{"id":18334,"date":"2024-11-22T14:10:37","date_gmt":"2024-11-22T13:10:37","guid":{"rendered":"https:\/\/sits.com\/information-security-consulting-services\/"},"modified":"2024-11-29T12:52:46","modified_gmt":"2024-11-29T11:52:46","slug":"information-security-consulting-services","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/","title":{"rendered":"Information Security Consulting &#038; Services"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1106\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace.jpeg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace.jpeg 1800w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace-300x184.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace-1024x629.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace-768x472.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Operations_Monitoring_Workplace-1536x944.jpeg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Raising the Bar for Your Security. \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Information Security Consulting &amp; Services \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Request consultation<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">End-to-End Security Consulting.<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>From small to mid-size businesses, public administration or large-scale enterprises: Your key security infrastructure needs to be protected against security incidents, earn new customers\u2019 trust, and be compliant with regulations.<\/p>\n<p>Enter SITS. Our key security consulting services help you set up an end-to-end Information Security Management System, assess your infrastructure, and even serve as your on-demand CISO - <strong>fully aligned with ISO 27001, CIS and\/or regulations of the German Institute for Information Security (BSI).<\/strong><\/p>\n<p>Our key offers include:<\/p>\n<ul>\n<li><b>ISMS \u2013 powered by SITS:<\/b> Establish and manage a certifiable Information Security Management System to prevent compliance breaches and ensure top-tier data protection.<\/li>\n<li><b>CISO on-demand:<\/b> Based on your needs, we also take on the role of a Chief Information Security Officer for you \u2013 providing expertise without impacting your internal resources.<\/li>\n<li><b>Security &amp; Risk Assessments:<\/b> Identify gaps, reduce risk, and strengthen your defense strategy.<\/li>\n<li><b>Pre- &amp;amp; Internal Audits:<\/b> Be ready for any audit with our internal assessments to ensure compliance.<\/li>\n<li><b>Exposure Management:<\/b> Pentesting, vulnerability management, and red teaming to expose and fix security weaknesses.<\/li>\n<li><b>IAM Discovery:<\/b> We assess your identity and access management landscape to eliminate vulnerabilities and improve efficiency.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"\">\n                            Request Consultation                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column][\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h2 smx-headline  center\">Compliance &amp; Security Risks.<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Your Challenges<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><em>Stop worrying about hidden security issues, compliance problems, internal resources at their limits or ever-growing standards like NIS2, ISO27001, CISIS or BSI \u2013 we\u2019ll set up the fundamental security systems and bring expertise to the table to secure your business and make it compliant. <\/em><\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Challenges &amp; Requirements for Your Business<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Compliance_Management.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Challenges &amp; Requirements for Your Business                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li><b>Ensuring compliance:<\/b> Crucial for any growing business to prevent fines and build trust with customers and partners.<\/li>\n<li><b>Addressing rising cybersecurity threats<\/b> with a structured strategy to safeguard vulnerable infrastructures.<\/li>\n<li><b>\u2022 Meeting the expectations \/b&gt; of partners, customers, and regulatory bodies.<\/b><\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n<h1  class=\"h1 smx-headline  center\">Our Solutions<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">From Assessment to 360\u00b0 SOC Services<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Building your security is like building a house: SITS ensures a strong <strong>foundation<\/strong> with our core information security consulting services, helps you maintain it with 24\/7 on-demand expertise, and gives you comprehensive perimeter security operations to keep it running for years. Our services include: :<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            A 100% Certifiable ISMS with SITS        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Achieve full compliance and future-proof your information security.    <\/div>\n    <div class=\"text\">\n        Our Information Security Management System (ISMS) is a structured framework that helps you manage sensitive company information, protects data, ensures compliance, and minimizes the risk of security breaches.<\/p>\n<p>We help you implement an Information Security Management System (ISMS) that ticks all the right boxes for compliance\u2014covering standards like ISO 27001, CISIS12, and more. Here\u2019s how we do it:<\/p>\n<ul>\n<li><b>Custom Fit ISMS:<\/b> We evaluate your specific needs to select and implement the right ISMS for your business.<\/li>\n<li><b>Full-Service Implementation:<\/b> From strategic planning to hands-on execution, we take care of every detail.<\/li>\n<li><b>Continuous Improvement:<\/b> Beyond initial setup, we help you stay ahead with ongoing adjustments and expert reporting.<\/li>\n<li><b>100% Certifiable:<\/b> We assist you in establishing a formal ISMS. If certification is desired, our experts also provide full support.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-1-copy.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-1-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-1-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-1-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-1-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            CISO-as-a-Service        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Powerful In-House Security Expertise for Your Business    <\/div>\n    <div class=\"text\">\n        Our CISO-as-a-Service solution brings you a dedicated Chief Information Security Officer (CISO) without the need for internal hires. Gain a sustainable security roadmap, enhanced IT protection, and improved security awareness across your company.