{"id":18518,"date":"2024-12-11T14:02:52","date_gmt":"2024-12-11T13:02:52","guid":{"rendered":"https:\/\/sits.com\/exposure-management\/"},"modified":"2024-12-12T15:40:03","modified_gmt":"2024-12-12T14:40:03","slug":"exposure-management","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/","title":{"rendered":"Exposure Management"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/08\/Header-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Proactively Identify, Measure, and Secure Your Weak Spots \n                <\/div>\n                <h1 class=\"header_headline headline h2\">\n                    Exposure Management \n                    <div class=\"slider_margin_left h2\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#kontakt\" class=\"btn-text\">Request consultation<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">Our Services for Comprehensive Exposure Checks<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Hackers only need one weak spot to break in. Our multiple SITS Exposure Management services ensures you\u2019re covered on all fronts. We combine vulnerability scans, attack path mapping, penetration tests, exposure We dig deep to find threats before they become problems. Here\u2019s what you get:<\/p>\n<ul>\n<li><strong>Comprehensive Risk Insights<\/strong> to find and prioritize vulnerabilities.<\/li>\n<li><strong>Tailored Security Measures<\/strong> and custom-fit solutions for your exact needs.<\/li>\n<li><strong>Proven Defense Strategies<\/strong> for an all-round coverage across your network and endpoints.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#kontakt\" class=\"btn-text\" title=\"Jetzt Kontakt aufnehmen\">\n                            Request Consultation                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<h1  class=\"h1 smx-headline  center\">Where are your security gaps?<\/h1><div class=\"smx_global_spacer size-xs\"><\/div>\n[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Act Now to Prevent Risks Later.<\/div>\n<p>[\/vc_column_text][vc_column_text]Every network has weak spots \u2013 both local, cloud-only, or hybrid. Are yours already exposed? Cyberattacks are getting smarter, and you can\u2019t afford to wait until it\u2019s too late. Here\u2019s what businesses face:[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Challenges for Your Business<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/05\/WhatElement2.jpg\" alt=\"\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Challenges for Your Business                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li><strong>Unseen Vulnerabilities:<\/strong> Many issues fly under the radar until exploited. A casual scan won\u2019t detect them all.<\/li>\n<li><strong>Complex IT Landscapes:<\/strong> More devices, cloud services, and apps mean more risk. Complexity is a hacker\u2019s playground.<\/li>\n<li><strong>Layered Attack Paths:<\/strong> Hackers aren\u2019t obvious\u2014they move through multiple points, exploiting one step at a time.<\/li>\n<li><strong>Expensive Breaches:<\/strong> Fixing a breach is costly, time-consuming, and can disrupt your business.<\/li>\n<li><strong>Persistent Threats:<\/strong> Attacks don\u2019t stop after one attempt. Persistent hackers try different angles to exploit weaknesses.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"btn-wrapper btn-center\">\n    <div class=\"btn btn btn--green\">\n        <a href=\"#kontakt\" class=\"btn-text\" title=\"Jetzt Ihr Sicherheits-Assessment anfordern.\">\n            Request your security assessment now.        <\/a>\n        <div><\/div>\n    <\/div> \n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row disable_element=\"yes\"][vc_column]<h1  class=\"h1 smx-headline  center\">360\u00b0 Datenschutz-L\u00f6sungen<\/h1><div class=\"smx_global_spacer size-xs\"><\/div>\n[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Die beste Wahl zum Schutz Ihrer kritischen Daten.<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Datenschutz bedeutet mehr als nur gesetzliche Vorgaben einzuhalten \u2013 es geht den Aufbau von Vertrauen. Unsere Datenschutzbeauftragten und Datenschutz-Consulting-Diensten sorgen f\u00fcr ein sicheres Datenmanagement. Wir garantieren die Einhaltung von DSGVO, ISO 27001 und weiteren Standards, w\u00e4hrend Ihre gesamte Datensicherheitsstrategie gest\u00e4rkt wird.<\/p>\n<p style=\"text-align: center;\">Dabei stellen wir Ihnen externe Datenschutzbeauftragte, die Ihnen mit Fachwissen zur Seite stehen und bei Bedarf mit Beh\u00f6rden in Kontakt bleiben.<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row disable_element=\"yes\"][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            Datenschutzbeauftragter-as-a-Service (DSB)        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Datenschutz-Experten mitten in Ihrem Unternehmen    <\/div>\n    <div class=\"text\">\n        Jedes Unternehmen, das personenbezogene Daten verarbeitet, braucht einen Datenschutzbeauftragten (DPO), um die komplexen Anforderungen der DSGVO zu navigieren. Aber warum Personal einstellen, schulen und verwalten, wenn zertifizierte Experten alles f\u00fcr Sie \u00fcbernehmen? Mit unserem DPO-as-a-Service erhalten Sie hochqualifiziertes Datenschutzmanagement, das Ihr Unternehmen compliant, sicher und effizient h\u00e4lt.