{"id":4470,"date":"2024-04-02T14:08:59","date_gmt":"2024-04-02T12:08:59","guid":{"rendered":"https:\/\/thesitsgroup.com\/security-operations\/"},"modified":"2024-12-13T09:47:22","modified_gmt":"2024-12-13T08:47:22","slug":"monitor-detect-response","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/","title":{"rendered":"Monitor, Detect &#038; Response"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Cyber_Defense-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Non-stop identification and protection from threats. \n                <\/div>\n                <h1 class=\"header_headline headline h2\">\n                    Monitor, Detect &amp; Respond \n                    <div class=\"slider_margin_left h2\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact Us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">24\/7 Security thanks to Monitor, Detect &amp; Response Services<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Companies must protect themselves against numerous new forms of attack - and in some cases in completely new sectors: Hybrid working models and the countless cloud services are preferred targets for hackers. And the shortage of qualified IT specialists additionally has made defense more challenging.<\/p>\n<p>The solution are MDR teams. These special units are formed from in-house or external security experts. With an arsenal of modern security solutions, they fight cyber threats around the clock. They prevent security incidents, respond to acute threats and restore the company's IT in the event of successful attacks.<\/p><\/div>\n\n                        <div class=\"summary-content_more-container\">\n                <div class=\"summary-content_more p3\"><strong>What is a Monitor, Detect &amp; Response Service?<\/strong><br \/>\nA MDR Service ensures continuous monitoring and defense against cyber threats for companies. The core components include Cyber Threat Intelligence, Incident Response, Security Monitoring, Vulnerability Management and Security Automation &amp; Orchestration. Here is the most important information about MDR Services.<\/div>\n                <div class=\"summary-content_more-btn\">Show more<\/div>\n                <div class=\"summary-content_less-btn\">Show less<\/div>\n            <\/div>\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"Contact us\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" disable_element=\"yes\"][vc_column]<div class=\"resources_slider_section\">\n    <div class=\"resources_slider_inner\">\n        \n    \n\n\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" disable_element=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h2 smx-headline \">Looming threats, insufficient resources<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\">Prevent attacks 24\/7 and respond before it's too late<\/div>\n<p>[\/vc_column_text][vc_column_text]According to statistics, it takes an average of 207 days for new cyber threats to be identified and 73 days for them to be completely resolved. Companies must therefore be prepared for threats 24 hours a day to avoid falling victim to attacks.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Why companies should use MDR Units<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step2.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">The key elements of Monitor, Detect &amp; Response Services<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step3.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Active before, during and after an emergency<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_Cyber_Defense.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Five key cyber challenges                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            In the fight against modern threats, security software alone is far from sufficient. The situation has drastically evolved in recent years and companies are facing major challenges.<\/p>\n<p><strong>1. Data overload &amp; alerts<\/strong><br \/>\nIT and security managers are often overwhelmed by the thousands of warning messages from networks, devices and services.<\/p>\n<ul>\n<li>The most important things are often difficult to identify: The many alerts from devices such as smartphones, PCs, IoT devices and cloud services make it difficult to identify real threats.<\/li>\n<li>Individual solutions are not enough: even a SIEM cannot always filter security-relevant data sufficiently.<\/li>\n<\/ul>\n<p><strong>2. Complex structures<\/strong><br \/>\nThe ``Work from Anywhere`` environment poses numerous security challenges. The main challenges:<\/p>\n<ul>\n<li>Incomplete monitoring and identification: Globally distributed systems and services are more difficult to secure - there are too many weak links in the IT chain.<\/li>\n<li>Delayed response times: These occur frequently with complex IT structures.<\/li>\n<li>New threats from BYOD, IoT and OT: Attackers are focusing on new or private devices that are often not adequately protected.<\/li>\n<\/ul>\n<p><strong>3. Fragmented security systems and ``blind spots``<\/strong><br \/>\nFirewalls, SIEM, malware protection: ensuring security with individual solutions is complex and challenging. The risks:<\/p>\n<ul>\n<li>Fragmented IT: Long response times due to individual analysis of alerts from devices, networks or cloud services<\/li>\n<li>High costs: escalating costs due to individual, constantly adapted solutions and providers<\/li>\n<\/ul>\n<p><strong>4. Fighting the unknown<\/strong><br \/>\nCompanies need to be fully informed about current threats. The challenges:<\/p>\n<ul>\n<li>Advanced Persistent Threats (APT): Sophisticated attackers hide undetected in the network, steal data and cause long-term damage.<\/li>\n<li>Phishing: Employees easily fall victim to scams as phishing attacks become increasingly sophisticated.<\/li>\n<li>Zero-day vulnerabilities: Previously unknown or unpatched vulnerabilities are bringing IT structures to a standstill.