{"id":22868,"date":"2021-04-20T12:09:35","date_gmt":"2021-04-20T10:09:35","guid":{"rendered":"https:\/\/www.tecsens.com\/computersicherheit\/"},"modified":"2023-09-19T13:42:00","modified_gmt":"2023-09-19T11:42:00","slug":"computersicherheit","status":"publish","type":"page","link":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/","title":{"rendered":"Computersicherheit"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; fullwidth=&#8220;on&#8220; admin_label=&#8220;01 Curva superior&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;rgba(0,0,0,0)&#8220; background_image=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazuloscura.png&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;top_center&#8220; background_repeat=&#8220;repeat-x&#8220; min_height=&#8220;176px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_css_main_element=&#8220;z-index:10;&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; fullwidth=&#8220;on&#8220; admin_label=&#8220;01 slider&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;-170px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_fullwidth_slider _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; height=&#8220;550px&#8220; height_tablet=&#8220;500px&#8220; height_phone=&#8220;400px&#8220; height_last_edited=&#8220;off|phone&#8220; animation_direction=&#8220;right&#8220; auto=&#8220;on&#8220; auto_speed=&#8220;3000&#8243; auto_ignore_hover=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_slide heading=&#8220;COMPUTER SICHERHEITSUNTERNEHMEN&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_level=&#8220;h1&#8243; header_font=&#8220;Raleway|700|||||||&#8220; header_text_color=&#8220;#0075b2&#8243; header_font_size=&#8220;36px&#8220; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#5f5e5d&#8220; body_font_size=&#8220;28px&#8220; background_color=&#8220;#FFFFFF&#8220; background_enable_color=&#8220;on&#8220; background_enable_image=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_transition=&#8220;on&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir bieten Ihnen die besten IT-Sicherheitsl\u00f6sungen<\/p>\n<hr style=\"color: #fff; max-width: 900px; margin-bottom: 30px;\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" alt=\"tecsens-Logo\" class=\"wp-image-18991 alignnone size-full\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg 100w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-24x24.jpg 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-36x36.jpg 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-48x48.jpg 48w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;06&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||1px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; global_colors_info=&#8220;{}&#8220; custom_padding=&#8220;||0px|||&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||37px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Konzentriert auf den Schutz Ihrer Infrastrukturen, Netzwerke und Gesch\u00e4ftsinformationen,<\/strong><br \/><strong> Risiken, die sie beeinflussen k\u00f6nnen.<\/strong><\/p>\n<p style=\"text-align: justify;\">-Verwaltete Perimeter-Sicherheitsdienste f\u00fcr jede Zentrale.<br \/> -M\u00f6glichkeit, Architekturen in H.A. zu installieren.<\/p>\n<p style=\"text-align: justify;\">Unsere Dienste erm\u00f6glichen es Ihnen, Ihren Internetzugang zu \u00fcberwachen, sowie Schutz vor Viren und externen Bedrohungen, Blockierung von unerw\u00fcnschtem Zugriff, E-Mail-Filterung (AntiSpam), IDS\/IPS und permanente Aktualisierung.<\/p>\n<p style=\"text-align: justify;\">Bereiten Sie sich auf eine neue Generation von Bedrohungen auf der Grundlage unserer Dienstleistungen und unseres Know-hows vor.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;37px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;17&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||1px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">UTM-L\u00f6sungen<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; module_id=&#8220;tecsensprotect&#8220; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">TECSENS PROTECT<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Protect ist ein Cloud-Mail-Filterdienst (SaaS-Modus), der <strong>Benutzerdaten sch\u00fctzt, indem er die neuesten Technologien f\u00fcr die E-Mail-Sicherheit zusammenstellt.<\/strong><\/p>\n<p style=\"text-align: justify;\">Es sind keine Infrastruktur\u00e4nderungen erforderlich, Tecsens Protect ist dem Mail-Server voraus.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;38px|||||&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<div class=\"contenedorflex\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->    <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-personalizado-06.