<\/p>\n<p><strong>Unsere Leistungen umfassen:<\/strong><\/p>\n<ul>\n<li><strong>Komplette DSGVO-Compliance:<\/strong> Von Daten-Audits bis Risikobewertungen \u2013 ohne Belastung Ihrer internen Ressourcen.<\/li>\n<li><strong>Fixe, planbare Kosten:<\/strong> Keine \u00dcberraschungen \u2013 einfach konsistente, professionelle Datenverwaltung ohne Risiken durch Personalwechsel.<\/li>\n<li><strong>Zugang zu einem Expertenteam:<\/strong> Sowohl juristische als auch technische Expertise, individuell zugeschnitten auf die Anforderungen Ihrer Organisation.<\/li>\n<\/ul>\n<p><strong>Aufgaben Ihres DPOs:<\/strong><\/p>\n<ul>\n<li>Vollst\u00e4ndiges Management der DSGVO-Compliance, Sicherstellung der konformen Datenverarbeitung.<\/li>\n<li>Schulungen der Mitarbeiter, regelm\u00e4\u00dfige Audits und proaktive Risikobewertungen zur Minimierung von Bedrohungen.<\/li>\n<li>Kommunikation mit Beh\u00f6rden, Vertragspr\u00fcfungen und Datenschutz-Folgenabsch\u00e4tzungen, um Sicherheit und Compliance zu gew\u00e4hrleisten.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            Datenschutz-Management        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Proaktive Betreuung und kontinuierliche Anpassung f\u00fcr rechtskonformen Datenschutz    <\/div>\n    <div class=\"text\">\n        Unsere Datenschutz-Experten k\u00fcmmern sich um die Regelbetreuung Ihres Datenschutzes \u2013 damit Sie sich auf Ihr Gesch\u00e4ft konzentrieren k\u00f6nnen. Mit monatlichen Jour Fixe Meetings stellen wir sicher, dass anstehende Aufgaben und Herausforderungen direkt besprochen werden, und sorgen so f\u00fcr eine transparente Kommunikation. Unsere Leistungen im \u00dcberblick:<\/p>\n<ul>\n<li><strong>Datenschutz-Managementsystem (DSMS):<\/strong> Aufbau und kontinuierliche Betreuung eines strukturierten DSMS, inklusive aller Vorlagen zur rechtskonformen Umsetzung.<\/li>\n<li><strong>Proaktive Anpassung:<\/strong> Laufende \u00dcberwachung der rechtlichen Entwicklungen und Optimierung des DSMS entsprechend neuer gesetzlicher Anforderungen.<\/li>\n<\/ul>\n<p><strong>Risikominimierung:<\/strong> Unsere Experten erkennen m\u00f6gliche Risiken fr\u00fchzeitig und sorgen daf\u00fcr, dass Ihr Unternehmen stets datenschutzkonform agiert.    <\/div>\n    <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            Datenschutz-Tool: Alles an einem Ort        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Volle Kontrolle \u00fcber Datenschutz    <\/div>\n    <div class=\"text\">\n        Dank Vollzugriff auf ein spezialisiertes Datenschutz-Management-Tool behalten Sie jederzeit den \u00dcberblick \u2013 einfach und transparent, f\u00fcr die Umsetzung genauso wie f\u00fcrs Management. Das benutzerfreundliche \u201eDatenschutz-Dashboard\u201c bietet klare Einblicke und volle Kontrolle.<\/p>\n<ul>\n<li><strong>Alles zentral dokumentiert:<\/strong> Von technischen und organisatorischen Ma\u00dfnahmen bis zu Auftragsverarbeitern \u2013 alle wichtigen Infos sind sicher und zentral abgelegt.<\/li>\n<li><strong>Effiziente Aufgabenverwaltung:<\/strong> Mit Aufgabenmanagement und klaren Zust\u00e4ndigkeiten bleibt nichts liegen. Datenschutz-Aufgaben werden strukturiert umgesetzt.<\/li>\n<li><strong>Integrierte Schnittstellen:<\/strong> Einfache Einbindung zur Meldung von Betroffenenanfragen, Datenschutzvorf\u00e4llen und sogar ein Hinweisgebermeldesystem \u2013 nahtlos integrierbar in Ihre Website oder Ihr Intranet.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#kontakt\" class=\"btn-text\" target=\"_blank\">Beratung anfragen<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/VorteileElement2_Workplace.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/VorteileElement2_Workplace.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/VorteileElement2_Workplace-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/VorteileElement2_Workplace-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/VorteileElement2_Workplace-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h1 smx-headline  center\">Your Path to Robust Security<\/h1><div class=\"smx_global_spacer size-xs\"><\/div>\n[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">5 Pillars of Exposure Management<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Whether you need a simple check-up or a deep-dive analysis, our exposure management has you covered. From basic scans to advanced attack simulations, we help secure every corner of your digital environment:<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-5 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"\/assessment-advisory\/vulnerability-scan\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Vulnerability Scanning                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    We\u2019ll spot weak points fast. Regular scans reveal known vulnerabilities so you can patch them up before they cause trouble.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more here.                