{"id":13366,"date":"2024-04-26T15:52:49","date_gmt":"2024-04-26T13:52:49","guid":{"rendered":"https:\/\/sits.com\/produkte\/managed-extended-detection-response\/"},"modified":"2024-04-29T17:26:22","modified_gmt":"2024-04-29T15:26:22","slug":"managed-extended-detection-response","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/","title":{"rendered":"Managed Extended Detection &#038; Response"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_MXDR-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Analyze &amp; Defend Against Attacks with our Microsoft-certified MXDR \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Managed Extended Detection &amp; Response \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">MXDR at a Glance<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Our Managed Extended Detection and Response solutions protect your clients, network identities, cloud services, collaboration tools, and much more. As a Microsoft-verified MXDR partner, we give you round-the-clock protection for your company\u2019s IT systems \u2013 all thanks to a combination of SIEM, Managed Security Operations Center (SOC), and an XDR system based on Sentinel and Defender. We offer:<\/p>\n<ul>\n<li><strong>24\/7 threat monitoring<\/strong>, detection, analysis, and prioritization<\/li>\n<li><strong>Protection <\/strong>for endpoints, networks, cloud infrastructures, and applications \u2013 a 360-degree cyber defense technology<\/li>\n<li><strong>Managed service \u2013 <\/strong>ideal in times of skilled labor shortages<\/li>\n<li><strong>24\/7\/365 threat defense <\/strong>through the Microsoft-verified combination of SIEM data sources and proactive XDR protection<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"contact\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h1 smx-headline \">Counterattacks<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\">The Headaches of Swiftly Identifying and Eliminating Threats.<\/div>\n<p>[\/vc_column_text][vc_column_text]Companies are under constant attack: Threats like ransomware, phishing, and Advanced Persistent Threats (APTs) target their cloud and network resources. With a deluge of security alerts, it\u2019s essential to differentiate between friend and foe \u2013 and to proactively counteract real dangers.[\/vc_column_text]<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Your Business Challenges<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_MXDR.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Your Business Challenges                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li><strong>Complex cyber threat landscape: <\/strong>Traditional endpoint solutions are overwhelmed with new attack tactics.<\/li>\n<li><strong>Gaps in security architecture: <\/strong>Insufficiently protected endpoints, identities, and cloud services are a real risks for companies.<\/li>\n<li><strong>Alarm fatigue in SOCs: <\/strong>A high volume of warnings often leads to your staff overlooking actual threats.<\/li>\n<li><strong>Lack of response speed: <\/strong>Employees and IT teams aren\u2019t always capable of responding quickly to attacks, potentially leading to data losses and outages.<\/li>\n<li><strong>Legal issues: <\/strong>Strict regulations like TISAX, BSI guidelines, or ISO standards force companies to improve their security measures.<\/li>\n<\/ul>\n<p>                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Your Cyber Defense Expert Team                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                From SIEM to CTI to SOC: We implement our 24\/7 Security Operations solutions for a 360\u00b0                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h1 smx-headline \">Managed Extended Detect &amp; Response<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\">Certified by Microsoft<\/div>\n<p>[\/vc_column_text][vc_column_text]Our Microsoft-certified Managed XDR service offers comprehensive security thanks to extended protection and response services. While traditional EDR (Endpoint Detect and Response) solutions focus on individual devices, we focus on the complete protection of your IT, including:[\/vc_column_text]<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-6 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    360-Degree Protection                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our MXDR provides comprehensive protection for your devices, identities, collaboration tools, and clouds. Only this smart combination leads to a complete security architecture.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Managed Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our expert team responds to incidents around the clock and resolves issues instantly.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Threat Intelligence                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    SITS specialists analyze threats and recognize their targets and potential consequences, allowing for any threat to be quickly neutralized.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Forensics                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    In the event of security incidents, a forensics team reconstructs the attack and entry point to prevent similar future attacks.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    AI-Powered Automation                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Thanks to advanced AI capabilities, our MXDR solution automatically responds to complex cyber-attacks, isolates compromised devices, and stops lateral movements by attackers.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Prioritized Analysis                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Microsoft\u2019s Defender XDR software analyzes and prioritizes incidents based on the trillions of threat data points that flow daily into Microsoft\u2019s data centers. This helps your SOC team to manage threats by severity and combat them.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div id='festes_grid'>\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_SIEM-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <div class=\"h2 smx-headline\">\n                    MXDR: Your Benefits \n                <\/div >\n            <\/div>\n            <div class=\"subheadline\">\n                 \n            <\/div>\n            <div class=\"text\">\n                Combining advanced detection technology, Microsoft\u2019s expertise, and proactive countermeasures, our MXDR offers companies comprehensive protection against cyber threats. \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-3  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_React.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Instant Threat Eliminiation                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">With our MXDR, you have round-the-clock access to Microsoft\u2019s expertise, allowing you to close security gaps and optimize your SOC operations.