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] --> Benutzerdefinierte<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->   <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] --> agil<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->    <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-rapido-06.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] --> schnell<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-email-03.jpg&#8220; alt=&#8220;E-Mail-Informatik-Sicherheit&#8220; title_text=&#8220;E-Mail-Informatik-Sicherheit&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;2_5,3_5&#8243; module_id=&#8220;dnsfilter&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;6px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-dns-04.jpg&#8220; alt=&#8220;Sicherheitsinformatika dns&#8220; title_text=&#8220;Sicherheitsinformatika dns&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">TECSENS DNS FILTER<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">TECSENS DNS Filter <strong>erleichtert die Implementierung umfassender und anpassbarer Internetinhalte und URL-Filterrichtlinien in wenigen Minuten.<\/strong><\/p>\n<p style=\"text-align: justify;\">Unsere Algorithmen kategorisieren Websites intelligent, sodass Sie nicht st\u00e4ndig eine Liste von Domains f\u00fchren m\u00fcssen.<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista listatick&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Bietet Unterst\u00fctzung f\u00fcr Netzwerke mit dynamischen IP-Adressen.<\/li>\n<li style=\"text-align: justify;\">Sch\u00fctzen Sie Ihre Benutzer und Netzwerke vor Befehl und Kontrolle (Botnet), Malware, Phishing, Viren und anderen Bedrohungen, indem Sie einfach unsere Sicherheitsrichtlinien anwenden.<\/li>\n<li style=\"text-align: justify;\">Vervollst\u00e4ndigen Sie Berichte mit Aktivit\u00e4ts-, Sicherheits-, Abrechnungs- und Abfrageprotokollierung.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; module_id=&#8220;idsips&#8220; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;11px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">IDS\/IPS<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Snort IDS\/IPS ist eine Software, die <strong>ein Angriffserkennungs- und Port-Scanmodul implementiert, mit dem Sie zuvor definierte Fehler aufzeichnen, warnen und darauf reagieren k\u00f6nnen.<\/strong><\/p>\n<p style=\"text-align: justify;\">Die Methode der Registrierung und Aktualisierung von Regeln erfolgt t\u00e4glich und erh\u00e4lt dank der Abonnementstufe, dass TECSENS Echtzeit-Updates hat.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||-2px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">IDS (INTRUDER DETECTION SYSTEMS)<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">IDS enthalten eine umfangreiche aktualisierte Datenbank mit einer Vielzahl bekannter Angriffssignaturen.<br \/>\nDiese L\u00f6sung \u00fcberwacht eingehenden Datenverkehr durch eine gr\u00fcndliche Netzwerkanalyse und Port-Sweep, die alle vergleicht es mit den Informationen, die es \u00fcber b\u00f6sartige Elemente hat.<br \/>\nAngesichts verd\u00e4chtiger Aktivit\u00e4ten gibt dieses Erkennungssystem eine Fr\u00fchwarnung aus, die Systemadministratoren anweist. Und es sind diese IT-Manager, die entsprechende Ma\u00dfnahmen ergreifen m\u00fcssen.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||-2px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">IPS (SYSTEME ZUR VERHINDERUNG VON EINBR\u00dcCHEN)<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Das IPS befindet sich zwischen der Firewall und dem Rest des Unternehmensnetzwerks und \u00fcberwacht die Eingabepakete.<br \/>\nUnd bevor Sie sie hereinlassen, \u00fcberpr\u00fcfen Sie, wof\u00fcr sie tats\u00e4chlich verwendet werden, und verhindern Sie, dass verd\u00e4chtiger Datenverkehr auf den Rest des Unternehmensnetzwerks zugreift.<br \/>\nJe nach Art der Erkennung kann es b\u00f6sartigen Datenverkehr basierend auf Signaturen (z. B. einem Antivirenprogramm) signalisieren.<br \/>\nSie k\u00f6nnen dies auch tun, wenn es anomaliebasiert ist, abh\u00e4ngig vom Muster des normalen Verkehrsverhaltens.