{"id":3559,"date":"2024-08-21T07:09:12","date_gmt":"2024-08-21T07:09:12","guid":{"rendered":"https:\/\/teamative.com\/leistung\/infrastructure-and-security\/it-security\/"},"modified":"2024-11-01T15:45:17","modified_gmt":"2024-11-01T15:45:17","slug":"it-security","status":"publish","type":"leistung","link":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/","title":{"rendered":"IT security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3559\" class=\"elementor elementor-3559 elementor-2980\" data-elementor-post-type=\"leistung\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d83caa e-con-full e-flex e-con e-parent\" data-id=\"9d83caa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c24261d elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"c24261d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1440\" height=\"439\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-4208\" alt=\"Infrastruktur und Sicherheit\" srcset=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg 1440w, https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur-300x91.jpg 300w, https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur-1024x312.jpg 1024w, https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur-768x234.jpg 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-656ed66 default-section-spacing e-flex e-con-boxed e-con e-parent\" data-id=\"656ed66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5841e0 elementor-widget__width-auto animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f5841e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">IT security<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abd7a67 elementor-widget__width-initial animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"abd7a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Effective protection against cyber attacks<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96b94b9 animated-fast elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"96b94b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, the threat from cyberattacks is higher than ever before. If you want to benefit from the advantages offered by digital transformation, appropriate security measures have to be in place. As a reliable service provider, we help you to implement appropriate measures to mitigate IT risks and to detect, prevent and respond decisively to cyberattacks.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca22a99 default-section-spacing animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"ca22a99\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6acef1c e-con-full team-box e-flex e-con e-child\" data-id=\"6acef1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9babb team-tag elementor-widget elementor-widget-heading\" data-id=\"7e9babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Our offer<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a050ef elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6a050ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Everything for your<br>IT security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-599cb69 e-con-full e-flex e-con e-child\" data-id=\"599cb69\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ea91f5 elementor-widget elementor-widget-ucaddon_accordion\" data-id=\"9ea91f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Accordion -->\n<style>\/* widget: Accordion *\/\n\n#uc_accordion_elementor_9ea91f5 {\n  width: 100%;\n  height: 100%;\n  overflow: hidden;\n  display: flex;\n  flex-direction: column;\n  gap: 10px;\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-item {\n  background-color: var(--warm-white);\n  border-radius: var(--default-border-radius);\n  flex-grow: 1;\n  display: flex;\n  flex-direction: column;\n  justify-content: center;\n  align-items: center;\n}\n\n.accordion-white #uc_accordion_elementor_9ea91f5 .accordion-item {\n  background-color: #ffffff!important;\n}\n\n\n#uc_accordion_elementor_9ea91f5 .accordion-header.active {\n  color: var(--lime-green);\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-header {\n  margin: 0;\n  width: 100%;\n  border: none;\n  outline: none;\n  padding: 20px;\n  text-align: left;\n  cursor: pointer;\n  transition: background-color 0.3s ease;\n  display: flex;\n  justify-content: space-between;\n  align-items: center;\n  border-radius: var(--default-border-radius);\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-content {\n  max-height: 0;\n  overflow: hidden;\n  transition: max-height 0.3s ease;\n  padding: 0 20px;\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-content p {\n  margin: 10px 0;\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-icon {\n  transition: transform 0.3s ease;\n  display:flex;\n}\n\n#uc_accordion_elementor_9ea91f5 .accordion-header.active .accordion-icon {\n  color: #01C136;\n  transform: rotate(-90deg);\n}\n\n<\/style>\n\n<div class=\"accordion\" id=\"uc_accordion_elementor_9ea91f5\">\n  <div class=\"accordion-item\">\n  <h5 class=\"accordion-header\">\n    Information security\n    <span class=\"accordion-icon\">\n      <svg width=\"19\" height=\"19\" viewBox=\"0 0 19 19\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_2761_556\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"19\" height=\"19\">\n<g clip-path=\"url(#clip0_2761_556)\">\n<g clip-path=\"url(#clip1_2761_556)\">\n<path d=\"M18.26 17.6787V1.67875H16.26V15.2687L1.97001 0.96875L0.560009 2.37875L14.85 16.6687H1.26001V18.6687H17.26C17.81 18.6687 18.26 18.2187 18.26 17.6687V17.6787Z\" fill=\"black\"\/>\n<\/g>\n<\/g>\n<\/mask>\n<g mask=\"url(#mask0_2761_556)\">\n<rect x=\"18.26\" y=\"0.679688\" width=\"18\" height=\"18\" transform=\"rotate(90 18.26 0.679688)\" fill=\"#112A10\"\/>\n<\/g>\n<defs>\n<clipPath id=\"clip0_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<clipPath id=\"clip1_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<\/defs>\n<\/svg>\n\n    <\/span>\n  <\/h5>\n  <div class=\"accordion-content\">\n    <p><p>We advise companies on common industry standards such as the IT security guidelines from the German Federal Office for IT Security (BSI). and ISO2700X. We also help with the fulfilment of specific requirements such as KRITIS (critical infrastructure protection legislation). <\/p><\/p>\n  <\/div>\n<\/div>\n<div class=\"accordion-item\">\n  <h5 class=\"accordion-header\">\n    Cyber security\n    <span class=\"accordion-icon\">\n      <svg width=\"19\" height=\"19\" viewBox=\"0 0 19 19\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_2761_556\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"19\" height=\"19\">\n<g clip-path=\"url(#clip0_2761_556)\">\n<g clip-path=\"url(#clip1_2761_556)\">\n<path d=\"M18.26 17.6787V1.67875H16.26V15.2687L1.97001 0.96875L0.560009 2.37875L14.85 16.6687H1.26001V18.6687H17.26C17.81 18.6687 18.26 18.2187 18.26 17.6687V17.6787Z\" fill=\"black\"\/>\n<\/g>\n<\/g>\n<\/mask>\n<g mask=\"url(#mask0_2761_556)\">\n<rect x=\"18.26\" y=\"0.679688\" width=\"18\" height=\"18\" transform=\"rotate(90 18.26 0.679688)\" fill=\"#112A10\"\/>\n<\/g>\n<defs>\n<clipPath id=\"clip0_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<clipPath id=\"clip1_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<\/defs>\n<\/svg>\n\n    <\/span>\n  <\/h5>\n  <div class=\"accordion-content\">\n    <p><p>From designing the security architecture and technical analysis to carrying out penetration tests, we ensure effective technical protection.<\/p><\/p>\n  <\/div>\n<\/div>\n<div class=\"accordion-item\">\n  <h5 class=\"accordion-header\">\n    SAP Security\n    <span class=\"accordion-icon\">\n      <svg width=\"19\" height=\"19\" viewBox=\"0 0 19 19\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_2761_556\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"19\" height=\"19\">\n<g clip-path=\"url(#clip0_2761_556)\">\n<g clip-path=\"url(#clip1_2761_556)\">\n<path d=\"M18.26 17.6787V1.67875H16.26V15.2687L1.97001 0.96875L0.560009 2.37875L14.85 16.6687H1.26001V18.6687H17.26C17.81 18.6687 18.26 18.2187 18.26 17.6687V17.6787Z\" fill=\"black\"\/>\n<\/g>\n<\/g>\n<\/mask>\n<g mask=\"url(#mask0_2761_556)\">\n<rect x=\"18.26\" y=\"0.679688\" width=\"18\" height=\"18\" transform=\"rotate(90 18.26 0.679688)\" fill=\"#112A10\"\/>\n<\/g>\n<defs>\n<clipPath id=\"clip0_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<clipPath id=\"clip1_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<\/defs>\n<\/svg>\n\n    <\/span>\n  <\/h5>\n  <div class=\"accordion-content\">\n    <p><p>We fully secure SAP systems for you, end-to-end, from the infrastructure to SAP profile parameters and SAP security monitoring through to monitoring for irregularities.<\/p><\/p>\n  <\/div>\n<\/div>\n<div class=\"accordion-item\">\n  <h5 class=\"accordion-header\">\n    Identity and Access Management\n    <span class=\"accordion-icon\">\n      <svg width=\"19\" height=\"19\" viewBox=\"0 0 19 19\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_2761_556\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"19\" height=\"19\">\n<g clip-path=\"url(#clip0_2761_556)\">\n<g clip-path=\"url(#clip1_2761_556)\">\n<path d=\"M18.26 17.6787V1.67875H16.26V15.2687L1.97001 0.96875L0.560009 2.37875L14.85 16.6687H1.26001V18.6687H17.26C17.81 18.6687 18.26 18.2187 18.26 17.6687V17.6787Z\" fill=\"black\"\/>\n<\/g>\n<\/g>\n<\/mask>\n<g mask=\"url(#mask0_2761_556)\">\n<rect x=\"18.26\" y=\"0.679688\" width=\"18\" height=\"18\" transform=\"rotate(90 18.26 0.679688)\" fill=\"#112A10\"\/>\n<\/g>\n<defs>\n<clipPath id=\"clip0_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<clipPath id=\"clip1_2761_556\">\n<rect width=\"18\" height=\"18\" fill=\"white\" transform=\"matrix(0 1 -1 0 18.26 0.679688)\"\/>\n<\/clipPath>\n<\/defs>\n<\/svg>\n\n    <\/span>\n  <\/h5>\n  <div class=\"accordion-content\">\n    <p><p>Coherent identity and rights management is an important part of the security concept. We help with the adaptation, operation and redesign of authorisation concepts for SAP S\/4 (in-house\/cloud) and non-SAP solutions. <\/p><\/p>\n  <\/div>\n<\/div>\n\n<\/div>\n<!