Warnungen zu unterscheiden.<\/li>\n<li><strong>Gefahr von Datendiebstahl: <\/strong>Hacker versuchen, an Anmeldeinformationen Ihrer Mitarbeitenden zu gelangen, um Gesch\u00e4ftsgeheimnisse und Kundendaten abzugreifen.<\/li>\n<li><strong>Gefahren f\u00fcr F\u00fchrungspersonen:<\/strong> Angreifende versuchen, an pers\u00f6nliche oder Kreditkartendaten von Schl\u00fcsselpersonen zu gelangen, um sie f\u00fcr Identit\u00e4tsdiebstahl und Betrug zu verwenden.<\/li>\n<li><strong>Gefahren durch Markenmissbrauch<\/strong><strong>:<\/strong> Gef\u00e4lschte Phishing- oder Malware-infizierte Seiten, die unter Ihrem Firmennamen auftreten, gef\u00e4hrden andere und sch\u00e4digen Ihre Reputation.<\/li>\n<li><strong>Hidden Web Threats:<\/strong> Im Darknet und Deep Web lauern zahlreiche Gefahren, die sich gegen Unternehmen richten k\u00f6nnen.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline  center\">Cyber Threat Intelligence as a Service<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Vorsprung durch Cyber-Wissen<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Unser Managed Threat Intelligence hilft Ihnen, Bedrohungen fr\u00fchzeitig zu erkennen und abzuwehren. Es liefert ma\u00dfgeschneiderte Alerts, reagiert automatisch auf Bedrohungen \u2013 und st\u00e4rkt damit Ihr IT-Sicherheitsteam. Unsere L\u00f6sung umfasst:<\/p>\n<p>[\/vc_column_text]<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-7 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Dark Web Monitoring                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Vollst\u00e4ndige \u00dcberwachung von Dark und Deep Web sowie von Foren, die sich b\u00f6sartigen Aktivit\u00e4ten widmen. Dazu geh\u00f6ren Botnets, Datendumps, Exploits, \u201eHacking as a Service\u201c-Angriffe, Remote-Zugriffe und PII-Handel.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Aufdeckung von Datenlecks                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir identifizieren gestohlene personenbezogene Daten (PII) Ihrer Kundschaft und Mitarbeitenden: Unser CTI durchsucht kontinuierlich das Web nach PII und entdeckt so F\u00e4lle von Identit\u00e4tsdiebstahl und Betrug.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    VIP-Schutz                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unser Managed CTI erkennt kompromittierte Zugangsdaten von Schl\u00fcsselpersonen. Dazu geh\u00f6ren PII, SSNs und Kreditkartendaten, die f\u00fcr Identit\u00e4tsdiebstahl und Bankbetrug missbraucht werden k\u00f6nnen.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Threat Intelligence Feeds                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir liefern aktuelle Informationen \u00fcber bekannte Bedrohungen, Schwachstellen und Angriffstaktiken. Dies hilft Ihnen, Ihre Sicherheitsma\u00dfnahmen zu verbessern.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Risikobewertung                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unser CTI bewertet spezifische Bedrohungen und das damit verbundene Risiko f\u00fcr Ihr Unternehmen: So k\u00f6nnen Sie ma\u00dfgeschneiderte Sicherheitsstrategien entwickeln.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Takedown-Dienst                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Unser CTI unterst\u00fctzt Sie beim Entfernen von sch\u00e4dlichen Inhalten, Phishing-Seiten oder gef\u00e4lschten Social-Media-Auftritten, die unter dem Namen Ihres Unternehmens im Internet zirkulieren. So vermeiden Sie auch Reputationssch\u00e4den.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-7  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            07\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Netzwerkscans                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Wir f\u00fchren aktive Schwachstellenscans und SSL-Sicherheits\u00fcberwachungen zur Identifizierung und Abwehr digitaler Bedrohungen durch. Dabei nutzen wir die Analyse von SSL-Zertifikaten.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Ihr Cyber Defense-Expertenteam                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Von SIEM \u00fcber CTI bis zu SOC: Wir implementieren unsere 24\/7 Security Operations L\u00f6sungen zum Rundum-Schutz Ihrer Infrastruktur.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#kontakt\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Jetzt Kontakt aufnehmen<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row disable_element=\"yes\"][vc_column]<div class=\"quote-brand-slider_wrapper partners\" >\n    <div class=\"quote-brand-slider_container\">\n         \n            <div class=\"quote-brand-slider_quotes\">\n                                    <div class=\"quote-brand-slider_partners-single\">\n                        <div class=\"quote-brand-slider_partners-headline h2 center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-subheadline subheadline center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-content center\">\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"quote-brand-slider_partners-single\">\n                        <div class=\"quote-brand-slider_partners-headline h2 center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-subheadline subheadline center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-content center\">\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"quote-brand-slider_partners-single\">\n                        <div class=\"quote-brand-slider_partners-headline h2 center\">\n                            Unsere Partner                        <\/div>\n                        <div class=\"quote-brand-slider_partners-subheadline subheadline center\">\n                            Mit SOCRadar zu h\u00f6herer Datensicherheit                        <\/div>\n                        <div class=\"quote-brand-slider_partners-content center\">\n                            Unser Partner SOCRadar sammelt rund um die Uhr pr\u00e4zise und umfassende Daten zu aktuellen Cyber-Bedrohungen und bietet fortschrittliche Analysetools, die unser Expertenteam zum Schutz Ihres Unternehmens einsetzt.                        <\/div>\n                    <\/div>\n                                    <div class=\"quote-brand-slider_partners-single\">\n                        <div class=\"quote-brand-slider_partners-headline h2 center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-subheadline subheadline center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-content center\">\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"quote-brand-slider_partners-single\">\n                        <div class=\"quote-brand-slider_partners-headline h2 center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-subheadline subheadline center\">\n                                                    <\/div>\n                        <div class=\"quote-brand-slider_partners-content center\">\n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n        \n        <div class=\"quote-brand-slider_nav-container\">\n            <div class=\"quote-brand-slider_navigation\">\n                            <div class=\"quote-brand-slider_brand-single active\">\n                    <div class=\"quote-brand-slider_nav-mask\" style=\"mask-image:url(); -webkit-mask-image:url()\">\n                    <\/div>\n                    <div class=\"quote-brand-slider_brand-image\">\n                        <img decoding=\"async\" src=\"\" alt=\"\">\n                    <\/div>\n                <\/div>\n                            <div class=\"quote-brand-slider_brand-single\">\n                    <div class=\"quote-brand-slider_nav-mask\" style=\"mask-image:url(); -webkit-mask-image:url()\">\n                    <\/div>\n                    <div class=\"quote-brand-slider_brand-image\">\n                        <img decoding=\"async\" src=\"\" alt=\"\">\n                    <\/div>\n                <\/div>\n                            <div class=\"quote-brand-slider_brand-single\">\n                    <div class=\"quote-brand-slider_nav-mask\" style=\"mask-image:url(https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SOCRadar_Logo.png); -webkit-mask-image:url(https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SOCRadar_Logo.png)\">\n                    <\/div>\n                    <div class=\"quote-brand-slider_brand-image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SOCRadar_Logo.png\" alt=\"\">\n                    <\/div>\n                <\/div>\n                            <div class=\"quote-brand-slider_brand-single\">\n                    <div class=\"quote-brand-slider_nav-mask\" style=\"mask-image:url(); -webkit-mask-image:url()\">\n                    <\/div>\n                    <div class=\"quote-brand-slider_brand-image\">\n                        <img decoding=\"async\" src=\"\" alt=\"\">\n                    <\/div>\n                <\/div>\n                            <div class=\"quote-brand-slider_brand-single\">\n                    <div class=\"quote-brand-slider_nav-mask\" style=\"mask-image:url(); -webkit-mask-image:url()\">\n                    <\/div>\n                    <div class=\"quote-brand-slider_brand-image\">\n                        <img decoding=\"async\" src=\"\" alt=\"\">\n                    <\/div>\n                <\/div>\n            \n            <\/div>\n            <div class=\"quote-brand-slider_mobile-nav\">\n                <div class=\"quote-brand-slider_nav-mobile-nav-single_prev\">\n                    <div class=\"quote-brand-slider_prev\"><\/div>\n                <\/div>\n                <div class=\"quote-brand-slider_nav-mobile-nav-single_next\">\n                    <div class=\"quote-brand-slider_next\"><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n\n    <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <p class=\"h2 smx-headline\">\n            Eine Top-L\u00f6sung, zwei Pakete        <\/p>\n    <\/div>\n    <div class=\"subheadline\">\n        Von der Datenanalyse zum Rundumschutz Ihrer IP    <\/div>\n    <div class=\"text\">\n        <strong>Unser CTI-Angebot bietet zwei Optionen<\/strong><strong>, die auf unterschiedliche Anforderungen und Unternehmensgr\u00f6\u00dfen zugeschnitten sind. <\/strong><\/p>\n<ul>\n<li><strong>Option 1 \u2013 Professional-Plan: <\/strong>Ideal f\u00fcr Unternehmen mit fortgeschrittenen Anforderungen an Markenschutz und Angriffsfl\u00e4chen-Management, inklusive \u00dcberwachung und Alarmierung bei Bedrohungen<\/li>\n<li><strong>Option 2 \u2013 Enterprise-Plan: <\/strong>F\u00fcr gro\u00dfe Unternehmen; beinhaltet individuell abgestimmte Threat Intelligence, API-Integration, Verfolgung von Bedrohungsakteuren und zus\u00e4tzliche HUMINT-Anforderungen<\/li>\n<\/ul>\n<p>Beide Pl\u00e4ne sind in zwei Service Levels erh\u00e4ltlich:<\/p>\n<ul>\n<li><strong>Business:<\/strong> Analyse durch SITS-Fachleute werktags von 8 bis 17 Uhr<\/li>\n<li><strong>Critical:<\/strong> \u00dcberwachung und Analyse durch SITS-Fachleute rund um die Uhr<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_CTI.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_CTI.