{"id":13414,"date":"2024-04-26T15:49:25","date_gmt":"2024-04-26T13:49:25","guid":{"rendered":"https:\/\/sits.com\/produkte\/security-operations-as-a-service\/"},"modified":"2024-05-10T13:08:36","modified_gmt":"2024-05-10T11:08:36","slug":"security-operations-as-a-service","status":"publish","type":"produkte","link":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/","title":{"rendered":"Security Operations as a Service"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SOC-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    24\/7 Protection from One Single Source. \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    Security Operations as a Service \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <div class=\"summary-headline headline h2\">Security Operations Center-as-a-Service at a Glance<\/div>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Leave the protection and monitoring of your IT to SITS Group: Our Security Operations Center (SOC) acts as the command center for your company's cyber defense. SITS' security team monitors your network, analyzes threat data, and responds to security incidents - day and night. The SOC utilizes cutting-edge technologies and in-depth log analysis. It continuously works on refining protection mechanisms and actively enhancing your company's security.<\/p>\n<p>With our Security Operations Center as a Service (SOCaaS), we detect threats early on and immediately repel attacks. State-of-the-art technologies and experienced expert teams ensure rapid responses and support the prevention of future dangers. Our SOC includes:<\/p>\n<ul>\n<li><strong>24\/7 monitoring &amp; protection: <\/strong>Our Security Operations Center ensures the protection of your IT and data through SIEM, MDR, and more.<\/li>\n<li><strong>Instant Response and Discretion: <\/strong>We are your fast, professional, and discreet partner for critical cyber incidents.<\/li>\n<li><strong>Mobilization of SITS Group resources: <\/strong>From forensics to data rescuers to threat experts from AV-Test. We ensure a rapid restoration of your systems.<\/li>\n<li><strong>Crisis communication: <\/strong>Support in communicating with all stakeholders and rapid collaboration with authorities.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"contact\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h1 smx-headline \">360 Degree Protection of Your IT<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\">The Challenges of Proactive Cyberdefense<\/div>\n<p>[\/vc_column_text][vc_column_text]The era of remote work, multi-cloud systems, online services, collaboration tools like Teams, or local data servers is here \u2013 and so are an increase in attack surfaces for malicious actors.[\/vc_column_text]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary is-single\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How-1.svg\" alt=\"alt\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Your Business Challenge<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_SOC.jpg\" alt=\"Alt\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Your Business Challenge                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            <\/p>\n<ul>\n<li><strong>Invisible threats: <\/strong>Hidden dangers such as Zero-Day exploits are harder to detect and require advanced defense strategies.<\/li>\n<li><strong>Closing detection gaps: <\/strong>New work models such as ``Work-from-Anywhere``, ``Bring Your Own Device`` (BYOD), and connected devices (OT\/IoT) create new security vulnerabilities.<\/li>\n<li><strong>Fragmented cybersecurity tools: <\/strong>Studies show that over 65% of companies* use more than ten different tools \u2013 an organizational and financial challenge.<\/li>\n<li><strong>Overcoming expert shortages: <\/strong>Nearly 90% of companies* feel the shortage of skilled personnel in the security sector, making it difficult to maintain a security infrastructure.<\/li>\n<\/ul>\n<p><strong><em>*Source: <\/em><\/strong>ESG Report: SOC Market Trends (www.splunk.com)                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_CyberDefense-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Your Cyber Defense Expert Team                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                From SIEM to CTI to SOC: We implement our 24\/7 Security Operations solutions for a 360\u00b0                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h1  class=\"h1 smx-headline  center\">Security Operations as a Service<\/h1>[vc_column_text]<\/p>\n<div class=\"subheadline\" style=\"text-align: center;\">24\/7 Protection from One Partner<\/div>\n<p>[\/vc_column_text][vc_column_text]Our SITS security experts face these threats: In close collaboration with our in-house Cyber Threat Intelligence group of AV-TEST, we provide customized security solutions so you can focus on your core business again through comprehensive protection, rapid response capability, and secure restoration in case of emergency. It includes:[\/vc_column_text]<div class=\"smx_global_spacer size-m\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <p class=\"h2 smx-headline\">\n            CTI as a Service        <\/p>\n    <\/div>\n    <div class=\"subheadline\">\n        Gaining A Real Edge with Clear Data    <\/div>\n    <div class=\"text\">\n        With our Managed Cyber Threat Intelligence service, we offer crucial information and analyses. From now on, you can detect threats early before they can cause damage. Our service includes:<\/p>\n<ul>\n<li><strong>Discovery of credentials and data breaches:<\/strong> We immediately identify compromised personal data (PII) of your customers and employees.<\/li>\n<\/ul>\n<ul>\n<li><strong>Darknet and deep web monitoring:<\/strong> We detect malicious activities, including botnets, data releases, exploits, and services for cyber attacks, remote access trojans, and the trade of PII.<\/li>\n<\/ul>\n<ul>\n<li><strong>Takedown service:<\/strong> On your request, we remove malicious content related to phishing, malware, and brand rights violations on social networks, mobile applications, and websites.