<br \/>\nOder Sie k\u00f6nnen sogar auf der Grundlage sehr spezifischer Sicherheitsrichtlinien eingreifen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-ips-ids-05.jpg&#8220; alt=&#8220;Informatik-Sicherheits-IPs-Ids&#8220; title_text=&#8220;Informatik-Sicherheits-IPs-Ids&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;17&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||1px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Andere L\u00f6sungen f\u00fcr die Computersicherheit<\/h2>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;2_5,3_5&#8243; module_id=&#8220;firewall&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;|auto|-45px|auto||&#8220; custom_padding=&#8220;6px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-firewall-06.jpg&#8220; alt=&#8220;Firewall-Informatiksicherheit&#8220; title_text=&#8220;Firewall-Informatiksicherheit&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">Firewall<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Durch unsere marktf\u00fchrenden Edge-Sicherheitsl\u00f6sungen sind wir in der Lage, sehr komplexe Architekturen zu adressieren, indem wir direkt mit gro\u00dfen Herstellern konkurrieren.<\/strong><\/p>\n<p style=\"text-align: justify;\"> Ma\u00dfgeschneiderte Installationen, von den einfachsten bis hin zu den spezifischsten und robustesten Funktionalit\u00e4ten.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;11px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text module_class=&#8220;lista listatick&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Virtual Private Networks mit IPsec, OpenVPN, Wireguard.<\/li>\n<li style=\"text-align: justify;\">Hochverf\u00fcgbarkeitscluster; Redundanz und Failover.<\/li>\n<li style=\"text-align: justify;\">Eingehender und ausgehender Load Balancer.<\/li>\n<li style=\"text-align: justify;\">Quality of Service (QoS).<\/li>\n<li style=\"text-align: justify;\">Paketdebugger.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text module_class=&#8220;lista listatick&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Multi-WAN.<\/li>\n<li style=\"text-align: justify;\">Zustandsbehaftete Firewall.<\/li>\n<li style=\"text-align: justify;\">Quell-\/Ziel-IP-Filterung.<\/li>\n<li style=\"text-align: justify;\">Konfigurierbare Registrierung nach Regel und Limiter pro Regel.<\/li>\n<li style=\"text-align: justify;\">Multi-WAN und Stateful Firewall.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; make_equal=&#8220;on&#8220; module_id=&#8220;vpn&#8220; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;11px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||35px|||&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">Vpn<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Virtuelle private Netzwerke (VPNs) erm\u00f6glichen Remote-Verbindungen, sicher in der Organisation oder auf verlegte Weise, um Telearbeit zu erleichtern.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||-2px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">ACCESS VPN:<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Sie erm\u00f6glichen eine direkte Remote-Verbindung mit dem lokalen Heim- oder Unternehmensnetzwerk und den Zugriff auf alle Freigaben, als ob sie sich physisch im Unternehmen bef\u00e4nden.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||-2px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">PUNKT-ZU-PUNKT-VPN:<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Sie erm\u00f6glichen es Ihnen, Remote-B\u00fcros mit dem Hauptsitz einer Organisation zu verbinden und Zugriff auf alle Aktien zu haben, als ob wir physisch in allen von ihnen w\u00e4ren. Der VPN-Server ist derjenige, der \u00fcber eine permanente Verbindung zum Internet verf\u00fcgt, alle Verbindungen akzeptiert, die von den Standorten kommen, und den VPN-Tunnel durch eine Art von Verschl\u00fcsselung und Authentifizierung herstellt.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-vpn-07.jpg&#8220; alt=&#8220;Sicherheitsinformatik vpn&#8220; title_text=&#8220;Sicherheitsinformatik vpn&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;55px|||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;2_5,3_5&#8243; module_id=&#8220;monitorizacion&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;6px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-monitorizacion-08.jpg&#8220; alt=&#8220;Informationssicherheits\u00fcberwachung&#8220; title_text=&#8220;Informationssicherheits\u00fcberwachung&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">\u00dcberwachung<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Performance-Monitoring-L\u00f6sung f\u00fcr DevOps- und IT-Betriebsteams, mit der Sie eine 360-Grad-Ansicht Ihrer gesamten Infrastruktur haben und die Arbeit erleichtern.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista listatick&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||-1px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Automatisierung.<\/li>\n<li style=\"text-align: justify;\">Transparenz.<\/li>\n<li style=\"text-align: justify;\">Proaktive Erkennung von Vorf\u00e4llen.<\/li>\n<li style=\"text-align: justify;\">Leistungsberichte.<\/li>\n<li style=\"text-align: justify;\">Kapazit\u00e4tsplanung.<\/li>\n<li style=\"text-align: justify;\">Gew\u00e4hrleistet Verf\u00fcgbarkeit und Leistung.