<\/li>\n<\/ul>\n<p><strong>5. Worst case scenario: shutdown of the entire IT system<\/strong><br \/>\nA cyber attack can completely shut down a company's entire IT system. This means:<\/p>\n<ul>\n<li>Work and production standstill due to interrupted systems and restricted communication<\/li>\n<li>Reputational damage due to operational downtime or data loss - with financial consequences<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            The five key elements                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            A good security operations unit includes the following core areas:<\/p>\n<p><strong>1. SIEM - Data in the center of security<\/strong><br \/>\nSecurity Information Event Management (SIEM) ensures a clear data situation and is at the heart of every MDR solution. It offers:<\/p>\n<ul>\n<li>Efficient data analysis: A SIEM collects security-relevant IT data and filters it according to threat level.<\/li>\n<li>Continuous optimization: In view of the constantly changing threat situation, the SIEM must be continuously adapted.<\/li>\n<\/ul>\n<p><strong>2. Security Operations Center (SOC) - the 24\/7 line of defense<\/strong><br \/>\nThe SOC is the control center for IT security. It uses the data analyzed by the SIEM and software-based approaches such as XDR. It offers:<\/p>\n<ul>\n<li><strong>24\/7 Detection &amp; Response: Immediate response to complex threats <\/strong><\/li>\n<li><strong>Comprehensive expertise and solid database: access to security experts and access to threat intelligence feeds<\/strong><\/li>\n<li><strong>Strong IT governance: transparency through defined service level agreements (SLA), KPIs and consistent reporting <\/strong><\/li>\n<\/ul>\n<p><strong>3. Managed XDR - identifying and Responding Across IT Boundaries <\/strong><br \/>\nExtended protection and response services (Extended Detect and Response, XDR) ensure that the entire IT is protected. XDR offers:<\/p>\n<ul>\n<li><strong>360-degree protection: Defense against threats to devices, networks, cloud infrastructures and applications<\/strong><\/li>\n<li><strong>The entire IT at a glance: Monitoring of local and cloud resources<\/strong><\/li>\n<\/ul>\n<p><strong>4. Cyber Threat Intelligence - current threat data at a glance<\/strong><br \/>\nCTI solutions collect, analyze and interpret data on current and impending threats from various sources. The advantages:<\/p>\n<ul>\n<li>Prompt warnings: The CTI warns of new vulnerabilities and attacks and helps defend against malware, phishing and other cyber attacks.<\/li>\n<li>Network monitoring: A CTI also includes web monitoring, leak detection and VIP protection. It monitors the network for data leaks and identity theft.<\/li>\n<li>Seamless integration: The CTI fits into the SIEM\/SOC structure and provides it with up-to-date data.<\/li>\n<\/ul>\n<p><strong>5. Incident Response Services (CSIRT) - a security grid for emergencies<\/strong><br \/>\nWith a skilled incident response team, companies can rapidly respond to emergencies. The tasks of a CSIRT team:<\/p>\n<ul>\n<li>Identifying and closing exploited security vulnerabilities<\/li>\n<li>Further support, for example in cooperation with authorities and through security tests (pentesting)<\/li>\n<li>Legal compliance and discretion: compliance with all data protection laws and protection of your reputation<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Cyber_Defense.jpg\" alt=\"Image\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Characteristics of good Monitor, Detect &amp; Response Services                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            Good MDR services combine expertise, technology, defined processes and commitment. Expert teams and services such as CTI, XDR, SOC and CSIRT ensure security and efficient preparation and response to cyber attacks. This includes:<\/p>\n<ul>\n<li>Proactive threat detection: Instead of just reacting to events, the MDR team proactively searches for potential threats using SIEM and CTI.<\/li>\n<li>Fast response time: In the event of security incidents, a quick response is crucial to minimize the damage. Clearly defined escalation procedures and response plans (CSIRT) take effect immediately and stop threats.<\/li>\n<li>24\/7 monitoring: Good MDR services offer continuous round-the-clock monitoring by a Security Operations Center (SOC) that identifies and responds to threats.<\/li>\n<li>Integration of the latest technologies: Advanced security technologies such as SIEM, XDR, CTI and co. must be implemented seamlessly and the interaction of services must be guaranteed.<\/li>\n<li>Specialized team: An experienced team of experts, including analysts, incident responders, threat hunters and security architecture specialists, is essential.<\/li>\n<li>Customized solutions: Every organization has unique security requirements and risks. Good MDR services therefore offer customized solutions.<\/li>\n<li>Reporting: The team provides transparency and timely action with reports on security incidents, detection and response performance, and recommendations.<\/li>\n<li>Continuous improvement: Good MDR services are constantly learning - by analyzing security incidents and trends, implementing lessons learned and adapting new processes and technologies.<\/li>\n<\/ul>\n<p>Such complex interaction can hardly be managed with internal resources. This is why companies often rely on a well-established team of service providers (``managed service providers``).                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">Monitor, Detect &amp; Recover - from one source<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>SITS offers comprehensive MDR Services and manages your entire IT security from that point on. Our offer at a glance:<\/p>\n<ul>\n<li><strong>1.Recovery &amp; Protection: <\/strong>Rapid recovery of IT after a security incident and strengthening of future defenses by our CSIRT expert teams 24\/7 defense mechanisms and assistance through threat detection via CTI<\/li>\n<li><strong>2. 