{"id":6893,"date":"2024-03-27T14:54:59","date_gmt":"2024-03-27T13:54:59","guid":{"rendered":"https:\/\/thesitsgroup.com\/cloud-platform-security\/"},"modified":"2024-10-31T11:53:09","modified_gmt":"2024-10-31T10:53:09","slug":"cloud-platform-security","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/","title":{"rendered":"Cloud Platform Security"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_CPS-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    The path to the Cloud: Secure and compliant transition to M365 and Azure \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Cloud Platform Security \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">Migrate securely to Microsoft 365 and Azure<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Migrating to the Microsoft cloud offers companies numerous advantages: Microsoft 365 enables them to work more productively, while Azure provides them with the ability to build infrastructures dynamically, thereby saving time and costs.<\/p>\n<p>However, migrating and working in the cloud comes with a number of challenges: Compliance and data integrity must be guaranteed at all times, and data loss, leaks and unauthorized access must be prevented. The migration also needs to be efficient, fast and resource-friendly. And hybrid forms of work associated with the cloud (\"working from anywhere\") entail additional risks that need to be managed.<\/p>\n<p>A well elaborated cloud platform security strategy is therefore required to ensure maximum security and compliance - both during migration and when working in the cloud. With a tailored strategy, companies can protect their data, applications and infrastructures in Azure and Microsoft 365. They also receive information on how to identify current threats at an early stage and respond to them immediately.<\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<div class=\"headline h2\">The way to Cloud Readiness<\/div>\n<div class=\"subheadline\">Obstacles along the way to Cloud Transformation<\/div>\n<div class=\"text\">\n<p>For companies, switching to the Microsoft 365 Cloud often offers major productivity and security improvements. However, the migration raises a number of questions: How can the move to the cloud be completed securely? How can compliance and security be established if all data, apps and services are in the cloud?<\/p><\/div>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">The advantages of the Microsoft Cloud<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step2.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">The major risks when migrating to the Cloud<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step3.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Strategies for improved security in the cloud<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Collaborative and universally available                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li>Work from anywhere, seamless collaboration and AI support: The Microsoft Cloud offers a number of advantages over the classic on-premise model - assuming companies implement appropriate security measures.<\/li>\n<li>Work from anywhere: Hybrid cloud approaches enable access to data and services from anywhere. This gives employees more flexibility and productivity.<\/li>\n<li>Automated updates: The continuous updating of software reduces the workload for the IT department, closes security gaps and thus prevents cyber attacks.<\/li>\n<li>Cost efficiency: Reducing maintenance work on local networks and services saves costs and scales corporate IT as required.<\/li>\n<li>Everything from a single source: By using one platform instead of several third-party products, companies save costs and work more productively.<\/li>\n<li>Improved collaboration: M365 and tools such as Microsoft Teams ensure more productive collaboration as they speed up the exchange of information and allow several people to work on a document at the same time.<\/li>\n<li>Integration of AI: The cloud-based AI assistant Microsoft Copilot increases productivity and supports employees in managing their daily tasks.<\/li>\n<li>Centralized IT: A centralized platform with Microsoft 365 and Azure solutions is easier for the IT department to manage than fragmented local solutions.<\/li>\n<li>International roll-out: Microsoft data centers can be rolled out quickly in other countries thanks to global availability.<\/li>\n<li>High availability and performance: The Microsoft Cloud automatically ensures higher availability and scaling during peak loads.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_CPS.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            What companies need to pay attention to                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            A well considered strategy is required to migrate securely to the Microsoft Cloud and use it securely. IT managers need to address the following issues and risks in particular:<\/p>\n<ul>\n<li>Configuration errors: Many ransomware attacks exploit configuration errors that occurred during migration to the cloud.<\/li>\n<li>Insider threats: If company resources are accessible from anywhere, the risk of unauthorized access increases.<\/li>\n<li>Inadequate compliance and governance: Compliance breaches are a threat due to inadequate access management and control, for example. Depending on the industry, they can cause high costs.<\/li>\n<li>Lack of data classification: The data that employees or AI are using in the cloud must be classified and specified. In addition, data access must be strictly controlled.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_CPS.jpg\" alt=\"Image\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Reaching the goal with a well structured roadmap                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            In order to utilize the benefits of the cloud and reduce risks at the same time, companies should prepare carefully before the migration. This is the only way to ensure that data, services and user identities remain protected in the cloud.<br \/>\nIdeally, companies should have a certified Microsoft partner at their side who will tailor the Microsoft solution specifically to their IT structures and needs. The following points in particular should be taken into account:<\/p>\n<ul>\n<li>Accurate migration: Companies must prepare comprehensively for the migration of applications, data and IT infrastructure to the Microsoft Cloud.<\/li>\n<li>Compliance with regulatory standards: Compliance experts must ensure that industry-specific regulations are complied with and implemented.<\/li>\n<li>Creation of emergency concepts: These are essential in order to ensure an immediate and adequate response in the event of a resource failure or cyber attack.<\/li>\n<li>Identity and access management: An IAM ensures security through access management and protection. When moving to the cloud, an IAM system is essential.<\/li>\n<li>Promoting awareness: Awareness training for employees ensures secure handling of the cloud and AI technologies.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Security just one click away!                