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Arten der \u00dcberwachung:<\/strong><\/p>\n<p style=\"text-align: justify;\">Websites und Server.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; make_equal=&#8220;on&#8220; module_id=&#8220;proxyinverso&#8220; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;11px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">Reverseproxy oder Load Balancer<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Hochverf\u00fcgbarkeits-Load Balancer und Proxy-Server f\u00fcr <strong>L4- und L7-Layer-HTTP- und TCP-basierte Anwendungen.<\/strong><\/p>\n<p style=\"text-align: justify;\">Es <strong>zielt darauf ab, eingehende Anforderungen auf mehrere Server zu verteilen, wodurch die Infrastrukturverf\u00fcgbarkeit, Ausfallsicherheit und Skalierbarkeit erheblich verbessert werden.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-proxy-inverso-19.jpg&#8220; alt=&#8220;Reverseproxy-Informatiksicherheit&#8220; title_text=&#8220;Reverseproxy-Informatiksicherheit&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;2_5,3_5&#8243; module_id=&#8220;waf&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;6px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-waf-20.jpg&#8220; alt=&#8220;Informatik sicherheit waf&#8220; title_text=&#8220;Informatik sicherheit waf&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">WAF(Web-Aplikationsfirewall)<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Firewall, die Angriffe auf Webanwendungen durch Filtern und \u00dcberwachen des HTTP-Datenverkehrs zwischen Webanwendungen und dem Internetnetzwerk verringert.<\/strong><\/p>\n<p style=\"text-align: justify;\">Es fungiert als Reverseproxy, der den Server sch\u00fctzt und Benutzer dazu verleitet, ihn zu passieren, bevor er erreicht wird.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;18px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; make_equal=&#8220;on&#8220; module_id=&#8220;ssl&#8220; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;11px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076B2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; header_3_font=&#8220;Maven Pro||||||||&#8220; header_3_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">SSL-Zertifikate<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Wir stellen SSL-Zertifikate (Secure Connection Layer) bereit, ein Sicherheitsstandard, der Informationen verschl\u00fcsselt, die zwischen einem Webserver und dem Browser \u00fcbertragen werden.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-ssl-21.jpg&#8220; alt=&#8220;Informatik Sicherheit ssl&#8220; title_text=&#8220;Informatik Sicherheit ssl&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;-21px|auto||auto||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/01\/kitdigital-logo.png&#8220; alt=&#8220;kit digital logo&#8220; title_text=&#8220;kit digital logo&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; transform_scale=&#8220;62%|62%&#8220; custom_margin=&#8220;|||-7px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;26px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span style=\"color: #0076b2;\"><strong>L\u00d6SUNGEN IM RAHMEN DES DIGITAL KIT AID-PROGRAMMS<\/strong><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;13px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;3px||40px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #0076b2;\"><strong>*\u00dcberpr\u00fcfen Sie die verf\u00fcgbaren L\u00f6sungen auf der Digital Kit-Seite<\/strong><\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;https:\/\/www.tecsens.com\/de\/?page_id=26958&#8243; button_text=&#8220;Mehr \u00fcber Digital Kit&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.16&#8243; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#ffffff&#8220; button_bg_color=&#8220;#0076bc&#8220; button_bg_color_gradient_direction=&#8220;243deg&#8220; button_bg_color_gradient_stops=&#8220;#3D72E7 0%|#53a0fe 100%&#8220; button_bg_color_gradient_start=&#8220;#3D72E7&#8243; button_bg_color_gradient_end=&#8220;#53a0fe&#8220; button_border_width=&#8220;2px&#8220; button_border_color=&#8220;#0076bc&#8220; button_border_radius=&#8220;34px&#8220; button_letter_spacing=&#8220;1px&#8220; button_font=&#8220;Maven