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#contact\" class=\"btn-text\" target=\"_blank\">Contact us<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SOC.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SOC.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SOC-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SOC-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SOC-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <p class=\"h2 smx-headline\">\n            XDR- und EDR-Services        <\/p>\n    <\/div>\n    <div class=\"subheadline\">\n        Our Next-Generation Endpoint Detection    <\/div>\n    <div class=\"text\">\n        Our Extended Detection and Response (XDR) service elevates endpoint protection to the next level: Unlike traditional Endpoint Detection and Response (EDR) solutions, which are limited to endpoints, our managed XDR expands the focus to:<\/p>\n<ul>\n<li>The integration of endpoints, networks, cloud infrastructures, and applications into a comprehensive security concept that protects your company from all angles.<\/li>\n<li>An overview of your IT landscape, whether operated locally or in the cloud.<\/li>\n<li>Professional management by our SITS experts, ensuring automated protection measures as well as manual interventions.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#contact\" class=\"btn-text\" target=\"_blank\">Contact us<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement2_SOC.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement2_SOC.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement2_SOC-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement2_SOC-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement2_SOC-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <p class=\"h2 smx-headline\">\n            Incident Response        <\/p>\n    <\/div>\n    <div class=\"subheadline\">\n        Prevention &amp; Recovery    <\/div>\n    <div class=\"text\">\n        Our security network for emergencies. In the event of a security incident, our expert teams provide customized analyses to thwart future threats.<\/p>\n<ul>\n<li><strong>CSIRT service package:<\/strong> In an emergency, every second counts - Our specialists recognize attack patterns and immediately implement countermeasures to secure your systems and handle the incident with the utmost discretion. With our CSIRT service package, we uncover security vulnerabilities, assemble an experienced team, including penetration testers and threat experts from AV-TEST, and ensure compliance-conform handling of your information. Read more about <a href=\"#\">CSIRT<\/a> here.<\/li>\n<\/ul>\n<ul>\n<li><strong>Incident Response Service:<\/strong> Our premium service for incident response combats threats like intellectual theft, cybercrime, and data breaches. We investigate and resolve incidents comprehensively, enabling you to continue your business with minimal interruption.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#contact\" class=\"btn-text\" target=\"_blank\">Contact us<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement3_SOC.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement3_SOC.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement3_SOC-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement3_SOC-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement3_SOC-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=\"2\/3\"]<h1  class=\"h3 smx-headline \">Our SOCaaS offer<\/h1><h1  class=\"h6 smx-headline \">From Endpoint Protection to 24\/7 SOC<\/h1>[vc_column_text]SITS's security teams monitor your IT and respond immediately to all potential threats. Choose from different packages: from monitoring during regular business hours (8 am to 5 pm) to complete 24\/7 monitoring.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\"1\/3\"][\/vc_column_inner][\/vc_row_inner]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"service-levels_wrapper\">\n    <div class=\"service-levels_container\">\n\n                <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Basic \u2013 Managed EDR                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Recommended for:                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Secure setup, maintenance, and fine-tuning of your SIEM \u2013 executed by certified SITS expert teams<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Onboarding with simulations and thorough analysis for future management of your system<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Customized dashboards and reporting<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Business \u2013 Managed EDR and SOC 8\/5                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Recommended for businesses looking for a full service solution:                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Enhanced monitoring and a flexible \"pay as you go\" payment model for security incidents<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Support in the event of an emergency: rapid response, concrete advice for problem resolution, and forensic analysis of all incidents<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Critical \u2013 Managed EDR and SOC 24\/7                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Includes everything from basic and business packages, plus:                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">All services of the Basic and Business packages; additionally, 24\/7 protection<\/div>\n                            <\/div>\n                                                        <\/div>\n \n            \n            \n            \n            \n\n    <\/div>\n<\/div>\n\n\n\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<div id='festes_grid'>\n<div class=\"product_feature\" id=\"\">\n    <div class=\"product_feature_bg_wrapper\">\n        <div class=\"product_feature_bg\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"805\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense.jpg\" class=\"bg_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-300x95.