{"id":9228,"date":"2024-03-27T16:49:30","date_gmt":"2024-03-27T15:49:30","guid":{"rendered":"https:\/\/thesitsgroup.com\/iam\/"},"modified":"2024-04-29T15:07:51","modified_gmt":"2024-04-29T13:07:51","slug":"identity-access-management","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/","title":{"rendered":"IAM: Security based on Access Management"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_IdentityManagement-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    360\u00b0 Identity and Access Management \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    IAM: Security based on Access Management \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact Us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h4\">IAM for Security, Compliance and Efficiency<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Hybrid and globally networked working models can lead to numerous security risks - and raise the question for companies: How can we efficiently protect our IT systems, business-critical information and user accounts?<\/p>\n<p>Effective protection of user identities, devices and services can only be provided by comprehensive Identity and Access Management (IAM).<\/p>\n<p>The implementation of suitable IAM strategies and technologies is therefore essential to ensure the integrity and availability of company resources and to minimize risks.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>This is how IAM supports security and compliance:<\/strong><\/p>\n<ul>\n<li>Identity and Access Management ensures that users and devices have secure access to the company's IT resources and that they only have access rights that are strictly necessary.<\/li>\n<li>Managing digital identities and controlling access to systems and data with the help of an IAM are important components of an organization's cyber security strategy.<\/li>\n<li>An effective IAM solution meets the company's individual requirements, integrates seamlessly into the IT environment and monitors systems around the clock.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h3 smx-headline \">Prevent data leaks<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\">State-of-the-art working environments: This is where good Identity Management comes into play<\/div>\n<div class=\"text\">Hybrid working methods are exposing IT systems to a growing number of threats, and the majority of cloud security incidents can be attributed to inadequately managed identities. A tailor-made IAM provides the solution.<\/div>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Identity and Access Security: A must for companies<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step2.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">From PAM to IGA: What is included in an IAM?<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step3.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">In-depth planning and seamless implementation<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_IdentityManagement.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Master risks, rethink IAM                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            The hybrid working environment with its numerous users, data and services confronts companies with a range of security risks - both in the local network and in the cloud.<\/p>\n<p>Mature identity and access management is required to effectively manage and control access to the company's resources and comprehensively protect its data.<\/p>\n<p>Inadequate regulation of access rights, which facilitates data leaks or data theft, is also often a compliance issue. Companies in industries with strict regulations, such as healthcare, finance or e-commerce, are particularly at risk of sanctions and high claims for damages.<\/p>\n<p><strong>Companies must manage these challenges:<\/strong><\/p>\n<ul>\n<li><strong>Unauthorized access: <\/strong>If access to IT systems is not controlled and monitored, unauthorized persons can easily gain access to sensitive data and systems.<\/li>\n<li><strong>Data security risks:<\/strong>Threats from hacks, data breaches and identity theft due to inadequate access controls are constantly growing.<\/li>\n<li><strong>Cyber threats:<\/strong>Without IAM, organizations are more vulnerable to cyber-attacks, data tampering, insider threats and other security risks.<\/li>\n<li><strong>Compliance breaches: <\/strong> When organizations fail to securely and compliantly manage access rights and adequately protect IT access, they risk data breaches, legal penalties, fines and reputational damage.<\/li>\n<li><strong>Inefficient processes: <\/strong>User and access management that is carried out only manually often increases the administrative workload and delays the deployment of resources.<\/li>\n<\/ul>\n<p><strong>IAM with ``Identity Fabric`` brings the solution<\/strong><\/p>\n<p>Only an IAM that covers the entire IT infrastructure - from apps and data to user accounts - can effectively minimize risks. This so-called ``identity fabric`` approach aims to standardize and centralize identity data and access controls across different systems and applications.<\/p>\n<p>Similar to a fabric woven from many threads, different identity data sources and systems are seamlessly linked to provide a holistic view of user identities and access rights.                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_IdentityManagement.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Customized IAM support for businesses                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            Identity and access management includes various concepts and technologies for managing user identities and access rights. Identity management includes the creation, updating, monitoring and deletion of user accounts and authorizations.<\/p>\n<p>The best way to find out which IAM concept fits a company's requirements is in a personal assessment. Here is an overview of the best-known IAM strategies.<\/p>\n<ul>\n<li><strong>Classic IAM<\/strong> manages and controls identities and access rights from a central location. It includes functions such as user administration, authentication, authorization, authorization management and single sign-on (SSO).<\/li>\n<li><strong>Role-Based Access Control (RBAC) <\/strong>is based on the assignment of ``roles`` to users and the allocation of access rights according to these roles. The assigned authorizations correspond to the respective function of the user in the company and are therefore not assigned individually.