Pro|500||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;-4px||11px||false|false&#8220; custom_padding=&#8220;9px|15px|9px|15px|false|false&#8220; saved_tabs=&#8220;all&#8220; global_colors_info=&#8220;{}&#8220; button_text_size__hover_enabled=&#8220;off&#8220; button_text_size__hover=&#8220;null&#8220; button_one_text_size__hover_enabled=&#8220;off&#8220; button_one_text_size__hover=&#8220;null&#8220; button_two_text_size__hover_enabled=&#8220;off&#8220; button_two_text_size__hover=&#8220;null&#8220; button_text_color__hover_enabled=&#8220;on&#8220; button_text_color__hover=&#8220;#ffffff&#8220; button_one_text_color__hover_enabled=&#8220;off&#8220; button_one_text_color__hover=&#8220;null&#8220; button_two_text_color__hover_enabled=&#8220;off&#8220; button_two_text_color__hover=&#8220;null&#8220; button_border_width__hover_enabled=&#8220;on|hover&#8220; button_border_width__hover=&#8220;2px&#8220; button_one_border_width__hover_enabled=&#8220;off&#8220; button_one_border_width__hover=&#8220;null&#8220; button_two_border_width__hover_enabled=&#8220;off&#8220; button_two_border_width__hover=&#8220;null&#8220; button_border_color__hover_enabled=&#8220;off&#8220; button_border_color__hover=&#8220;null&#8220; button_one_border_color__hover_enabled=&#8220;off&#8220; button_one_border_color__hover=&#8220;null&#8220; button_two_border_color__hover_enabled=&#8220;off&#8220; button_two_border_color__hover=&#8220;null&#8220; button_border_radius__hover_enabled=&#8220;on|desktop&#8220; button_border_radius__hover=&#8220;12px&#8220; button_one_border_radius__hover_enabled=&#8220;off&#8220; button_one_border_radius__hover=&#8220;null&#8220; button_two_border_radius__hover_enabled=&#8220;off&#8220; button_two_border_radius__hover=&#8220;null&#8220; button_letter_spacing__hover_enabled=&#8220;on|desktop&#8220; button_letter_spacing__hover=&#8220;1px&#8220; button_one_letter_spacing__hover_enabled=&#8220;off&#8220; button_one_letter_spacing__hover=&#8220;null&#8220; button_two_letter_spacing__hover_enabled=&#8220;off&#8220; button_two_letter_spacing__hover=&#8220;null&#8220; button_bg_color__hover_enabled=&#8220;off&#8220; button_bg_color__hover=&#8220;null&#8220; button_one_bg_color__hover_enabled=&#8220;off&#8220; button_one_bg_color__hover=&#8220;null&#8220; button_two_bg_color__hover_enabled=&#8220;off&#8220; button_two_bg_color__hover=&#8220;null&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;24&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;-1px|||||&#8220; custom_padding=&#8220;13px||39px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; title_text=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_button _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||44px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">H\u00e4ufige Cyberangriffe und L\u00f6sungen<\/h2>\n<p>[\/et_pb_text][et_pb_button _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][et_pb_button _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">DoS- und DDoS-Angriffe (Denial of Service Attack oder Distributed Denial of Service Attack): <strong>Angriffe auf Ger\u00e4te, Server, Netzwerke oder deren prim\u00e4res Ziel darin besteht, sie zu blockieren und f\u00fcr propriet\u00e4re Benutzer nicht zug\u00e4nglich zu machen.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_accordion closed_toggle_text_color=&#8220;#5f5e5d&#8220; closed_toggle_background_color=&#8220;RGBA(0,0,0,0)&#8220; icon_color=&#8220;#0076b2&#8243; use_icon_font_size=&#8220;on&#8220; icon_font_size=&#8220;19px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; toggle_text_color=&#8220;#5f5e5d&#8220; toggle_font=&#8220;Maven Pro|500|||||||&#8220; toggle_letter_spacing=&#8220;1px&#8220; closed_toggle_font=&#8220;Maven Pro|500|||||||&#8220; closed_toggle_letter_spacing=&#8220;1px&#8220; border_width_all=&#8220;0px&#8220; border_color_all=&#8220;#eeeeee&#8220; border_width_top=&#8220;2px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_accordion_item title=&#8220;Welche L\u00f6sungen gibt es?&#8220; open=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;display:none&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Welche L\u00f6sungen gibt es?&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; open=&#8220;off&#8220;]<\/p>\n<p>\u2022 Sch\u00fctzen und konfigurieren Sie Edge-Sicherheitsteams auf die bestm\u00f6gliche Weise. <a href=\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#firewall\" data-et-has-event-already=\"true\">(FIREWALL)<\/a><br \/> \u2022 Sch\u00fctzen Sie Web- oder Internet-exponierte Server mit Layer 7 WAF-L\u00f6sungen. <a href=\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#waf\" data-et-has-event-already=\"true\">(WAF)<\/a><br \/> \u2022 Konfigurieren Sie einen Anforderungsausgleichscomputer (Proxy), um den Lastenausgleich zu laden und Ma\u00dfnahmen gegen den Angriff zu ergreifen. <a href=\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#proxyinverso\" data-et-has-event-already=\"true\">(REVERSE PROXY ODER LOAD BALANCER)<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||19px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Social Engineering:<\/strong> Technik, die Menschen in einer Organisation dazu \u00fcberredet und manipuliert, vertrauliche Informationen zu erhalten oder eine bestimmte b\u00f6sartige Aktion durchzuf\u00fchren, die dem Cyberkriminellen zugute kommt.