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-1024x323.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-768x242.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-1536x485.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_CyberDefense-2048x647.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <\/div>\n        <div class=\"product_feature_bg_filter_disabled\"><\/div>\n    <\/div>\n    <div class=\"product_feature_content\">\n        <div class=\"product_feature_head\">\n            <div class=\"headline\">\n                <div class=\"h2 smx-headline\">\n                    SOC-as-a-Service: Your Benefits \n                <\/div >\n            <\/div>\n            <div class=\"subheadline\">\n                Trust us With Your IT Security. \n            <\/div>\n            <div class=\"text\">\n                Comprehensive security, no ifs or buts: With our SOCaaS, you're banking on expertise and technology. Our security team safeguards your IT, your data, and those who use it. They raise the alarm before dangers emerge \u2013 precisely and swiftly. The benefits of our SOCaaS include: \n            <\/div>\n        <\/div>\n        <div class=\"product_feature_middel\">\n\n            <div class=\"iconboxes--wrapper\">\n                                    <div class=\"iconboxes--container iconboxes-3  animate_kachel_wrapper\">\n                                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Abwehr-1.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Strong Protection                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Comprehensive protection against attackers with Extended Detection and Response (XDR)\n<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Vorteile_Vulnerability_Einhaltung-1.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Instant Alerts                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Real-time monitoring of events and threat detection<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel has_content\">\n                                \n                                <div class=\"iconbox--single__inner\">\n                                    <div class=\"iconbox--single__inner_content\">\n                                        <div class=\"icon_side\">\n                                            <div class=\"iconbox--image\">\n                                                  <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_How.svg\" alt=\"\">                                            <\/div>\n                                            <div class=\"iconbox--headline headline-boxed\">\n                                                Reduced Costs                                            <\/div>\n                                        <\/div>\n                                                                                    <div class=\"iconbox_single_content\">Avoiding costly compliance breaches and financial burdens due to security incidents<\/div>\n                                                                            <\/div>\n                                <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n\n        <\/div>\n        <div class=\"product_feature_footer\">\n                    <div class=\"button1\">\n                <div class=\"btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\">Contact us<\/a>\n                        <div><\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n                                <\/div>\n    <\/div>\n<\/div>\n\n<\/div >\n\n\n\n\n\n\n\n<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/fighting-ai-attacks-how-to-protect-data-and-systems\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Fighting AI attacks: How to protect data and systems                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO 27001 Certification without delay                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/managed-services-to-counter-the-shortage-of-manpower\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed Services to counter the shortage of manpower                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security with SASE, this is how it works                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/devops-security-stress-test-for-culture-and-technology\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps security: Stress test for culture and technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/biometrics-better-security-without-passwords\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Biometrics - better security without passwords?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/threat-intelligence-knowledge-is-power-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Threat Intelligence - Knowledge is power & security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-iso-iec-270012022-new-controls-to-fulfill-both-standards\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & ISO\/IEC 27001:2022: New controls to fulfill both standards                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/how-preferred-access-management-increases-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            How Privileged Access Management increases security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/vciso-more-it-security-through-customizable-support\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            vCISO - more IT Security through customizable support                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-from-microsoft-is-your-company-copilot-ready\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div><div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI from Microsoft: Is your company Copilot Ready?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-risk-management-are-cyber-risks-really-manageable\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Risk Management: Are cyber risks really manageable?