-- end Accordion -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa1a1d4 e-flex e-con-boxed e-con e-parent\" data-id=\"fa1a1d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b995f4 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8b995f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why IT security is indispensable<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0996fb1 animated-fast elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0996fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For several years now, the threat of cyberattacks has been growing ever more acute. The image of the lone hacker in a hoodie is no longer accurate. Cybercrime has long since become the domain of organised crime.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94f2df7 default-section-spacing animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"94f2df7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3044c5c e-con-full team-box e-flex e-con e-child\" data-id=\"3044c5c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b90e28b elementor-widget elementor-widget-text-editor\" data-id=\"b90e28b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A highly professional network of cybergangs operates in an increasingly differentiated underground economy. At the same time, geopolitical conflicts are increasing the risk of attacks by state actors. Ransomware attacks, supply chain attacks and data theft are on the agenda, as are hacktivism and DDoS attacks, which paralyse IT systems for reasons other than simply greed.  <\/p>\n<p>The potential damage caused by successful cyberattacks is now so serious that it jeopardises the existence of companies. In addition to operational restrictions and the extortion of ransom and hush money, there is also the threat of reputational damage and draconian fines for non-compliance with regulatory requirements. Cybersecurity is therefore a must. As a reliable service provider, teamative supports you in sustainably increasing your cybersecurity level .   <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-251e6fc e-flex e-con-boxed e-con e-parent\" data-id=\"251e6fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e28099 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1e28099\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic approach for sustainable IT security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-712cb89 animated-fast elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"712cb89\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IT security is not a one-off goal, but an ongoing process. We ensure sustainably effective cyberdefence by taking an integrated view of people, technologies and processes. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ace9d9 default-section-spacing animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"8ace9d9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-20eb194 e-grid e-con-full e-con e-child\" data-id=\"20eb194\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18ac856 e-con-full team-box e-flex e-con e-child\" data-id=\"18ac856\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0a23086 e-con-full e-flex e-con e-child\" data-id=\"0a23086\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-441968a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"441968a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Suitable teams<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d85b3f2 elementor-widget elementor-widget-image\" data-id=\"d85b3f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-large size-large wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b0e8fc elementor-widget elementor-widget-text-editor\" data-id=\"7b0e8fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Well-established teams, tailored to your individual needs<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61254b8 e-con-full team-box e-flex e-con e-child\" data-id=\"61254b8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-be4ccd4 e-con-full e-flex e-con e-child\" data-id=\"be4ccd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2790cbf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2790cbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Specialists with cyber know-how<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82c7623 elementor-widget elementor-widget-image\" data-id=\"82c7623\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-large size-large wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6450ee elementor-widget elementor-widget-text-editor\" data-id=\"d6450ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Experienced experts &#8211; pen testers, BSI\/ISO consultants, SOC analysts, IAM specialists, firewall admins, etc.