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"\/assessment-advisory\/attack-path-management\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Attack Path Management                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our experts track possible attack routes within your network, showing where an intruder could gain access. Block the paths before they\u2019re used.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more here.                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"\/assessment-advisory\/pentesting\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Penetration Testing                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    We act like the attackers, probing your systems to see where they break. Penetration tests highlight your vulnerabilities and give you the chance to fix them.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more here.                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"\/assessment-advisory\/exposure-assessment\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Exposure Assessment                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Get the full picture. Our assessments reveal where your network, devices, or processes are exposed, allowing you to build a strong defense.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more here.                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Red Teaming                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Want to see how your defenses hold up against a real attack? Our Red Team goes in as if they were hackers, showing you where your defenses fail and how to tighten them.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"process-slider_wrapper\">\n    <div class=\"process-slider_container\">\n        <div class=\"process-slider_header\">\n            <div class=\"process-slider_headline h2 headline\">How we Proactively Check Your Business<\/div>\n            <div class=\"process-slider_subheadline subheadline\">Step-by-Step Defense Checks &amp; Building<\/div>\n        <\/div>\n        <div class=\"process-slider_inner\">\n            <div class=\"process-slider_navigation-wrapper size--3\">\n                <div class=\"process-slider_navigation\">\n                                            <div class=\"process-slider_nav-single  active\">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Initial Audits & Planning<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Hands-on Testing & Probing<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Strengthening & Securing<\/div>\n                            \n                            \n                        <\/div>\n                                        <div class=\"process-slider_timeline\">                             <div class=\"process-slider_timeline-step active\">\n                                <div class=\"subheadline\">1<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">2<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">3<\/div>\n                            <\/div>\n                                                <div class=\"process-slider_timeline-line\">\n                            <div class=\"process-slider_timeline-line_left\"><\/div>\n                            <div class=\"process-slider_timeline-line_right\"><\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                <div class=\"process-slider_arrows\">\n                    <div class=\"process-slider_prev\"><\/div>\n                    <div class=\"process-slider_next\"><\/div>\n                <\/div>\n            <\/div>\n            <div class=\"process-slider_caret\">\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\">Initial Audits & Planning<\/div>\n                        <div class=\"process-slider_headline h4\"><\/div>\n                        <div class=\"process-slider_content\">We start by understanding your systems, identifying the weak spots, and building a plan to secure them.<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\">Hands-on Testing & Probing<\/div>\n                        <div class=\"process-slider_headline h4\"><\/div>\n                        <div class=\"process-slider_content\">Our team runs scans, tests, and simulations to find vulnerabilities, uncover attack paths, and measure your exposure.<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\">Strengthening & Securing<\/div>\n                        <div class=\"process-slider_headline h4\"><\/div>\n                        <div class=\"process-slider_content\">We implement targeted solutions to close gaps, set up continuous monitoring, and protect your business against new and evolving threats.<\/div>\n                                            <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"smx_global_spacer size-l\"><\/div>\n\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_NIS2-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <div class=\"h2 smx-headline\">\n                    Exposure Management \u2013 Your Benefits \n                <\/div >\n            <\/div>\n            <div class=\"subheadline\">\n                 \n            <\/div>\n            <div class=\"text\">\n                Real tests, real results: Exposure Management from SITS means you are safer-than-ever from cyber threats and stay ahead of any vulnerabilities. Here\u2019s what you can expect: \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-4  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Crystal Clear Visibility                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Your know exactly where your risks lie and get a clear path to fix them.