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_CTI-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_CTI-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_CTI-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline \">Unsere Pakete<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">Unsere zwei CTI-Pakete im Jahres-Abonnement umfassen:<\/div>\n<p>[\/vc_column_text]<div class=\"packages_wrapper\">\n    <div class=\"packages_container spalten_2\">\n        <div class=\"packages_table\">\n            <div class=\"packages-header packages-row\">\n                <div class=\"packages-cell\"><\/div>\n                <div class=\"packages-cell subheadline\">Professional-Plan<\/div>\n                <div class=\"packages-cell subheadline\">Enterprise-Plan<\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Zugriff zur Plattform<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            3 Nutzer                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            20 Nutzer                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">Threat Feeds\/IOC-Integration<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            API, MISP, STIX &  TAXII etc.                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Darknet\/Deep Web Monitoring<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">Frequenz der Daten\u00fcberwachung<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            w\u00f6chentlich                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            t\u00e4glich                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Netzwerkschutz<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">Aktiver Schwachstellenscan<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">SSL-Schwachstellenpr\u00fcfung<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">SSL-Zertifikats\u00fcberwachung<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Pr\u00fcfung von Dritthersteller-Software auf Schwachstellen<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">Netzwerksicherheits\u00fcberwachung (Port-Erkennung)<\/div>\n                <div class=\"packages-cell\">\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            aktiver Port Scan                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Erkennung von Bedrohungen entlang Ihrer Lieferkette (Supply Chain Intelligence)<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            bis zu 5                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">VIP-Monitoring<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Check-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Bedrohungsanalysen<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            bis zu 250 Anfragen                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            bis zu 1500 Anfragen                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row odd\">\n                <div class=\"packages-cell subheadline\">Manuelle Malware-Analyse<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_icon\">\n                            <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/X-Icon-solid-white.svg\" alt=\"\">\n                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            bis zu 10 Uploads pro Monat                        <\/div>\n                                    <\/div>\n                                            <\/div>\n                    <div class=\"packages-row even\">\n                <div class=\"packages-cell subheadline\">Takedown Service<\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            Bezahlung pro Vorfall                        <\/div>\n                                    <\/div>\n                <div class=\"packages-cell\">\n                                            <div class=\"packages-cell_text subheadline \">\n                            Bezahlung pro Vorfall                        <\/div>\n                                    <\/div>\n                                            <\/div>\n        \n\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div id='festes_grid'>\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <h3 class=\"h2 smx-headline\">\n                    Geballte Wissenskraft \n                <\/h3 >\n            <\/div>\n            <div class=\"subheadline\">\n                 \n            <\/div>\n            <div class=\"text\">\n                Die Power unseres CTI as a Service verschafft Ihnen tiefe Einblicke in aktuelle Cyber-Bedrohungen. Unser Managed-Ansatz sorgt f\u00fcr eine kontinuierliche \u00dcberwachung Ihrer internen Daten sowie neuer Angriffsmethoden von au\u00dfen. Sie gewinnen: \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-3  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Update.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Kontinuierliche Optimierung                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Im Rahmen unseres Managed-Ansatzes passen unsere Sicherheitsfachleute die SOCRadar-CTI-Plattform kontinuierlich an. So sind Sie optimal vor neuen Bedrohungen gesch\u00fctzt und Fehlalarme werden minimiert.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Abwehr.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Beratung oder 24\/7 Managed Service                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Ob als einfacher Stand-alone Service mit Implementierung von Indicators of Compromise (IOC) oder als umfassender Managed Service: Wir passen das CTI an Ihre Bed\u00fcrfnisse und Anforderungen an \u2013 von der Lizenzierung \u00fcber das Onboarding bis zur Feinabstimmung.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/SMW_Vorteile_Icon_Pfeiler-2.