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Our Cloud-Experts take care of your transformation From migration and data security to comprehensive 360\u00b0 set-up \u2013 our consulting services will help you take your company safely to the Microsoft Cloud.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact Us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"process-slider_wrapper\">\n    <div class=\"process-slider_container\">\n        <div class=\"process-slider_header\">\n            <div class=\"process-slider_headline h2 headline\">Cloud Platform Security<\/div>\n            <div class=\"process-slider_subheadline subheadline\">Plan with care, migrate and work securely<\/div>\n        <\/div>\n        <div class=\"process-slider_inner\">\n            <div class=\"process-slider_navigation-wrapper size--3\">\n                <div class=\"process-slider_navigation\">\n                                            <div class=\"process-slider_nav-single  active\">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Cloud Migration & Transformation with SITS<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Cloud Compliance & Security Consulting<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Cloud data security: ensuring data security<\/div>\n                            \n                            \n                        <\/div>\n                                        <div class=\"process-slider_timeline\">                             <div class=\"process-slider_timeline-step active\">\n                                <div class=\"subheadline\">1<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">2<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">3<\/div>\n                            <\/div>\n                                                <div class=\"process-slider_timeline-line\">\n                            <div class=\"process-slider_timeline-line_left\"><\/div>\n                            <div class=\"process-slider_timeline-line_right\"><\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                <div class=\"process-slider_arrows\">\n                    <div class=\"process-slider_prev\"><\/div>\n                    <div class=\"process-slider_next\"><\/div>\n                <\/div>\n            <\/div>\n            <div class=\"process-slider_caret\">\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">Cloud Migration & Transformation with SITS<\/div>\n                        <div class=\"process-slider_content\">The SITS expert teams ensure your secure path to the cloud: As a Microsoft partner, we carry out your migration project according to the principle of \"security by design\" from the very beginning.  \n \nWith consultations and workshops on \"Cloud Migration & Transformation\", we prepare you and your teams for the cloud transformation. We provide you with support during the migration and, if required, with a 24\/7 managed service for day-to-day work with the cloud. \n \nThis ensures that your cloud implementation can be used securely and reliably, that regulatory requirements are met and that threats are detected at an early stage. Further information on our migration and transformation consulting can be found here.  \n \nOur \"Cloud Migration & Transformation\" offer includes the following services in particular:  \n\n\n<ul>\n<li>Consulting: With workshops, a roadmap and consulting, we implement the transformation project sustainably in your company - in line with your budget and requirements. <\/li>\n<li>Kick-off as a minimal viable product (MVP): The initial version of the cloud implementation is used for the first roll-out and testing with the first users and scenarios.  <\/li>\n<li>Optimization of the MVP: Based on user feedback, we expand and modify your first cloud environment. <\/li>\n<li>Migration: Based on the results of the MVP, we support you with the migration to the cloud.  <\/li>\n<li>People Side of Change: Finally, our teams introduce organizational changes to day-to-day work - from IT admin to middle management to executive management. <\/li>\n<li>Cloud optimization: After implementation, SITS experts continuously adapt the platform to current requirements and threats.<\/li>\n<\/ul>\n<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">Cloud Compliance & Security Consulting<\/div>\n                        <div class=\"process-slider_content\">Every company is subject to specific regulations and (inter)national standards and regulations, such as KRITIS, BaFIN regulations, the GDPR, PCI-DSS, NIS2 directive and ISO\/IEC 27001. They are obliged to strictly comply with the regulations that are applicable to them.  \n \nOur cloud-based security and compliance consulting services ensure that you meet all information security and compliance regulations. At the same time, we strengthen your cyber security with cloud-based systems such as Defender XDR or Microsoft Purview You can find more information here.  \n \nYour benefits at a glance:\n\n\n<ul>\n<li>Continuous monitoring of the cloud status for compliance with guidelines <\/li>\n<li>Immediate detection of compliance violations  <\/li>\n<li>Identification of internal risks and threats  <\/li>\n<li>Optimization of technical processes  <\/li>\n<li>Technical implementation of regulatory requirements  <\/li>\n<li>Introduction of modern threat protection systems <\/li>\n<\/ul><\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">Cloud data security: ensuring data security<\/div>\n                        <div class=\"process-slider_content\">The classification of data has not only become relevant for companies since the GDPR. The use of cloud services, the increase in mobile working and the use of AI solutions are giving the topic a whole new priority. \n \nCompanies need to keep track of who is accessing which data. AI technologies such as Microsoft Copilot also offer new ways of obtaining and processing information. Every company therefore needs clear data security guidelines. Our consulting on cloud data security supports you in this. You can find more information on cloud data security here. \n\n\nYour benefits:\n\n<ul>\n<li>Secure use of cloud services  <\/li>\n<li>Compliance with regulatory standards  <\/li>\n<li>Technical support for data protection processes <\/li>\n<li>Identification of sensitive and critical company data  <\/li>\n<li>Prevention and avoidance of data loss <\/li>\n<li>Encryption of critical data  <\/li>\n<li>Technical establishment of retention and deletion periods  <\/li>\n<li>Secure and protected collaboration with external employees<\/li>\n<\/ul>\n<\/div>\n                                            <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<h2  class=\"h3 smx-headline  center\">The SITS Offering<\/h2>[vc_column_text]<\/p>\n<div class=\"headline h2\" style=\"text-align: center;\">\n<p>From workshops to managed service<\/p><\/div>\n<div class=\"text\" style=\"text-align: center;\">\n<p>The SITS experts start the migration preparation and implementation with strategic workshops on cloud transformation, create a security roadmap - and then set up a consulting project together with you. After this, we can support you with our managed services if required.