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Preventive Measure                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Patch vulnerabilities before they lead to costly breaches.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Holistic Approach                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Efficient, tailored solutions that save you money by preventing expensive security incidents.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Cost-Effective Protection                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Efficient, tailored solutions that save you money by preventing expensive security incidents.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                            <\/div>\n    <\/div>\n<\/div>\n\n\n\n\n\n\n\n\n\n<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"kontakt\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <div class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/div>\n                <div class=\"subheadline\">\n                    Here\u2019s everything you need to know about Exposure Management and key components.                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">What is the difference between a vulnerability scan and a penetration test?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Vulnerability scans and penetration tests both aim to identify security weaknesses, but they operate differently. <ul><li>Vulnerability Scan: This is an automated process that scans your systems, applications, and networks to find known vulnerabilities. It checks for outdated software, missing patches, and misconfigurations, flagging potential security gaps that need attention. Scans are fast, non-intrusive, and can be scheduled regularly, making them a critical part of ongoing security maintenance.<\/li><li>Penetration Test (Pen Test): Unlike vulnerability scans, penetration tests are more in-depth and manual. Here, security experts simulate real-world attacks, actively trying to exploit weaknesses to assess how deep an attacker could get into your systems. Pen tests provide a deeper understanding of security risks by mimicking actual hacker techniques, making them essential for understanding your security posture.<\/li><\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How often should businesses run security checks like vulnerability scans and penetration tests?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Regular security checks are crucial to maintaining a strong security posture. Here\u2019s what you should consider:<ul><li><strong>Vulnerability Scans:<\/strong> These should be performed at least once a month or more frequently, depending on your business size and the sensitivity of the data you handle. Monthly scans help detect and fix new vulnerabilities before they can be exploited.<\/li><li><strong>Penetration Test (Pen Test)::<\/strong> Ideally, penetration testing should be done at least once a year. For industries with high compliance requirements (like finance or healthcare), or after significant changes to your IT environment, more frequent tests may be necessary. Also, running a pen test after introducing new systems, applications, or security tools ensures there are no hidden vulnerabilities.<\/li><\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What is Red Teaming, and how does it differ from penetration testing?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Red Teaming is an advanced form of security assessment where a dedicated team of security experts (the \"Red Team\") simulates a multi-layered, stealthy attack on your organization. The goal isn\u2019t just to identify specific vulnerabilities, but to evaluate the effectiveness of your entire security defense system, including detection and response.<ul><li><strong>Red Teaming:<\/strong> This involves real-world attack simulation to mimic what an actual attacker would do over an extended period. It tests not just technical security measures but also the organization's ability to detect, respond, and mitigate threats. Red Teams use creative, multi-step approaches, blending technical attacks with social engineering tactics.<\/li><li><strong>Penetration Testing:<\/strong> Unlike Red Teaming, pen testing is more straightforward and targeted. It focuses on identifying specific weaknesses and is usually time-bound. While pen tests probe systems to find vulnerabilities, Red Teams try to find ways to reach specific objectives, such as accessing sensitive data or infiltrating critical systems, without getting detected.<\/li><\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Why is continuous monitoring critical for exposure management?