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9db6d39 e-con-full team-box e-flex e-con e-child\" data-id=\"9db6d39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-322d68f e-con-full e-flex e-con e-child\" data-id=\"322d68f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d200ecf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d200ecf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security compliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65b8730 elementor-widget elementor-widget-image\" data-id=\"65b8730\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-thumbnail size-thumbnail wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8281406 elementor-widget elementor-widget-text-editor\" data-id=\"8281406\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Support for compliance with security standards and guidelines<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b695cf e-con-full team-box e-flex e-con e-child\" data-id=\"9b695cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-cb0773a e-con-full e-flex e-con e-child\" data-id=\"cb0773a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31ef80c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"31ef80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">State-of-the-art technology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1abcddc elementor-widget elementor-widget-image\" data-id=\"1abcddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-large size-large wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ebac7 elementor-widget elementor-widget-text-editor\" data-id=\"17ebac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use of advanced security tools and technologies<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37c1f07 e-con-full team-box e-flex e-con e-child\" data-id=\"37c1f07\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-67d9d48 e-con-full e-flex e-con e-child\" data-id=\"67d9d48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74d0924 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"74d0924\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fast response time<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a310cd elementor-widget elementor-widget-image\" data-id=\"7a310cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-large size-large wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18a9582 elementor-widget elementor-widget-text-editor\" data-id=\"18a9582\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Damage limitation through rapid response to security incidents<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f4e61d e-con-full team-box e-flex e-con e-child\" data-id=\"8f4e61d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a824b27 e-con-full e-flex e-con e-child\" data-id=\"a824b27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea65c9 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6ea65c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Effective prevention<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72f8f76 elementor-widget elementor-widget-image\" data-id=\"72f8f76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"51\" height=\"65\" src=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/07\/globe-icon.svg\" class=\"attachment-large size-large wp-image-2703\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5dcaf7 elementor-widget elementor-widget-text-editor\" data-id=\"a5dcaf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementation of security measures for effective cyberdefenc<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09ffce5 e-flex e-con-boxed e-con e-parent\" data-id=\"09ffce5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-806d7a2 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"806d7a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Our approach<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-547a9ce animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"547a9ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What we focus on when it comes to IT security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0adf4ea default-section-spacing animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"0adf4ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12bbd97 e-con-full e-flex e-con e-child\" data-id=\"12bbd97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6541d5 elementor-widget elementor-widget-accordion\" data-id=\"b6541d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1911\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Security Operations<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1911\"><p>To ensure that the entire IT infrastructure is monitored, we rely on the proven concept of <em>Security Information and Event Management<\/em> (SIEM). The IT landscape is continuously monitored. Alerts are sent when incidents are detected. Based on the constant detection of potential vulnerabilities, appropriate defensive measures are implemented and damage limitation is systematically driven forward. n.   <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1912\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1912\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Continuous management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1912\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1912\"><p>A continuous review ensures that a company&#8217;s cyberrisk status remains transparent at all times. The process goes beyond traditional periodic audits and reviews. Security controls, vulnerabilities and cyberthreats remain under the microscope on an ongoing basis. This enables organisations to sustainably improve their information security management system and increase the security level of their organisation.   <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1913\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1913\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">IT risk management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1913\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1913\"><p>Holistic risk management is an essential part of a company&#8217;s security strategy. This involves, for example, identifying critical business services that are particularly in need of protection. The more transparent risk assessment and management are, the more targeted the control, containment and assessment of threats can be. This makes it possible to assess how much &#8220;risk&#8221; a company is taking in its activities. This is crucial to ensure business continuity in the event of an emergency.    <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1914\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1914\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Policy  compliance management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1914\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1914\"><p>Regulatory requirements in the area of cybersecurity are becoming increasingly strict. Legislators have recognised the importance of a high level of security. In addition to basic regulations such as GDPR, more far-reaching laws such as NIS-2, which stipulate extensive requirements for (particularly) important facilities and operators of critical systems, must also be taken into account. Companies must meet legal and regulatory requirements with suitable processes and solutions. We support you in creating the necessary transparency in processes and compliance requirements.    <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1915\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1915\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Audit management<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1915\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1915\"><p>Regular audits are essential in companies in order to determine the status of IT security and to identify weaknesses. Audit management is therefore an important part of the security strategy. It helps with the implementation of audit guidelines and accompanies audits in all phases, from preparation and execution to reporting and follow-up.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Security Operations\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>To ensure that the entire IT infrastructure is monitored, we rely on the proven concept of <em>Security Information and Event Management<\\\/em> (SIEM). The IT landscape is continuously monitored. Alerts are sent when incidents are detected. Based on the constant detection of potential vulnerabilities, appropriate defensive measures are implemented and damage limitation is systematically driven forward. n.   <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Continuous management\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A continuous review ensures that a company&#8217;s cyberrisk status remains transparent at all times. The process goes beyond traditional periodic audits and reviews. Security controls, vulnerabilities and cyberthreats remain under the microscope on an ongoing basis. This enables organisations to sustainably improve their information security management system and increase the security level of their organisation.   <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"IT risk management\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Holistic risk management is an essential part of a company&#8217;s security strategy. This involves, for example, identifying critical business services that are particularly in need of protection. The more transparent risk assessment and management are, the more targeted the control, containment and assessment of threats can be. This makes it possible to assess how much &#8220;risk&#8221; a company is taking in its activities. This is crucial to ensure business continuity in the event of an emergency.    <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Policy  compliance management\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Regulatory requirements in the area of cybersecurity are becoming increasingly strict. Legislators have recognised the importance of a high level of security. In addition to basic regulations such as GDPR, more far-reaching laws such as NIS-2, which stipulate extensive requirements for (particularly) important facilities and operators of critical systems, must also be taken into account. Companies must meet legal and regulatory requirements with suitable processes and solutions. We support you in creating the necessary transparency in processes and compliance requirements.    <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Audit management\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Regular audits are essential in companies in order to determine the status of IT security and to identify weaknesses. Audit management is therefore an important part of the security strategy. It helps with the implementation of audit guidelines and accompanies audits in all phases, from preparation and execution to reporting and follow-up.  <\\\/p>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-126cbfa e-con-full default-section-spacing e-flex e-con e-parent\" data-id=\"126cbfa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11cd847 elementor-widget elementor-widget-heading\" data-id=\"11cd847\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Discover our services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e44fb5c elementor-widget elementor-widget-global elementor-global-5593 elementor-global-5573 elementor-widget-ucaddon_teaser_carousel\" data-id=\"e44fb5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_teaser_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Teaser Carousel -->\n\t\t<link id='uc_ac_assets_file_slick_css_1776-css' href='https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/ac_assets\/kachel_slider\/slick.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Teaser Carousel *\/\n\n#uc_teaser_carousel_elementor_e44fb5c .element{\n  color:#fff;\n  border-radius: var(--default-border-radius);\n  margin-right:20px;\n  display:flex;\n  flex-direction: column;\n  justify-content: flex-start;\n  gap:20px;\n  padding: 2em;\n  min-height:535px;\n  outline:none;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c h3 {\n  margin-top:0;\n  min-height:110px;\n}\n#uc_teaser_carousel_elementor_e44fb5c h3,\n#uc_teaser_carousel_elementor_e44fb5c h4 {\n\tmargin:0 !important;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .element-header-row {\n  display: flex;\n  flex-direction:column;\n  gap:20px;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .element .arrow-icon {\n  width: 40px;\n  height: 40px;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .slick-disabled {\n  opacity : 0; \n  pointer-events:none;\n}\n\n@media screen and (max-width: 767px) {\n  #uc_teaser_carousel_elementor_e44fb5c .element {\n    margin-bottom: 15px;\n    padding: 30px;\n  }\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .nav-button  {\n  background-color: transparent;\n  font-size: 24px;\n  color: var(--light-green);\n  border: none;\n  padding: 10px;\n  cursor: pointer;\n  user-select: none;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .nav-button.slick-disabled {\n\topacity: 1!important;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .uc_teaser_carousel_elementor_e44fb5c-nav-container{\n\tmargin-top:25px;\n}\n#uc_teaser_carousel_elementor_e44fb5c_item1 {\n  background-size: cover;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .subheadline {\n \tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .headline {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .optional_text {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link {\n\tcolor: #00572D;\n    line-height: 1;\n    background-color: #69727d;\n    font-size: 15px;\n    padding: 12px 24px;\n    text-align: center;\n    transition: all .3s;\n  \tfont-family: var( --e-global-typography-f2ca524-font-family ), Sans-serif;\n    font-size: var( --e-global-typography-f2ca524-font-size );\n    font-weight: var( --e-global-typography-f2ca524-font-weight );\n    color: var( --e-global-color-683322e );\n    background-color: var( --e-global-color-6483187 );\n    border-style: solid;\n    border-color: var( --e-global-color-6483187 );\n    border-radius: 50px 50px 50px 50px;\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%2300572D'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n    background-repeat: no-repeat;\n    background-size: 20px;\n    background-position: calc(100% - 14px) center;\n    padding-inline-end: 55px;\n  \tmargin-top: auto;\n  \twidth: max-content;\n  \toutline:none;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link:hover {\n    color: var( --e-global-color-secondary );\n    background-color: var( --e-global-color-267780b );\n  \tborder-color: var( --e-global-color-267780b );\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%239EE870'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n}\n#uc_teaser_carousel_elementor_e44fb5c_item2 {\n  background-size: cover;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .subheadline {\n \tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .headline {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .optional_text {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link {\n\tcolor: #00572D;\n    line-height: 1;\n    background-color: #69727d;\n    font-size: 15px;\n    padding: 12px 24px;\n    text-align: center;\n    transition: all .3s;\n  \tfont-family: var( --e-global-typography-f2ca524-font-family ), Sans-serif;\n    font-size: var( --e-global-typography-f2ca524-font-size );\n    font-weight: var( --e-global-typography-f2ca524-font-weight );\n    color: var( --e-global-color-683322e );\n    background-color: var( --e-global-color-6483187 );\n    border-style: solid;\n    border-color: var( --e-global-color-6483187 );\n    border-radius: 50px 50px 50px 50px;\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%2300572D'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n    background-repeat: no-repeat;\n    background-size: 20px;\n    background-position: calc(100% - 14px) center;\n    padding-inline-end: 55px;\n  \tmargin-top: auto;\n  \twidth: max-content;\n  \toutline:none;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link:hover {\n    color: var( --e-global-color-secondary );\n    background-color: var( --e-global-color-267780b );\n  \tborder-color: var( --e-global-color-267780b );\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%239EE870'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n}\n#uc_teaser_carousel_elementor_e44fb5c_item3 {\n  background-size: cover;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .subheadline {\n \tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .headline {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .optional_text {\n\tcolor: #112A10;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link {\n\tcolor: #00572D;\n    line-height: 1;\n    background-color: #69727d;\n    font-size: 15px;\n    padding: 12px 24px;\n    text-align: center;\n    transition: all .3s;\n  \tfont-family: var( --e-global-typography-f2ca524-font-family ), Sans-serif;\n    font-size: var( --e-global-typography-f2ca524-font-size );\n    font-weight: var( --e-global-typography-f2ca524-font-weight );\n    color: var( --e-global-color-683322e );\n    background-color: var( --e-global-color-6483187 );\n    border-style: solid;\n    border-color: var( --e-global-color-6483187 );\n    border-radius: 50px 50px 50px 50px;\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%2300572D'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n    background-repeat: no-repeat;\n    background-size: 20px;\n    background-position: calc(100% - 14px) center;\n    padding-inline-end: 55px;\n  \tmargin-top: auto;\n  \twidth: max-content;\n  \toutline:none;\n}\n\n#uc_teaser_carousel_elementor_e44fb5c .teaser-link:hover {\n    color: var( --e-global-color-secondary );\n    background-color: var( --e-global-color-267780b );\n  \tborder-color: var( --e-global-color-267780b );\n  \tbackground-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' width='15' height='14' viewBox='0 0 15 14' fill='none'%3E%3Cg clip-path='url(%23clip0_1689_4474)'%3E%3Cpath d='M14.082 7.46523C14.3391 7.2082 14.3391 6.79258 14.082 6.53828L10.3633 2.8168C10.1062 2.55977 9.69063 2.55977 9.43633 2.8168C9.18203 3.07383 9.1793 3.48945 9.43633 3.74375L12.034 6.34141L0.929688 6.34414C0.566016 6.34414 0.273438 6.63672 0.273438 7.00039C0.273438 7.36406 0.566016 7.65664 0.929688 7.65664H12.034L9.43633 10.2543C9.1793 10.5113 9.1793 10.927 9.43633 11.1812C9.69336 11.4355 10.109 11.4383 10.3633 11.1812L14.082 7.46523Z' fill='%239EE870'\/%3E%3C\/g%3E%3Cdefs%3E%3CclipPath id='clip0_1689_4474'%3E%3Crect width='14' height='14' fill='white' transform='translate(0.273438)'\/%3E%3C\/clipPath%3E%3C\/defs%3E%3C\/svg%3E\");\n}\n\n\n<\/style>\n\n<div class=\"slider-wrapper\" id=\"uc_teaser_carousel_elementor_e44fb5c\">\n  <div class=\"slick-slider carousel-container\">\n    <div class=\"element carousel-slide element-1 elementor-repeater-item-94ad6a5 team-box\" style=\"background-image: url(https:\/\/staging-mk2234.teamative.com\/false)\" id=\"uc_teaser_carousel_elementor_e44fb5c_item1\">\n    <h4 class=\"subheadline\">Service<\/h4>\n    <h3 class=\"headline\">teamative Flex<\/h3>\n  <p class=\"optional_text\">\n    Accelerate your IT projects! Our staffing service provides you with qualified IT workers - from individual experts to complete teams. \n  <\/p>\n    \t<a class=\"teaser-link\" href=\"https:\/\/staging-mk2234.teamative.com\/service\/services\/teamative-flex\/\">More<\/a>\n  <\/div>\n<div class=\"element carousel-slide element-1 elementor-repeater-item-7e5cb4c team-box\" style=\"background-image: url(https:\/\/staging-mk2234.teamative.com\/false)\" id=\"uc_teaser_carousel_elementor_e44fb5c_item2\">\n    <h4 class=\"subheadline\">Service<\/h4>\n    <h3 class=\"headline\">Infrastructure and Cloud Services<\/h3>\n  <p class=\"optional_text\">\n    24x7 support for the stable and reliable operation of your infrastructure, precisely tailored to your individual requirements and framework conditions.