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/protective-shield-for-your-cloud-platforms-tips-tricks-pitfalls\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Protective shield for your cloud platforms: Tips, Tricks, Pitfalls                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/security-all-rounder-ciso-outsource-or-hire-yourself\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Security all-rounder CISO: Outsource or hire yourself?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Management of cyber security risks in industrial IoT and OT                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-generated-deepfakes-attack-on-democracy-and-the-global-economy\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI-generated deepfakes - attack on democracy and the global economy                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <div class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/div>\n                <div class=\"subheadline\">\n                    The Most Important Answers around SOCaaS                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">What\u2019s a Security Operations Center?<\/button>\n                                    <div class=\"panel\">\n                                        <p> A Security Operations Center (SOC) is a company's cybersecurity hub. Professionals monitor and analyze network activities around the clock, responding to incidents and threats. An effective SOC identifies, investigates, and combats attacks before they can cause damage.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Why is a SOC important for businesses?<\/button>\n                                    <div class=\"panel\">\n                                        <p>As cyber attacks become more sophisticated, a SOC is indispensable for protecting critical data and infrastructures. It enables companies to respond to security incidents in real time, comply with compliance requirements, and provides a holistic view of the security posture, strengthening resilience against cyber attacks.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How does a Security Operations Center work?<\/button>\n                                    <div class=\"panel\">\n                                        <p>A SOC combines human expertise, defined processes, and modern technology to monitor IT security. Expert teams use SIEM systems to monitor traffic and user behavior in real time. If there is suspicion of security breaches, they immediately initiate investigations, use forensic tools for analysis, and implement countermeasures to ward off further threats and secure the IT environment.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhatElement1_SIEM-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            We\u2019re here for you        <\/div>\n        <div class=\"subheadline\">\n            Fill in the form and our experts will get in touch.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: '8faf6ce1-cd2a-488c-bde9-666b247d4fb7'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_CyberDefense-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Claudia Hofmann                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Leave the protection and monitoring of your IT to SITS Group: Our Security Operations Center (SOC) acts as the command center for your company\u2019s cyber defense. <\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"product_categories":[],"class_list":["post-13414","produkte","type-produkte","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Operations as a Service - SITS<\/title>\n<meta name=\"description\" content=\"Security Operations as a Service \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operations as a Service - SITS\" \/>\n<meta property=\"og:description\" content=\"Security Operations as a Service \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-10T11:08:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/\",\"name\":\"Security Operations as a Service - SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\"},\"datePublished\":\"2024-04-26T13:49:25+00:00\",\"dateModified\":\"2024-05-10T11:08:36+00:00\",\"description\":\"Security Operations as a Service \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operations as a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Operations as a Service - SITS","description":"Security Operations as a Service \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"Security Operations as a Service - SITS","og_description":"Security Operations as a Service \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/","og_site_name":"SITS","article_modified_time":"2024-05-10T11:08:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"10 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/","url":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/","name":"Security Operations as a Service - SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#website"},"datePublished":"2024-04-26T13:49:25+00:00","dateModified":"2024-05-10T11:08:36+00:00","description":"Security Operations as a Service \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/nl\/cyber-defense\/security-operations-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Security Operations as a Service"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/nl\/#website","url":"https:\/\/sits.friendventure.dev\/nl\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/nl\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte\/13414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/types\/produkte"}],"version-history":[{"count":1,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte\/13414\/revisions"}],"predecessor-version":[{"id":14460,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/produkte\/13414\/revisions\/14460"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/media?parent=13414"}],"wp:term":[{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/product_categories?post=13414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}