<\/li>\n<li><strong>Attribute-Based Access Control (ABAC<\/strong>is based on user and system attributes as well as environment parameters. It enables very precise access controls.<\/li>\n<li><strong>Policy-Based Access Control<\/strong>determines access rights by defining and applying guidelines that can differ depending on the function of the users in the company.<\/li>\n<li><strong>Adaptive Access Control<\/strong>dynamically adapts the access control guidelines to the respective context and current risks by continuously monitoring and evaluating user behavior, device information and other factors.<\/li>\n<li><strong>Privileged Access Management (PAM)<\/strong>is primarily used to manage and monitor access to privileged user accounts - and provides additionally layers of security for access to sensitive systems and data. PAM helps to reduce attacks with ransomware and on supply chains as well as data leaks.<\/li>\n<li><strong>Customer Identity and Access Management (CIAM)<\/strong>is a special form of IAM that aims to manage customer identities and access in B2C applications.<\/li>\n<li><strong>Identity Governance and Administration (IGA)<\/strong>manages digital identities and authorizations to ensure compliance and reduce risk. IGA is crucial for compliance with standards and the management of rights to apps, services and data.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_IdentityManagement.jpg\" alt=\"Image\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            The five steps to an IAM system                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            In order to manage the diverse challenges of reliable and comprehensive access and identity management in the company, in-depth planning and a seamless IAM implementation are required.<\/p>\n<p>IAM experts support companies in setting up a flexible IAM system that is tailored to their IT systems. A five-step implementation, as offered by SITS, is recommended:<\/p>\n<ol>\n<li><strong>Analysis and Setup<\/strong><strong>:<\/strong>Evaluation of the IT systems and selection of suitable solutions from experienced partners such as Ping, EntraID or Okta<\/li>\n<li><strong>Implementation of the IAM:<\/strong>Installation and optimization of the IAM tools as a solid basis for secure access management and access protection<\/li>\n<li><strong>Application Onboarding: <\/strong>Connecting your applications to our IAM solutions so that they are protected by efficient ``single sign-on`` methods and intelligent authentication policies<\/li>\n<li><strong>Business Onboarding:<\/strong>Employee training and awareness programs to make IAM implementation as simple and seamless as possible<\/li>\n<li><strong>Managed Service:<\/strong>Round-the-clock IAM maintenance and customization - of real value, especially for complex IT infrastructures<\/li>\n<\/ol>\n<p>A comprehensive IAM includes several elements. These elements are among others:<\/p>\n<ul>\n<li><strong>Directory Services <\/strong>such as Active Directory (AD) or LDAP (Lightweight Directory Access Protocol), which are used to store user accounts and attributes<\/li>\n<li><strong>Single Sign-On (SSO):<\/strong>Solutions that allow access to multiple applications and systems after a single login without having to log in again<\/li>\n<li><strong>Two-factor authentication (2FA) <\/strong>and multi-factor authentication (MFA): Increase security by using additionally authentication factors besides the password<\/li>\n<li><strong>User and authorization management<\/strong>Tools for managing user accounts, group memberships and access rights based on roles or policies<\/li>\n<li><strong>Privileged Access Management (PAM):<\/strong>solutions for managing and monitoring privileged user accounts<\/li>\n<li><strong>Identity Governance and Administration (IGA): <\/strong>Ensuring compliance<\/li>\n<li><strong>Federalized identities:<\/strong> Mechanisms for authenticating and authorizing users across different domains and organizations to facilitate interoperability<\/li>\n<li><strong>API security and access control<\/strong><\/li>\n<li><strong>Identity as a Service (IDaaS):<\/strong>Cloud-based IAM solutions<\/li>\n<\/ul>\n<p>To ensure comprehensive protection, these technologies are often used as a combined system.                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">IAM-Expertise powered by SITS<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>SITS offers your company a customized IAM framework. It ensures that only authorized persons have access to sensitive data, applications and services.<\/p>\n<p>We manage user identities and define precise access rights for internal and external user groups. With our expertise in the field of secure user identification and authentication, we ensure the reliable and secure use of your IT systems. Our services include:<\/p>\n<ul>\n<li><strong>IAM Discovery and IAM integration: <\/strong>We select the right IAM solution for your company.<\/li>\n<li><strong>Implementation and Integration: <\/strong>We support you in the seamless integration of IAM solutions.<\/li>\n<li><strong>Support and Maintenance: <\/strong>We ensure the smooth operation of your IAM solution at all times.<\/li>\n<li><strong>Compliance and Security: <\/strong>We ensure compliance and strengthen your cyber security.<\/li>\n<li><strong>Continuous optimizations: <\/strong>We help you to optimize your IAM solution based on new requirements.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_IAM-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Security just one click away!                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Our IAM experts offer custom solutions to protect all your digital entities and handle your access right management.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact Us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div><div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h3 smx-headline  center\">Our IAM Portfolio<\/h2>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">Access Management<\/div>\n<div class=\"text\" style=\"text-align: center;\">\n<p>Our IAM Basis offers secure access controls: This ensures that only authorized users have access to your critical systems and data.<\/p>\n<\/div>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-3 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/identity-access-management\/privileged-access-management\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Privileged Access Management (PAM)                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Companies generally use numerous privileged account types for cloud services, servers, databases, networks and more. A PAM solution protects your most important accounts from system crashes and data loss.