<\/p>\n<ul>\n<li><b> Dedicated Security Leadership:<\/b> Our CISOs identify vulnerabilities, create a security roadmap, and elevate your security standards from day one.<\/li>\n<li><b>Full ISMS Establishment:<\/b> We develop and implement an Information Security Management System (ISMS) according to standards like ISO 27001, CISIS12, or BSI IT-Grundschutz.<\/li>\n<li><b> Continuous Oversight and Reporting:<\/b> Receive regular updates on your IT security status, including actionable insights and suggested improvements.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"640\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217.jpg 1920w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217-300x100.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217-1024x341.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217-768x256.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Header_Website_1920x640Px_202217-1536x512.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            Exposure Management        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Proactive Measures \u2013 Stay Ahead of Cyber Threats.    <\/div>\n    <div class=\"text\">\n        Hackers only need one vulnerability to cause serious damage. With our comprehensive Exposure Management services, we ensure you\u2019re both prepared and always a step ahead. We combine vulnerability scans, penetration tests, attack path mapping, and more to keep your business secure.<\/p>\n<ul>\n<li><b>Comprehensive Risk Insights:<\/b> Identify and prioritize vulnerabilities across your IT landscape.<\/li>\n<li><b>Tailored Security Measures:<\/b> Custom-fit solutions to meet your unique needs.<\/li>\n<li><b>Proven Defense Strategies:<\/b> Complete network and endpoint coverage for reliable protection.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"1350\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header.jpeg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header.jpeg 2400w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header-300x169.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header-1024x576.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header-768x432.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header-1536x864.jpeg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Cyber_Security_Header-2048x1152.jpeg 2048w\" sizes=\"auto, (max-width: 2400px) 100vw, 2400px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            Cyber Defense Services        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Cyber threats are getting smarter \u2013 your defense should be too    <\/div>\n    <div class=\"text\">\n        On top of our assessment and ISMS services, SITS has your back with a full set of Cyber Defense Services to keep your business safe:<\/p>\n<ul>\n<li><b>Proactive Threat Detection:<\/b> Advanced SIEM systems spot risks before they escalate.<\/li>\n<li><b>24\/7 Security Operations Center (SOC):<\/b> Non-stop monitoring with instant response to threats.<\/li>\n<li><b>Managed XDR:<\/b> Solid protection for all your endpoints, network, and cloud.<\/li>\n<li><b>Incident Response (CSIRT):<\/b> Quick containment and recovery when breaches happen.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"\/en\/cyber-defense\/cyber-defense-services\" class=\"btn-text\" target=\"_blank\">Learn more here.<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/WhatElement1.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/WhatElement1.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/WhatElement1-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/WhatElement1-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/WhatElement1-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"kontakt\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Get in touch now        <\/div>\n        <div class=\"subheadline\">\n            Contact us for customized security strategies.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: 'b51d36e8-4e12-471c-8239-84c3e1b517fe'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Jonas Fischer                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Your Challenges [\/vc_column_text][vc_column_text] Stop worrying about hidden security issues, compliance problems, internal resources at their limits or ever-growing standards like NIS2, ISO27001, CISIS or BSI \u2013 we\u2019ll set up the fundamental security systems and bring expertise to the table to secure your business and make it compliant. [\/vc_column_text][vc_column_text] From Assessment to [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-18334","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Consulting &amp; Services<\/title>\n<meta name=\"description\" content=\"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Consulting &amp; Services\" \/>\n<meta property=\"og:description\" content=\"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-29T11:52:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/\",\"name\":\"Information Security Consulting & Services\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"datePublished\":\"2024-11-22T13:10:37+00:00\",\"dateModified\":\"2024-11-29T11:52:46+00:00\",\"description\":\"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Consulting &#038; Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Consulting & Services","description":"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Information Security Consulting & Services","og_description":"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!","og_url":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/","og_site_name":"SITS","article_modified_time":"2024-11-29T11:52:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/","url":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/","name":"Information Security Consulting & Services","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"datePublished":"2024-11-22T13:10:37+00:00","dateModified":"2024-11-29T11:52:46+00:00","description":"Compliance Management: Data Loss Prevention \u2713 Lifecycle Management \u2713 Insider Threat Protection \u2713 sicherer Datenraum \u2713 \u25b6 Hier informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/information-security-consulting-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Consulting &#038; Services"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=18334"}],"version-history":[{"count":11,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18334\/revisions"}],"predecessor-version":[{"id":18345,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18334\/revisions\/18345"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=18334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}