\n  <\/p>\n    \t<a class=\"teaser-link\" href=\"https:\/\/staging-mk2234.teamative.com\/service\/services\/infrastructure-cloud-services\/\">More<\/a>\n  <\/div>\n<div class=\"element carousel-slide element-1 elementor-repeater-item-b9e35df team-box\" style=\"background-image: url(https:\/\/staging-mk2234.teamative.com\/false)\" id=\"uc_teaser_carousel_elementor_e44fb5c_item3\">\n    <h4 class=\"subheadline\">Service<\/h4>\n    <h3 class=\"headline\">Tech-Smart Sourcing as a Service<\/h3>\n  <p class=\"optional_text\">\n    Whether individual IT experts or entire teams - we cover all your IT personnel requirements from a single source and provide you with the right women and manpower.\n  <\/p>\n    \t<a class=\"teaser-link\" href=\"https:\/\/staging-mk2234.teamative.com\/service\/services\/techsmart-sourcing\/\">More<\/a>\n  <\/div>\n\n  <\/div>\n  <div class=\"uc_teaser_carousel_elementor_e44fb5c-nav-container\"><\/div>\n<\/div>\n<!-- end Teaser Carousel -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"parent":3553,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-3559","leistung","type-leistung","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT security | teamative<\/title>\n<meta name=\"description\" content=\"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security | teamative\" \/>\n<meta property=\"og:description\" content=\"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"teamative\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T15:45:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/\",\"name\":\"IT security | teamative\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Header-Infrastruktur.jpg\",\"datePublished\":\"2024-08-21T07:09:12+00:00\",\"dateModified\":\"2024-11-01T15:45:17+00:00\",\"description\":\"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Header-Infrastruktur.jpg\",\"contentUrl\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Header-Infrastruktur.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infrastructure &amp; Security\",\"item\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/portfolio\\\/infrastructure-and-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/\",\"name\":\"teamative\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging-mk2234.teamative.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security | teamative","description":"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT security | teamative","og_description":"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.","og_url":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/","og_site_name":"teamative","article_modified_time":"2024-11-01T15:45:17+00:00","og_image":[{"width":1440,"height":439,"url":"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/","url":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/","name":"IT security | teamative","isPartOf":{"@id":"https:\/\/staging-mk2234.teamative.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg","datePublished":"2024-08-21T07:09:12+00:00","dateModified":"2024-11-01T15:45:17+00:00","description":"Protection against cyber attacks requires an approach that integrates people, technologies and processes. We help you build up an effective cyber defence.","breadcrumb":{"@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/#primaryimage","url":"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg","contentUrl":"https:\/\/staging-mk2234.teamative.com\/wp-content\/uploads\/2024\/09\/Header-Infrastruktur.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging-mk2234.teamative.com\/en\/"},{"@type":"ListItem","position":2,"name":"Infrastructure &amp; Security","item":"https:\/\/staging-mk2234.teamative.com\/en\/portfolio\/infrastructure-and-security\/"},{"@type":"ListItem","position":3,"name":"IT security"}]},{"@type":"WebSite","@id":"https:\/\/staging-mk2234.teamative.com\/en\/#website","url":"https:\/\/staging-mk2234.teamative.com\/en\/","name":"teamative","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging-mk2234.teamative.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/leistung\/3559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/leistung"}],"about":[{"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/types\/leistung"}],"version-history":[{"count":2,"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/leistung\/3559\/revisions"}],"predecessor-version":[{"id":5616,"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/leistung\/3559\/revisions\/5616"}],"up":[{"embeddable":true,"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/leistung\/3553"}],"wp:attachment":[{"href":"https:\/\/staging-mk2234.teamative.com\/en\/wp-json\/wp\/v2\/media?parent=3559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}