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/identity-access-management\/identity-governance-administration\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Identity Governance & Administration (IGA)                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    With IGA, you efficiently and compliantly manage access rights and minimize security risks. The SITS service includes access recertification and reporting to verify access rights.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/identity-access-management\/access-management\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Access Management                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Control who accesses your company\u2019s resources when                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                     <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <div class=\"h2 smx-headline\">\n            What you should definitely pay attention to regarding IAM        <\/div>\n    <\/div>\n    <div class=\"subheadline\">\n        IGA, PAM and Access Management    <\/div>\n    <div class=\"text\">\n        A comprehensive and powerful IAM implementation should fulfill the following requirements:<\/p>\n<ul>\n<li><strong>Governance and Visibility:<\/strong>You obtain complete control and overview of your digital ecosystem.<\/li>\n<li><strong>(Automated) Identity Lifecycle:<\/strong>The IAM must integrate seamlessly with your HR system. It must ensure that the user accounts of new employees can be created and managed without delay - and that the access rights of people who leave the company are revoked immediately.<\/li>\n<li><strong>SSO Access Management:<\/strong>Single sign-on simplifies access to applications for employees, partners and customers.<\/li>\n<li><strong>Advanced Authentication:<\/strong>IAM should offer passwordless and risk-based authentication options.<\/li>\n<li><strong>Seamless Integration:<\/strong>The IAM must fit harmoniously into your existing IT systems and organizational structures. Ready-made connectors or customized individual integrations can be used for this.<\/li>\n<li><strong>Right Access, Right Time:<\/strong>To ensure authorized and secure access to necessary information, you should adjust access rights according to predefined roles.<\/li>\n<\/ul>\n<p>It is advisable to compare IAM, IGA, Access Management and PAM and, if necessary, to combine them in order to find the most suitable approach for your own requirements.    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_IdentityManagement.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_IdentityManagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_IdentityManagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_IdentityManagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_IdentityManagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/fighting-ai-attacks-how-to-protect-data-and-systems\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Fighting AI attacks: How to protect data and systems                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO 27001 Certification without delay                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/managed-services-to-counter-the-shortage-of-manpower\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed Services to counter the shortage of manpower                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security with SASE, this is how it works                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/devops-security-stress-test-for-culture-and-technology\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps security: Stress test for culture and technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/biometrics-better-security-without-passwords\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Biometrics - better security without passwords?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/threat-intelligence-knowledge-is-power-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Threat Intelligence - Knowledge is power & security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-iso-iec-270012022-new-controls-to-fulfill-both-standards\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & ISO\/IEC 27001:2022: New controls to fulfill both standards                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/how-preferred-access-management-increases-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            How Privileged Access Management increases security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/vciso-more-it-security-through-customizable-support\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            vCISO - more IT Security through customizable support                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-from-microsoft-is-your-company-copilot-ready\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div><div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI from Microsoft: Is your company Copilot Ready?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-risk-management-are-cyber-risks-really-manageable\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Risk Management: Are cyber risks really manageable?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/protective-shield-for-your-cloud-platforms-tips-tricks-pitfalls\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Protective shield for your cloud platforms: Tips, Tricks, Pitfalls                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/security-all-rounder-ciso-outsource-or-hire-yourself\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Security all-rounder CISO: Outsource or hire yourself?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Management of cyber security risks in industrial IoT and OT                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-generated-deepfakes-attack-on-democracy-and-the-global-economy\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI-generated deepfakes - attack on democracy and the global economy                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"faq\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <div class=\"h2 smx-headline\">\n                    Frequently Asked Questions about IAM                <\/div>\n                <div class=\"subheadline\">\n                    Key questions about Identity Access and Access Control                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">Why is a modern IAM important?