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Instant Reaction                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">The SITS expert team prioritizes and analyzes security incidents, ensuring quick and effective resolutions.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Abwehr-1.svg\" alt=\"alt\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Automatically Counter Attacks                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Our Microsoft-verified MXDR solution automatically stops sophisticated attacks with ransomware or phishing emails: Affected devices and user accounts are automatically isolated.<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                            <\/div>\n    <\/div>\n<\/div>\n\n<\/div >\n\n\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <div class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/div>\n                <div class=\"subheadline\">\n                                    <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">What is the difference between EDR and MXDR?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Endpoint Detection and Response (EDR) focuses on monitoring, detecting, and responding to threats specifically affecting end devices such as PCs and smartphones. MXDR extends the scope of protection by not only covering end devices but also networks, cloud services, and other IT resources. Managed Extended Detection and Response offers comprehensive monitoring and analysis of threats and is typically provided as a managed service managed by security professionals.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does MXDR integrate into a SOC?<\/button>\n                                    <div class=\"panel\">\n                                        <p>A Security Operations Center (SOC) significantly enhances Managed Extended Detection and Response (MXDR) through its expanded coverage of resources and devices (see the question above). MXDR not only detects and responds to threats but also brings a team of security professionals who monitor the company's IT around the clock, observing and analyzing the security situation, and responding immediately to anomalies.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does MXDR integrate into security infrastructures?<\/button>\n                                    <div class=\"panel\">\n                                        <p>MXDR seamlessly integrates into existing security infrastructures. It is designed to complement them by aggregating and analyzing data from various sources. The integration is done through APIs that allow MXDR to collect information from EDR systems, firewalls, SIEM tools, and other security solutions. This fosters a holistic view of the security posture and enables security teams to detect and respond to threats more efficiently.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What role does AI play in MXDR solutions?<\/button>\n                                    <div class=\"panel\">\n                                        <p>MXDR solutions utilize AI to identify patterns in large data sets that could indicate security incidents. AI technologies, including machine learning, allow MXDR to detect threats faster, reduce false positives, and implement automated countermeasures. Continuous analysis of behavior patterns and adjustment to new threats significantly improve the effectiveness of security measures.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does MXDR support compliance requirements?<\/button>\n                                    <div class=\"panel\">\n                                        <p>MXDR supports compliance requirements through continuous monitoring and analysis of network traffic and system activities. Detailed reporting on detected threats and subsequent responses can demonstrate that appropriate security measures have been taken. Moreover, the insights gained from MXDR help to improve security policies and procedures in line with regulatory standards.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            We\u2019re here for you        <\/div>\n        <div class=\"subheadline\">\n            Fill in the form and our experts will get in touch.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '8faf6ce1-cd2a-488c-bde9-666b247d4fb7'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Claudia Hofmann                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Our Managed Extended Detection and Response solutions protect your clients, network identities, cloud services, collaboration tools, and much more. <\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13366","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed Extended Detection &amp; Response - SITS<\/title>\n<meta name=\"description\" content=\"Managed Extended Detection &amp; Response \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Extended Detection &amp; Response - SITS\" \/>\n<meta property=\"og:description\" content=\"Managed Extended Detection &amp; Response \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T15:26:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/\",\"name\":\"Managed Extended Detection & Response - SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\"},\"datePublished\":\"2024-04-26T13:52:49+00:00\",\"dateModified\":\"2024-04-29T15:26:22+00:00\",\"description\":\"Managed Extended Detection & Response \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed Extended Detection &#038; Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Extended Detection & Response - SITS","description":"Managed Extended Detection & Response \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"Managed Extended Detection & Response - SITS","og_description":"Managed Extended Detection & Response \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/","og_site_name":"SITS","article_modified_time":"2024-04-29T15:26:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/","url":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/","name":"Managed Extended Detection & Response - SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#website"},"datePublished":"2024-04-26T13:52:49+00:00","dateModified":"2024-04-29T15:26:22+00:00","description":"Managed Extended Detection & Response \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/mxdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Managed Extended Detection &#038; Response"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/nl\/#website","url":"https:\/\/sits.friendventure.dev\/nl\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/nl\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte\/13366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":0,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte\/13366\/revisions"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/media?parent=13366"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/product_categories?post=13366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}