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Integration in Ihr SOC\/SIEM                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">In Kombination mit unserem Security Operations Center (SOC) und den SITS-Angeboten f\u00fcr Security Information and Event Management (SIEM) ist unser CTI die perfekte Waffe gegen neue Bedrohungen.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                            <\/div>\n    <\/div>\n<\/div>\n\n<\/div >\n\n\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/test\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Test                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/kommunikation-und-koordination-bei-einem-cyber-angriff\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Kommunikation und Koordination bei einem Cyber-Angriff                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/wie-widerstandsfaehig-ist-ihre-unternehmens-it-wirklich\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png 1200w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-300x157.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-1024x535.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Resilient Workplace<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Wie widerstandsf\u00e4hig ist Ihre Unternehmens-IT wirklich?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/ab-1-april-2025-meldepflicht-fuer-cyberangriffe-auf-kritische-infrastrukturen-in-der-schweiz\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>SITS<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Ab 1. April 2025: Meldepflicht f\u00fcr Cyberangriffe auf kritische Infrastrukturen in der Schweiz                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/managed-soc-vorteile-kosten-top-anbieter-finden-checkliste-2\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed SOC: Vorteile, Kosten & Top-Anbieter finden (Checkliste)                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/sicherheit-von-identitaeten-aktuelle-trends\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Sicherheit von Identit\u00e4ten: Aktuelle Trends                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/microsoft-entra\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1830\" height=\"1190\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg 1830w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-300x195.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1024x666.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-768x499.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1536x999.jpeg 1536w\" sizes=\"auto, (max-width: 1830px) 100vw, 1830px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Entra: Portr\u00e4t einer vielseitigen Produktfamilie                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/identitaet-trifft-resilience\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Identit\u00e4t trifft Resilience                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/nis2-penetrationstests-technik-nis2-konform-in-griff-kriegen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Penetrationstests: Technik NIS2-konform in Griff kriegen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/resilienz-durch-identitaet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Resilienz durch Identit\u00e4t                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/verschluesselung-in-den-griff-bekommen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Verschl\u00fcsselung in den Griff bekommen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/microsoft-sentinel-azure-siem-virteile-kosten\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Sentinel als Azure SIEM \u2013 Vorteile & Kosten                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/ki-attacken-abwehren-so-lassen-sich-daten-und-systeme-schuetzen\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            KI-Attacken abwehren: So lassen sich Daten und Systeme sch\u00fctzen                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO-27001-Zertifizierung ohne Umwege                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/mit-managed-services-gegen-den-fachkraeftemangel\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Mit Managed Services gegen den Fachkr\u00e4ftemangel                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/de\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security mit SASE, so funktioniert\u2019s                        <\/div>\n                        <div class=\"se_readmore\">\n                            Mehr erfahren                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <h3 class=\"h2 smx-headline\">\n                    H\u00e4ufig gestellte Fragen                <\/h3>\n                <div class=\"subheadline\">\n                                    <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">Was ist Cyber Threat Intelligence as a Service?<\/button>\n                                    <div class=\"panel\">\n                                        <p>CTI ist eine Kombination aus Produkten und Dienstleistungen, die Wissen und Daten zu den neuesten Cyber-Security-Bedrohungen oder -Problemen bereitstellen. Die kuratierte Ausgabe von oft Millionen von Datenpunkten hilft bei der Identifizierung von Bedrohungen und ihren Merkmalen (auch als TTP f\u00fcr \u201eTaktiken, Techniken und Verfahren\u201c bezeichnet). <\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Wie funktioniert der Takedown-Prozess von SITS und SOCRadar?