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Continuous monitoring is a proactive approach to cybersecurity that involves regular tracking and analysis of network activities to detect anomalies and potential threats in real time. It ensures that new vulnerabilities, configuration errors, and potential threats are quickly identified and addressed, minimizing the window of opportunity for attackers.<ul><li><strong>Proactive Risk Management:<\/strong> By consistently monitoring systems, companies can identify unusual patterns or behaviors before they escalate into serious security incidents. Continuous monitoring helps reduce the risk of exposure and allows for timely response to emerging threats.<\/li><li><strong>Compliance:<\/strong> Regular monitoring also assists with compliance requirements, such as GDPR, NIS2, and ISO standards, where demonstrating ongoing security vigilance is crucial.<\/li><li><strong>Real-Time Alerts:<\/strong> With continuous monitoring, automated tools can provide real-time alerts, allowing IT teams to react instantly to any suspicious activity.<\/li><\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does Exposure Management help prevent data breaches?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Exposure Management is a holistic approach that covers every angle of your IT infrastructure to find and mitigate potential vulnerabilities before they can be exploited. It combines vulnerability scans, penetration tests, attack path management, and Red Teaming to provide a comprehensive view of your security posture.<ul><li><strong>Risk Prioritization:<\/strong> It\u2019s not just about finding vulnerabilities; it\u2019s about understanding which ones present the highest risk. Exposure management helps prioritize critical fixes so that resources are used effectively.<\/li><li><strong>Comprehensive Threat Visibility:<\/strong> Exposure management provides a clear, ongoing picture of where your systems may be vulnerable, covering everything from software bugs to network misconfigurations and human errors.<\/li><li><strong>Advanced Testing:<\/strong> Through Red Teaming and attack path management, exposure management identifies how hackers might move through your network, revealing hidden risks and helping to build stronger defenses.<\/li><\/ul><\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Contact us now        <\/div>\n        <div class=\"subheadline\">\n            We are happy to advise you        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: 'b51d36e8-4e12-471c-8239-84c3e1b517fe'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Angelo Schneider                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Act Now to Prevent Risks Later. [\/vc_column_text][vc_column_text]Every network has weak spots \u2013 both local, cloud-only, or hybrid. Are yours already exposed? Cyberattacks are getting smarter, and you can\u2019t afford to wait until it\u2019s too late. Here\u2019s what businesses face:[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] Die beste Wahl zum Schutz Ihrer kritischen Daten. [\/vc_column_text][vc_column_text] Datenschutz bedeutet mehr [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-18518","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exposure Management | SITS<\/title>\n<meta name=\"description\" content=\"Exposure Management \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exposure Management | SITS\" \/>\n<meta property=\"og:description\" content=\"Exposure Management \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-12T14:40:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/\",\"name\":\"Exposure Management | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"datePublished\":\"2024-12-11T13:02:52+00:00\",\"dateModified\":\"2024-12-12T14:40:03+00:00\",\"description\":\"Exposure Management \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/exposure-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exposure Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exposure Management | SITS","description":"Exposure Management \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Exposure Management | SITS","og_description":"Exposure Management \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/","og_site_name":"SITS","article_modified_time":"2024-12-12T14:40:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/","url":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/","name":"Exposure Management | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"datePublished":"2024-12-11T13:02:52+00:00","dateModified":"2024-12-12T14:40:03+00:00","description":"Exposure Management \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/exposure-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/exposure-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Exposure Management"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=18518"}],"version-history":[{"count":15,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18518\/revisions"}],"predecessor-version":[{"id":18533,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/18518\/revisions\/18533"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=18518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}