<\/button>\n                                    <div class=\"panel\">\n                                        <p>A strategic IAM is essential to increase security and compliance and improve the efficiency of operational processes. It unifies identity management, enables precise access controls and optimizes user experiences across all systems. IAM helps to assign access rights according to defined guidelines, which ensures efficient user identification and authorization.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What are \"identities\"?<\/button>\n                                    <div class=\"panel\">\n                                        <p>In the IAM context, the term \"identities\" refers to the digital credentials and attributes that uniquely identify a person or a service in IT systems. <\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What does Access Management achieve?<\/button>\n                                    <div class=\"panel\">\n                                        <p>IAM is an elementary concept that encompasses identity management and access management. Access management as a sub-area of IAM focuses exclusively on controlling access to resources.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What is the difference between PAM and IAM?<\/button>\n                                    <div class=\"panel\">\n                                        <p>PAM is an IAM sub-area that deals with the increased risks and security requirements of privileged accounts. The focus is on privileged accounts that have extensive access to critical systems and data. PAM solutions help to monitor and control privileged access by restricting its use and ensuring that access is only granted under strict conditions.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What does IGA mean in the context of IAM?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Identity Governance and Administration includes functions such as access certification, policy management, role-based access control (RBAC), reporting and compliance management. IGA solutions provide a framework to define, verify and manage access rights and ensure adherence to access policies and compliance requirements.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Why are IAM, PAM and IGA important for companies?<\/button>\n                                    <div class=\"panel\">\n                                        <p>IAM, PAM and IGA ensure comprehensive management of user identities and access rights. This provides protection against unauthorized access and data leaks and supports adherence to compliance requirements. The specific controls offered by each approach enable companies to increase their security and ensure efficient processes.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does SITS support the IAM implementation?<\/button>\n                                    <div class=\"panel\">\n                                        <p>The SITS experts implement the IAM in the company and support it in key areas such as cyber security, digital transformation, cloud transformation, zero trust edge, automation, Internet of Things and much more. They offer one-stop support, including consulting and managed services.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            We\u2019re here for you        <\/div>\n        <div class=\"subheadline\">\n            SITS supports you in all matters relating to IAM.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '135f4fcd-aae5-49f9-bb41-be9f40611f64'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_IAM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Alexander Keller                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] State-of-the-art working environments: This is where good Identity Management comes into play Hybrid working methods are exposing IT systems to a growing number of threats, and the majority of cloud security incidents can be attributed to inadequately managed identities. A tailor-made IAM provides the solution. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row enable_black_background_for_row=&#8221;yes&#8221;][vc_column][vc_column_text] Access Management Our [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-9228","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IAM: Security based on Access Management | SITS<\/title>\n<meta name=\"description\" content=\"IAM: Security based on Access Management \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM: Security based on Access Management | SITS\" \/>\n<meta property=\"og:description\" content=\"IAM: Security based on Access Management \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T13:07:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/\",\"name\":\"IAM: Security based on Access Management | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\"},\"datePublished\":\"2024-03-27T15:49:30+00:00\",\"dateModified\":\"2024-04-29T13:07:51+00:00\",\"description\":\"IAM: Security based on Access Management \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAM: Security based on Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM: Security based on Access Management | SITS","description":"IAM: Security based on Access Management \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"IAM: Security based on Access Management | SITS","og_description":"IAM: Security based on Access Management \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/","og_site_name":"SITS","article_modified_time":"2024-04-29T13:07:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"13 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/","url":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/","name":"IAM: Security based on Access Management | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#website"},"datePublished":"2024-03-27T15:49:30+00:00","dateModified":"2024-04-29T13:07:51+00:00","description":"IAM: Security based on Access Management \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/nl\/identity-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"IAM: Security based on Access Management"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/nl\/#website","url":"https:\/\/sits.friendventure.dev\/nl\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/nl\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/9228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/comments?post=9228"}],"version-history":[{"count":0,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/9228\/revisions"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/media?parent=9228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}