24\/7 Monitoring, Response &amp; Protection:<\/strong> Protection of IT and data through a Security Operations Center, SIEM, MXDR and more<\/li>\n<li><strong>3. Recovery &amp; Protection:<\/strong> Rapid recovery of IT after a security incident and strengthening of future defenses by our CSIRT expert teams<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h2 smx-headline \">Our MDR Services<\/h1>[vc_column_text]Our Monitor, Detect &amp; Response services are tailored to your company. After an initial assessment of your IT infrastructure, we analyze your IT infrastructure and ensure the tailored integration of our services. Then 24\/7 operations start: from this point on, the IT infrastructure is continuously monitored for new threats. Incident response teams are on hand to react quickly in the event of an emergency. Our offer includes:[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"process-boxes_wrapper\">\n    <div class=\"process-boxes_container container\">\n            <div class=\"process-boxes_single has-content\">\n            <div class=\"process-boxes_single-inner\">\n                <div class=\"process-box_counter boxheadline\">\n                    01                <\/div>\n                <div class=\"process-box\">\n\n                    <div class=\"process-box_icon\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Step1.svg\" alt=\"icon\">\n                    <\/div>\n                    <div class=\"process-box_content boxheadline\">\n                        1 - Initial Assessment                    <\/div>\n                <\/div>\n                                    <div class=\"process-box_hover-content\">\n                        Our experts analyze your IT infrastructure, evaluate the current status and the security measures taken to date.                    <\/div>\n                            <\/div>\n        <\/div>\n            <div class=\"process-boxes_single has-content\">\n            <div class=\"process-boxes_single-inner\">\n                <div class=\"process-box_counter boxheadline\">\n                    02                <\/div>\n                <div class=\"process-box\">\n\n                    <div class=\"process-box_icon\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Step2.svg\" alt=\"Icon\">\n                    <\/div>\n                    <div class=\"process-box_content boxheadline\">\n                        2 - Monitoring &amp; Analysis                    <\/div>\n                <\/div>\n                                    <div class=\"process-box_hover-content\">\n                        Our teams of experts analyze your IT 24\/7 for suspicious events and potential attacks.                    <\/div>\n                            <\/div>\n        <\/div>\n            <div class=\"process-boxes_single has-content\">\n            <div class=\"process-boxes_single-inner\">\n                <div class=\"process-box_counter boxheadline\">\n                    03                <\/div>\n                <div class=\"process-box\">\n\n                    <div class=\"process-box_icon\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Step3.svg\" alt=\"Icon\">\n                    <\/div>\n                    <div class=\"process-box_content boxheadline\">\n                        3 - Tailor-made Recommendations                    <\/div>\n                <\/div>\n                                    <div class=\"process-box_hover-content\">\n                        Our teams evaluate incidents and data and make effective recommendations for your IT.                    <\/div>\n                            <\/div>\n        <\/div>\n            <div class=\"process-boxes_single has-content\">\n            <div class=\"process-boxes_single-inner\">\n                <div class=\"process-box_counter boxheadline\">\n                    04                <\/div>\n                <div class=\"process-box\">\n\n                    <div class=\"process-box_icon\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Step4.svg\" alt=\"Icon\">\n                    <\/div>\n                    <div class=\"process-box_content boxheadline\">\n                        4 - Emergency response strategies                    <\/div>\n                <\/div>\n                                    <div class=\"process-box_hover-content\">\n                        Our Incident Response Team develops emergency concepts and ensures rapid recovery in the event of an emergency.                    <\/div>\n                            <\/div>\n        <\/div>\n    \n\n            <div class=\"process-boxes_single has-content\">\n            <div class=\"process-boxes_single-inner\">\n                <div class=\"process-box_counter boxheadline\">\n                    05\n                <\/div>\n                <div class=\"process-box\">\n                    \n                    <div class=\"process-box_icon\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Step5.svg\" alt=\"\">\n                    <\/div>\n                    <div class=\"process-box_content boxheadline\">\n                        5 - 24\/7 Security                    <\/div>\n                <\/div>\n                                    <div class=\"process-box_hover-content\">\n                        We provide complete protection for your IT - at all times.                    <\/div>\n                            <\/div>\n        <\/div>\n    \n    \n\n    <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h2 smx-headline  center\">Your 360\u00b0 MDR Service<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">An all-round solution for your security - from a single source<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Our MDR Services identify problems before they become serious threats - through analysis tools, 24\/7 monitoring, rapid response and system recovery in the event of an emergency.<\/p>\n<p style=\"text-align: center;\">These are the most important components of our MDR Services:<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-5 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/en\/cyber-defense\/csirt\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    CTI as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our Managed Cyber Threat Intelligence Service provides relevant, up-to-date data and insights. We help you to proactively identify threats.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/en\/cyber-defense\/siem\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    SIEM as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our SIEM is the hub of your security data and provides important information for your Security Operations Center.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/en\/cyber-defense\/security-operations-center\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    SOC as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    The SOC from SITS is our cyber security center and offers protection 24\/7. It helps to identify threats around the clock and respond quickly and appropriately to attacks.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/en\/cyber-defense\/mxdr\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    XDR as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Through Extended Detection and Response (XDR), we improve the security of all your services, devices, networks and cloud applications.