<\/p><\/div>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-4 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/cloud-platform-security\/migration-and-transformation-services\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Integrating your IT infrastructure                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    We integrate your workflows into a hybrid environment, for example when designing and implementing \"software as code\" environments, DevOps security and hybrid governance processes.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/cloud-platform-security\/migration-and-transformation-services\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Assessments Ihrer IT-Umgebung                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    In our cloud transformation workshops, we work with you to identify the potential for your cloud transformation. You will receive an overview of your situation and suitable recommendations.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/cloud-platform-security\/cloud-security-compliance\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Cloud Security & Compliance                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    In a build-intent workshop, we determine your compliance requirements and plan the next steps together. At the end, we are happy to support you with implementation and customization.                                  <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/cloud-platform-security\/cloud-data-security\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Data classification                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    We set up Microsoft Purview Information Protection for the classification and possible additional encryption of your critical data.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div id='festes_grid'>\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CPS-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <div class=\"h2 smx-headline\">\n                    Your advantages \n                <\/div >\n            <\/div>\n            <div class=\"subheadline\">\n                Maximum security when moving to the cloud \n            <\/div>\n            <div class=\"text\">\n                Our tailored consulting services ensure secure migration to the Microsoft Cloud, its secure use and the protection of all your critical data. Your benefits: \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-3  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_React.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Microsoft expertise                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">We offer comprehensive expertise and have direct contact with the Microsoft product teams. Our insider knowledge based on this guarantees state-of-the-art solutions. <\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AboutUs_Icon_Clients.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Elite partner programs                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Through our participation in exclusive partner programs, the vision and roadmap of Microsoft's cloud solutions flow directly into your projects. This gives you a head start in technological development. <\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/CyberDefenseServices_Protect_Light.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Compliance expertise                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">We are represented in the \"Microsoft Compliance PAC\" - a committee of a few selected management consultants with special expertise in the area of security and compliance.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                            <\/div>\n    <\/div>\n<\/div>\n\n<\/div >\n\n\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/fighting-ai-attacks-how-to-protect-data-and-systems\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Fighting AI attacks: How to protect data and systems                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO 27001 Certification without delay                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/managed-services-to-counter-the-shortage-of-manpower\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed Services to counter the shortage of manpower                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security with SASE, this is how it works                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/devops-security-stress-test-for-culture-and-technology\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps security: Stress test for culture and technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/biometrics-better-security-without-passwords\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Biometrics - better security without passwords?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/threat-intelligence-knowledge-is-power-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Threat Intelligence - Knowledge is power & security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-iso-iec-270012022-new-controls-to-fulfill-both-standards\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & ISO\/IEC 27001:2022: New controls to fulfill both standards                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/how-preferred-access-management-increases-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            How Privileged Access Management increases security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/vciso-more-it-security-through-customizable-support\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            vCISO - more IT Security through customizable support                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-from-microsoft-is-your-company-copilot-ready\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div><div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI from Microsoft: Is your company Copilot Ready?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-risk-management-are-cyber-risks-really-manageable\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Risk Management: Are cyber risks really manageable?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/protective-shield-for-your-cloud-platforms-tips-tricks-pitfalls\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Protective shield for your cloud platforms: Tips, Tricks, Pitfalls                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/security-all-rounder-ciso-outsource-or-hire-yourself\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Security all-rounder CISO: Outsource or hire yourself?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Management of cyber security risks in industrial IoT and OT                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-generated-deepfakes-attack-on-democracy-and-the-global-economy\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI-generated deepfakes - attack on democracy and the global economy                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <h3 class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/h3>\n                <div class=\"subheadline\">\n                    The most important answers about Cloud Security                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">What is Cloud-Security?