<\/p>\n<p>[\/et_pb_text][et_pb_accordion closed_toggle_text_color=&#8220;#5f5e5d&#8220; closed_toggle_background_color=&#8220;RGBA(0,0,0,0)&#8220; icon_color=&#8220;#0076b2&#8243; use_icon_font_size=&#8220;on&#8220; icon_font_size=&#8220;19px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; toggle_text_color=&#8220;#5f5e5d&#8220; toggle_font=&#8220;Maven Pro|500|||||||&#8220; toggle_letter_spacing=&#8220;1px&#8220; closed_toggle_font=&#8220;Maven Pro|500|||||||&#8220; closed_toggle_letter_spacing=&#8220;1px&#8220; border_width_all=&#8220;0px&#8220; border_color_all=&#8220;#eeeeee&#8220; border_width_top=&#8220;2px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_accordion_item title=&#8220;Welche L\u00f6sungen gibt es?&#8220; open=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;display:none&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Welche L\u00f6sungen gibt es?&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; open=&#8220;off&#8220;]<\/p>\n<p>\u2022 Mitarbeiterschulung <a href=\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\">(CIBERSECURITY AUDIT)<\/a><br \/>\u2022 Wenden Sie Sicherheitsl\u00f6sungen wie Anti-Spam oder Inhaltsfilter an. <a href=\"#dnsfilter\">(TECSENS PROTECT ODER DNS-FILTER)<\/a><br \/>\u2022 Aktivieren Sie den doppelten Authentifizierungsfaktor.<br \/>\u2022 Sichern Sie Ihre Daten immer. <a href=\"https:\/\/www.tecsens.com\/de\/cloud-dienste-fuer-unternehmen\/cloud-sicherung-2\/\">(BACKUP BaaS oder DraaS)<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;10&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#F1F6F8&#8243; background_enable_image=&#8220;off&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;bottom_center&#8220; background_repeat=&#8220;repeat-x&#8220; custom_padding=&#8220;30px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Mehr erfahren&#8230;<\/h2>\n<p style=\"text-align: center;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; admin_label=&#8220;Fila&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_padding=&#8220;75px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blog posts_number=&#8220;1&#8243; show_author=&#8220;off&#8220; show_date=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_pagination=&#8220;off&#8220; module_class=&#8220;adelantoblog&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Maven Pro|500|||||||&#8220; header_text_color=&#8220;#5F5E5D&#8220; header_font_size=&#8220;16px&#8220; body_font=&#8220;Maven Pro||||||||&#8220; body_font_size=&#8220;16px&#8220; background_color=&#8220;RGBA(0,0,0,0)&#8220; text_orientation=&#8220;justified&#8220; custom_padding=&#8220;||||false|false&#8220; border_radii_fullwidth=&#8220;on|20px|20px|20px|20px&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blog posts_number=&#8220;1&#8243; show_author=&#8220;off&#8220; show_date=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_pagination=&#8220;off&#8220; offset_number=&#8220;1&#8243; module_class=&#8220;adelantoblog&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Maven Pro|500|||||||&#8220; header_text_color=&#8220;#5F5E5D&#8220; header_font_size=&#8220;16px&#8220; body_font=&#8220;Maven Pro||||||||&#8220; body_text_align=&#8220;justify&#8220; body_font_size=&#8220;16px&#8220; background_color=&#8220;RGBA(0,0,0,0)&#8220; custom_padding=&#8220;||||false|false&#8220; border_radii_fullwidth=&#8220;on|20px|20px|20px|20px&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; theme_builder_area=&#8220;post_content&#8220; _builder_version=&#8220;4.21.2&#8243; _module_preset=&#8220;default&#8220; alt=&#8220;onda azul clara&#8220; title_text=&#8220;onda azul clara&#8220; background_image=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazulclara.jpg&#8220; hover_enabled=&#8220;0&#8243; sticky_enabled=&#8220;0&#8243; background_size=&#8220;contain&#8220; background_position=&#8220;top_right&#8220; custom_padding=&#8220;||19px|||&#8220;][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; theme_builder_area=&#8220;post_content&#8220; _builder_version=&#8220;4.21.2&#8243; _module_preset=&#8220;default&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; module_id=&#8220;consulting&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;19px|auto||auto||&#8220; custom_padding=&#8220;0px||55px|||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_code _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;30px|30px|30px|30px|false|false&#8220; custom_css_before=&#8220;span.wpcf7-list-item {display:block;}&#8220; border_radii=&#8220;on|8px|8px|8px|8px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f34142-o1\" lang=\"de-DE\" dir=\"ltr\" data-wpcf7-id=\"34142\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/de\/wp-json\/wp\/v2\/pages\/22868#wpcf7-f34142-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Kontaktformular\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"34142\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"de_DE\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f34142-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Kommerzieller berater\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Kommerzieller berater<\/span><\/label><\/span><\/span><\/span><\/b> - Ja, Sie haben es bereits klar<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Technischer Berater\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Technischer Berater<\/span><\/label><\/span><\/span><\/span><\/b> - Wir f\u00fchren Sie zur besten L\u00f6sung<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Allgemeine Informationen\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Allgemeine Informationen<\/span><\/label><\/span><\/span><\/span><\/b><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-274\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" value=\"Unternehmen\" type=\"text\" name=\"text-274\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail*\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"telefono\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telefon*\" value=\"\" type=\"tel\" name=\"telefono\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"mensaje\"><textarea cols=\"40\" rows=\"6\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nachricht*\" name=\"mensaje\"><\/textarea><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"aceptacion\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"aceptacion\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> \u00a0Ich habe die Datenschutzerkl\u00e4rung gelesen und <a href=\"https:\/\/www.tecsens.com\/en\/data-protection\/\" target=\"_blank\">akzeptiere sie.<\/a>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acepta-recibir-info\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acepta-recibir-info\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">\u00a0Ich m\u00f6chte per E-Mail kommerzielle Informationen \u00fcber Produkte und Dienstleistungen von TECSENS erhalten.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"reCaptcha Response Here\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<p style=\"text-align:center\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner boton\" type=\"submit\" value=\"SCHIKEN\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;35px||36px||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00fcssen Sie mit einem Experten sprechen?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;52px||7px||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><strong>Unsere B\u00fcros<\/strong><\/p>\n<p style=\"text-align: left;\">\n<ul>\n<li style=\"text-align: left;\">Paseo de la Castellana 171, 4\u00ba Izq, 28046 (Madrid)<\/li>\n<li style=\"text-align: left;\">C\/Figueres 8 Despacho 12, 08022 (Barcelona)<\/li>\n<li style=\"text-align: left;\">Edisonstra\u00dfe 63 Haus A, 1. Stock, 12459 (Berlin)<span style=\"font-size: 19px;\"><\/span> <span style=\"text-align: justify;\"><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;7px||||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_llamar-1.png\" width=\"20\" height=\"20\" alt=\"Symbolaufruf\" class=\"wp-image-28495 alignnone size-full\" style=\"float: left;\"><span style=\"font-size: 19px;\"><\/span> <a href=\"tel:%20+34917914400\" title=\"  (+34) 917 914 400\"> <\/a><span style=\"color: #333333;\"><a href=\"tel:%20+34917914400\" title=\" (+34) 917 914 400\">(+34) 917 914<\/a><\/span> 400 \/ (+<a href=\"tel:+34935455600\" style=\"color: #333333;\"> <\/a><a href=\"tel:%20+34935455600\" title=\" (+34) 935 455 600\"> 34) 935 455 600 \/ (+<\/a><a href=\"tel:+493086323849\" data-auth=\"NotApplicable\">49) 30 863 238 49<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;4px||||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_email.png\" width=\"20\" height=\"20\" alt=\"E-Mail-Ikono\" class=\"wp-image-28499 alignnone size-full\">  <a href=\"mailto:info@tecsens.com\">info@tecsens.com<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;2px||52px||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><span style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_hora.png\" width=\"20\" height=\"20\" alt=\"Symbolzeit\" class=\"wp-image-28503 alignnone size-full\">  <strong>Montag bis Donnerstag<\/strong> 9.00-18.30h <strong>Freitag<\/strong> 9.00-15.00h<\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow icon_color=&#8220;#FFFFFF&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_social_media_follow_network social_network=&#8220;linkedin&#8220; url=&#8220;https:\/\/www.linkedin.com\/company\/tecsens\/mycompany\/verification\/?viewAsMember=true&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#007bb6&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220; theme_builder_area=&#8220;post_content&#8220;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;twitter&#8220; url=&#8220;https:\/\/twitter.com\/Tecsens&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#00aced&#8220; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220; theme_builder_area=&#8220;post_content&#8220;]twitter[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wir bieten Ihnen die besten IT-Sicherheitsl\u00f6sungen Konzentriert auf den Schutz Ihrer Infrastrukturen, Netzwerke und Gesch\u00e4ftsinformationen, Risiken, die sie beeinflussen k\u00f6nnen. -Verwaltete Perimeter-Sicherheitsdienste f\u00fcr jede Zentrale. -M\u00f6glichkeit, Architekturen in H.A. zu installieren. Unsere Dienste erm\u00f6glichen es Ihnen, Ihren Internetzugang zu \u00fcberwachen, sowie Schutz vor Viren und externen Bedrohungen, Blockierung von unerw\u00fcnschtem Zugriff, E-Mail-Filterung (AntiSpam), IDS\/IPS und [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":22875,"menu_order":118,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-22868","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computersicherheit - Tecsens<\/title>\n<meta name=\"description\" content=\"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computersicherheit - Tecsens\" \/>\n<meta property=\"og:description\" content=\"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T11:42:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"37\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\"},\"headline\":\"Computersicherheit\",\"datePublished\":\"2021-04-20T10:09:35+00:00\",\"dateModified\":\"2023-09-19T11:42:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\"},\"wordCount\":7303,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\",\"url\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\",\"name\":\"Computersicherheit - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"datePublished\":\"2021-04-20T10:09:35+00:00\",\"dateModified\":\"2023-09-19T11:42:00+00:00\",\"description\":\"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business-Internet-Dienste\",\"item\":\"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computersicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"caption\":\"Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computersicherheit - Tecsens","description":"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"Computersicherheit - Tecsens","og_description":"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.","og_url":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/","og_site_name":"Tecsens","article_modified_time":"2023-09-19T11:42:00+00:00","og_image":[{"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"37\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/"},"author":{"name":"Admin","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859"},"headline":"Computersicherheit","datePublished":"2021-04-20T10:09:35+00:00","dateModified":"2023-09-19T11:42:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/"},"wordCount":7303,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/","url":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/","name":"Computersicherheit - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","datePublished":"2021-04-20T10:09:35+00:00","dateModified":"2023-09-19T11:42:00+00:00","description":"IT-Sicherheitsl\u00f6sungen f\u00fcr Unternehmen. Wir konzentrieren uns auf den Schutz Ihrer Infrastrukturen, Netzwerke und Informationen, um Risiken abzumildern.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/computersicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/de\/"},{"@type":"ListItem","position":2,"name":"Business-Internet-Dienste","item":"https:\/\/www.tecsens.com\/de\/business-internet-dienste\/"},{"@type":"ListItem","position":3,"name":"Computersicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859","name":"Admin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","caption":"Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/comments?post=22868"}],"version-history":[{"count":10,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22868\/revisions"}],"predecessor-version":[{"id":45377,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22868\/revisions\/45377"}],"up":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22875"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media?parent=22868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}