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/en\/cyber-defense\/csirt\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    CSIRT as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our expert teams identify attack behaviors, quickly mobilize resources to recover control, and handle your security incident as discreetly as possible.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            MDR Services: Your advantages        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        Automated 24\/7 protection against cyber threats with MDR services    <\/div>\n    <div class=\"text\">\n        <strong>With Monitor, Detect &amp; Response services from SITS, you are fully protected.<\/strong> Our expert teams take care of the security of your company's IT infrastructure - from the server in your in-house data center to the endpoint of remote employees. We offer you the following benefits:<\/p>\n<ul>\n<li><strong>Prevention, analysis, response and recovery<\/strong> by experienced expert teams and sophisticated solutions - <strong>24\/7\/365<\/strong><\/li>\n<li>You gain <strong>time and resources<\/strong> to focus on your business.<\/li>\n<li><strong>Bundled expert knowledge:<\/strong> Thanks to our expertise and solutions in the areas of IAM, SOC, cloud platform security or network security, you get the perfect solution for every security problem. <strong>Everything from a single source.<\/strong><\/li>\n<li><strong>Our teams of experts<\/strong> rely on first-class MDR solutions such as QRadar, MS Sentinel or CSOC.<\/li>\n<li><strong>BSI compliance:<\/strong> We support you in implementing and complying with BSI standards for setting up an attack detection system for verification in accordance with Section 8a (1a) BSIG and Section 11 (1d) ENWG.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#contact\" class=\"btn-text\" target=\"_blank\">Contact us<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Security just one click away!                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Get zero-compromise security: Our security operations experts offer you 24\/7 service and comprehensive protection from a single source. Get in touch now for 360\u00b0 protection against all threats.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact Us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/how-resilient-is-your-workplace-it-really\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog.png 1200w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-300x157.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-1024x535.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/04\/Header-CRW_Phase1_Blog-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Resilient Workplace<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            How Resilient Is Your Workplace IT Really?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/obligation-to-report-cyberattacks-from-april-2025\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/Challenge-2-copy-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            From 1 April 2025: mandatory reporting of cyberattacks on critical infrastructure in Switzerland                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/managed-soc-advantages-costs-finding-top-providers-checklist-2\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/09\/CyberDefense8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed SOC: advantages, costs &amp; finding top providers (checklist)                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/secure-identities-current-trends\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Secure Identities: Current trends                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/microsoft-entra\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1830\" height=\"1190\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690.jpeg 1830w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-300x195.jpeg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1024x666.jpeg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-768x499.jpeg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/07\/cloud_management-scaled-e1694176452690-1536x999.jpeg 1536w\" sizes=\"auto, (max-width: 1830px) 100vw, 1830px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Entra: A portrait of a versatile product family                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/identity-meets-resilience\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/01\/IAM5-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Identity meets Resilience                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/blog-nis2-and-penetrationstests\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/NetworkElement1_NIS2MS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Penetration Tests: Getting Grip on NIS2-compliant Technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/blog-resilience-by-identity\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Resilience by Identity                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/getting-a-grip-on-cryptography\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Getting a Grip on Cryptography                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/microsoft-sentinel-als-azure-siem-vorteile-kosten\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Microsoft Sentinel as Azure SIEM - Benefits & Costs                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/fighting-ai-attacks-how-to-protect-data-and-systems\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Fighting AI attacks: How to protect data and systems                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO 27001 Certification without delay                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/managed-services-to-counter-the-shortage-of-manpower\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed Services to counter the shortage of manpower                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security with SASE, this is how it works                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/devops-security-stress-test-for-culture-and-technology\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps security: Stress test for culture and technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/blog\/biometrics-better-security-without-passwords\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Biometrics - better security without passwords?