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Cloud security refers to the technologies, policies, and procedures designed to protect cloud-based systems from cyber threats. It ensures data integrity, confidentiality, and the availability of data, applications, and cloud infrastructures in public, private, and hybrid environments. Cloud security aims to prevent unauthorized access and protect cloud services against threats such as data leaks, ransomware, or malware. Companies using cloud services benefit from scalable security solutions tailored to their specific needs.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does Cloud Security work?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Cloud security involves a wide variety of technologies and best practices used by both cloud providers and users. This includes encryption, firewalls, identity and access management (IAM), threat monitoring, and vulnerability management. Security in the cloud operates on a shared responsibility model: the provider is responsible for the security of the infrastructure, and the user is responsible for securing data and applications. Regular compliance reviews and adhering to standards like GDPR and ISO are integral parts of cloud security. <h4><b>Cloud Service Types<\/b><\/h4> There are three main types of cloud services, each offering varying levels of control and responsibility:<ul><li><b>Infrastructure as a Service (IaaS):<\/b> Includes virtual machines, storage, and network infrastructure, allowing companies to run their own applications on the provided infrastructure. Examples include AWS, Microsoft Azure, and Google Cloud.<\/li><li><b>Platform as a Service (PaaS):<\/b> Offers a platform where developers can create and run applications without worrying about the underlying infrastructure. Examples include Google App Engine and Microsoft Azure App Services.<\/li><li><b>Software as a Service (SaaS):<\/b> Gives users ready-to-use software solutions accessible via the internet. They can use the software without handling maintenance, updates, or infrastructure. Examples include Google Workspace, Microsoft 365, and Salesforce.<\/li><\/ul><\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What are Cloud Environments?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Cloud environments refer to how cloud infrastructures are set up and used. There are four main types:<ul><li><b>Public Cloud:<\/b> Services provided by third parties like AWS or Azure over the public internet. It\u2019s the most cost-effective solution, offering scalability with resources shared among multiple users.<\/li><li><b>Private Cloud:<\/b> A cloud environment exclusively used by one organization, offering more control and security as resources aren\u2019t shared with others. Private clouds can be hosted locally or by a third party.<\/li><li><b>Hybrid Cloud:<\/b> Combines public and private clouds, allowing data and applications to be shared between the two. This enables flexibility, with sensitive data stored in the private cloud and less critical data or applications run in the public cloud.<\/li><li><b>Multi-Cloud:<\/b> Involves using multiple cloud providers for different tasks, offering flexibility and redundancy. Companies often adopt multi-cloud strategies to avoid vendor lock-in and utilize specialized services.<\/li><\/ul><\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_SecurityITSolutions.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_SecurityITSolutions.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_SecurityITSolutions-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_SecurityITSolutions-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_SecurityITSolutions-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n<div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Get in touch        <\/div>\n        <div class=\"subheadline\">\n            Talk to our experts and get a tailored offer ready.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '62eff31a-b153-4cb6-bc87-785a6a8fcd19'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CloudPlatform-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Sophie Richter                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] The way to Cloud Readiness Obstacles along the way to Cloud Transformation For companies, switching to the Microsoft 365 Cloud often offers major productivity and security improvements. However, the migration raises a number of questions: How can the move to the cloud be completed securely? How can compliance and security be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-6893","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Platform Security | SITS<\/title>\n<meta name=\"description\" content=\"Cloud Platform Security \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Platform Security | SITS\" \/>\n<meta property=\"og:description\" content=\"Cloud Platform Security \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-31T10:53:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/\",\"name\":\"Cloud Platform Security | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\"},\"datePublished\":\"2024-03-27T13:54:59+00:00\",\"dateModified\":\"2024-10-31T10:53:09+00:00\",\"description\":\"Cloud Platform Security \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Platform Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Platform Security | SITS","description":"Cloud Platform Security \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"Cloud Platform Security | SITS","og_description":"Cloud Platform Security \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/","og_site_name":"SITS","article_modified_time":"2024-10-31T10:53:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/","url":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/","name":"Cloud Platform Security | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#website"},"datePublished":"2024-03-27T13:54:59+00:00","dateModified":"2024-10-31T10:53:09+00:00","description":"Cloud Platform Security \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/nl\/cloud-platform-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Cloud Platform Security"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/nl\/#website","url":"https:\/\/sits.friendventure.dev\/nl\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/nl\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/6893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/comments?post=6893"}],"version-history":[{"count":6,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/6893\/revisions"}],"predecessor-version":[{"id":17839,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/6893\/revisions\/17839"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/media?parent=6893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}