<\/button>\n                                    <div class=\"panel\">\n                                        <p>In Zusammenarbeit mit SOCRadar bietet SITS einen umfassenden Takedown-Service, um den Missbrauch Ihrer Unternehmensmarke zu verhindern. Unser CTI-Service durchsucht kontinuierlich das Netz nach Phishing-Seiten, gef\u00e4lschten Apps und Fake Social Media Accounts, die Ihre Marke zum Beispiel zur Verbreitung von Malware nutzen. Wird ein solcher Missbrauch entdeckt, stellen unsere Experten nach Absprache mit Ihneneinen Takedown-Antrag.  Daf\u00fcr wenden sich unsere Experten mit Unterst\u00fctzung von SOCRadar zum Beispiel an Domain-Registrare, Hosting-Anbieter, Website-Betreiber, soziale Netzwerke oder CERT\/CSIRT-Teams. Das Ziel ist es, den Zugriff auf die sch\u00e4dlichen Inhalte zu blockieren oder gef\u00e4lschte Accounts zu schlie\u00dfen.  Je nach Art der Bedrohung und Reaktionsgeschwindigkeit der beteiligten Parteien kann der Takedown-Prozess unterschiedlich lang dauern. Unser Team versucht, ihn so schnell wie m\u00f6glich abzuschlie\u00dfen.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Welche Quellen verwendet Cyber Threat Intelligence?<\/button>\n                                    <div class=\"panel\">\n                                        <p>CTI sammelt Informationen aus einer Vielzahl von Quellen. Dazu geh\u00f6ren unter anderem (aber nicht nur):<ul> <li>Offene Quellen (OSINT)<\/li> <li>Dark Web und Deep Web<\/li> <li>Branchenberichte und -warnungen<\/li> <li>Threat Feeds<\/li> <li>Log-Daten und Verkehrsanalysen<\/li> <li>Informationen aus fr&uuml;heren Sicherheitsvorf&auml;llen<\/li> <\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Wie integriert man CTI in bestehende Sicherheitssysteme?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Zur Integration von CTI werden eine Reihe von Daten in Sicherheitstools wie SIEM-Systeme, Firewalls, Intrusion Detection Systems (IDS) und Endpoint-Protection-Plattformen eingespeist. Dazu geh\u00f6ren insbesondere \u201eIndikatoren f\u00fcr Kompromittierungen\u201c (IOCs) sowie Daten zu den \u201eTaktiken, Techniken und Verfahren\u201c (TTP) von Hackern. So k\u00f6nnen die Sicherheitstools m\u00f6gliche Bedrohungen umfassender erkennen und schnell darauf reagieren.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"kontakt\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Wir sind f\u00fcr Sie da        <\/div>\n        <div class=\"subheadline\">\n            Einfach Formular ausf\u00fcllen und unsere Experten melden sich.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: 'c9594806-97ba-4e96-a901-68ca57c7d636'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Claudia Hofmann                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Managerin, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Daten, Analysen, Erkenntnisse: Im Katz-und-Maus-Spiel der Cyber-Sicherheit ist Wissen entscheidend. Bleiben Sie Hackern einen Schritt voraus, indem Sie Online-Bedrohungen, Leaks, Identit\u00e4tsdiebstahl und andere Gefahren rechtzeitig identifizieren.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13368","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Threat Intelligence | Abwehr von Cyber-Angriffen<\/title>\n<meta name=\"description\" content=\"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection &amp; VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence | Abwehr von Cyber-Angriffen\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection &amp; VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-23T14:40:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/\",\"name\":\"Cyber Threat Intelligence | Abwehr von Cyber-Angriffen\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\"},\"datePublished\":\"2024-04-26T13:57:17+00:00\",\"dateModified\":\"2024-07-23T14:40:29+00:00\",\"description\":\"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection & VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence | Abwehr von Cyber-Angriffen","description":"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection & VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Cyber Threat Intelligence | Abwehr von Cyber-Angriffen","og_description":"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection & VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!","og_url":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/","og_site_name":"SITS","article_modified_time":"2024-07-23T14:40:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/","url":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/","name":"Cyber Threat Intelligence | Abwehr von Cyber-Angriffen","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/de\/#website"},"datePublished":"2024-04-26T13:57:17+00:00","dateModified":"2024-07-23T14:40:29+00:00","description":"Cyber Threat Intelligence: Web Monitoring \u2713 Leak Detection & VIP-Schutz \u2713 Integration in bestehendes SOC\/SIEM \u2713 \u25b6 Jetzt hier anfragen!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/de\/cyber-defense\/cyber-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/de\/"},{"@type":"ListItem","position":2,"name":"Cyber Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/de\/#website","url":"https:\/\/sits.friendventure.dev\/de\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/de\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":7,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13368\/revisions"}],"predecessor-version":[{"id":16264,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/produkte\/13368\/revisions\/16264"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/media?parent=13368"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/de\/wp-json\/wp\/v2\/product_categories?post=13368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}