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <div class=\"h2 smx-headline\">\n                    Questions about Monitor, Detect &amp; Response Services                <\/div>\n                <div class=\"subheadline\">\n                    Key questions about MDR services                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">How does a MDR service combat APTs?  <\/button>\n                                    <div class=\"panel\">\n                                        <p>A MDR service identifies and combats complex APTs with up-to-date detection mechanisms and incident response strategies. Through continuous monitoring and analysis, APTs are detected and isolated at an early stage to minimize damage.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How do MDR services support compliance and risk management?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Monitor, Detect & Response Services implement a comprehensive set of security measures to ensure that your company demonstrably complies with all applicable rules and regulations - from the GDPR to the NIS2 directive.   It also helps with risk management by identifying vulnerabilities and providing recommendations for risk mitigation.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What core competencies do MDR team members need to have?<\/button>\n                                    <div class=\"panel\">\n                                        <p>MDR team members should have the following skills and experience:  Knowledge of current cyber threats: MDR team members should have in-depth knowledge of the latest threat vectors, tactics, techniques and procedures (TTPs) used by cyber criminals. This includes an in-depth understanding of ransomware, advanced persistent threats (APT), phishing attacks, insider threats and the impact of vulnerabilities.  Experience with security tools and technologies: The team should be experienced with numerous security tools - including SIEM systems, firewall and IDS\/IPS solutions, Endpoint Detection and Response (EDR) and Security Orchestration, Automation and Response Platforms (SOAR). Experience with cloud security tools and cloud platforms is also essential, as many companies are moving to hybrid or cloud environments.  Incident response skills: The team needs extensive knowledge and hands-on experience in responding to security incidents. This includes efficiently handling the entire incident response cycle - from identifying and containing to response, threat handling and service recovery.  Understanding of network architectures: A profound understanding of both traditional and modern network architectures is essential to monitor the flow of data within an organization and identify potential vulnerabilities.  Digital forensics skills: Knowledge of digital forensics supports the detailed investigation and analysis of cyber attacks and helps to understand the attackers' purpose and methods.  Knowledge of legal and regulatory requirements: Understanding of data protection laws such as GDPR, HIPAA and industry-specific compliance requirements to ensure the SOC operates within the regulatory framework and meets client requirements.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column el_id=\"contact\"]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            We\u2019re here for you        <\/div>\n        <div class=\"subheadline\">\n            Fill in the form and our experts will get in touch.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '8faf6ce1-cd2a-488c-bde9-666b247d4fb7'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Claudia Hofmann                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; disable_element=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; disable_element=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Prevent attacks 24\/7 and respond before it&#8217;s too late [\/vc_column_text][vc_column_text]According to statistics, it takes an average of 207 days for new cyber threats to be identified and 73 days for them to be completely resolved. Companies must therefore be prepared for threats 24 hours a day to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4470","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Monitor, Detect &amp; Response | SITS<\/title>\n<meta name=\"description\" content=\"Monitor, Detect &amp; Response \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitor, Detect &amp; Response | SITS\" \/>\n<meta property=\"og:description\" content=\"Monitor, Detect &amp; Response \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-13T08:47:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/\",\"name\":\"Monitor, Detect & Response | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"datePublished\":\"2024-04-02T12:08:59+00:00\",\"dateModified\":\"2024-12-13T08:47:22+00:00\",\"description\":\"Monitor, Detect & Response \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Monitor, Detect &#038; Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitor, Detect & Response | SITS","description":"Monitor, Detect & Response \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Monitor, Detect & Response | SITS","og_description":"Monitor, Detect & Response \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/","og_site_name":"SITS","article_modified_time":"2024-12-13T08:47:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/","url":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/","name":"Monitor, Detect & Response | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"datePublished":"2024-04-02T12:08:59+00:00","dateModified":"2024-12-13T08:47:22+00:00","description":"Monitor, Detect & Response \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/monitor-detect-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Monitor, Detect &#038; Response"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/4470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=4470"}],"version-history":[{"count":12,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/4470\/revisions"}],"predecessor-version":[{"id":18560,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/4470\/revisions\/18560"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=4470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}