{"id":185,"date":"2022-09-22T14:49:56","date_gmt":"2022-09-22T12:49:56","guid":{"rendered":"https:\/\/import.themovation.com\/stratus\/?page_id=4394"},"modified":"2026-02-18T10:23:44","modified_gmt":"2026-02-18T09:23:44","slug":"home","status":"publish","type":"page","link":"https:\/\/it-xperts.gmbh\/home\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"185\" class=\"elementor elementor-185\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27ee92a1 elementor-reverse-mobile elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"27ee92a1\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6bb005d3\" data-id=\"6bb005d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28b9d7f6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"28b9d7f6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">IT-xPerts.GmbH<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f7c4a76 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6f7c4a76\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Compliance Build In<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-601beb66 elementor-align-right elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-button\" data-id=\"601beb66\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/outlook.office365.com\/owa\/calendar\/ITxPertsGmbH1@it-xperts.gmbh\/bookings\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Demo Termin vereinbaren<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e915b elementor-align-right elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-button\" data-id=\"28e915b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/outlook.office365.com\/owa\/calendar\/ITxPertsGmbH1@it-xperts.gmbh\/bookings\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Audit AD Tiering<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f6f5f1a elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-button\" data-id=\"1f6f5f1a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/it-xperts.gmbh\/home\/kontakt\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontakt<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d6fc83 elementor-widget elementor-widget-menu-anchor\" data-id=\"9d6fc83\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"explore\" class=\"elementor-menu-anchor\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-453c6f3c elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"453c6f3c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-599c04eb\" data-id=\"599c04eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-478355c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"478355c3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7aabc20e\" data-id=\"7aabc20e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-125fcb2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"125fcb2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Governance, Risk, Compliance &amp; Technology wie Access Right Manager \/ Berechtigungsmanagent und ARM<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64789790 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"64789790\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Der Schutz des Unternehmens vor unternehmerischen Risiken, vor der Verletzung von Rechtsvorschriften und vor Sch\u00e4digungen durch Externe sowie durch eigene Mitarbeiter hat an Bedeutung zugenommen. Zum einen tragen immer komplexere Vorschriften, die Internationalisierung der Zuliefer- und Absatzm\u00e4rkte und die Durchdringung aller Unternehmensbereiche durch die IT zu einer permanenten Gef\u00e4hrdung bei, zum anderen hat sich die pers\u00f6nliche Haftungssituation der Unternehmensleitungen und die Strafverfolgung durch die Beh\u00f6rden kontinuierlich versch\u00e4rft.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7366dfa elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7366dfa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3d672b48\" data-id=\"3d672b48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-771c6234 elementor-widget elementor-widget-image\" data-id=\"771c6234\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"620\" src=\"https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1.jpg\" class=\"attachment-full size-full\" alt=\"Cyber-Resilience schaffen mit Access Rights Management und der IT-xPerts.GmbH\" srcset=\"https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1.jpg 930w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-300x200.jpg 300w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-768x512.jpg 768w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-150x100.jpg 150w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-120x80.jpg 120w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-394x263.jpg 394w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/Cyber-Resilience-930x620-1-915x610.jpg 915w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-350fef4c\" data-id=\"350fef4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-379cd6e8 elementor-view-default elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"379cd6e8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tVernetzung\t\t\t\t\t<\/span>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDie globale Digitalisierung verst\u00e4rkt unaufhaltsam den Trend hin zu mehr Vernetzung. Gesellschaftliche und wirtschaftliche Systeme funktionieren ohne IT de facto nicht mehr. Nicht zuletzt auch durch die Entwicklung des Internet of Things (IoT) hat die Vernetzung ein neues, nie dagewesenes Ausma\u00df erreicht.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e137925 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e137925\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d41fa4a elementor-view-default elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"2d41fa4a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tDisruption\t\t\t\t\t<\/span>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDas hohe Tempo der technologischen Entwicklung und die massive Digitalisierung von Gesch\u00e4ftsprozessen f\u00fchren dazu, dass unausgereifte, nicht ausreichend gesch\u00fctzte Technologien zum Einsatz kommen. Durch die enge Verzahnung von Lieferketten und IT-Netzen k\u00f6nnen lokale Angriffe zudem schnell eine globale Dimension entfalten.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dc37f3f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4dc37f3f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-664156d8 elementor-view-default elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"664156d8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tProfessionalisierung der Angriffe\t\t\t\t\t<\/span>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tGleichzeitig hat sich eine hochorganisierte, schlagkr\u00e4ftige und profitable Hacker-Industrie etabliert, hinter der private sowie staatliche Akteure stehen. Im Ergebnis nehmen die so professionalisierten Cyber-Attacken heute Schadensdimensionen an, die vor wenigen Jahren undenkbar erschienen. Durch Cyber-Attacken entstand der deutschen Wirtschaft im Zeitraum 2020\/2021 ein Gesamtschaden von \u00fcber 220 Milliarden Euro \u2013 damit erh\u00f6hte sich die Schadenssumme im Vergleich zu 2018\/2019 um mehr als 50 %.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-42042240 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42042240\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-2194209e\" data-id=\"2194209e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-752d734d elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"752d734d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-xl\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/berechtigungsmanagement.blog\/\">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-basic-elaboration-folder-noaccess\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h4 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/berechtigungsmanagement.blog\/\">Access Rights Management<\/a>\n                    <\/h4>\n                    <p class=\"elementor-icon-box-description\">Access Rights Manager Verwalten und Pr\u00fcfen von Zugriffsberechtigungen (Berechtigungsmanagement \/ ARM) \u00fcber die gesamte Infrastruktur hinweg.<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5b2ba825\" data-id=\"5b2ba825\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f6b0e26 elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"6f6b0e26\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-xl\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/password-safe.eu\">\n                            <i aria-hidden=\"true\" class=\"fab fa-keycdn\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h4 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/password-safe.eu\">Password Safe<\/a>\n                    <\/h4>\n                    <p class=\"elementor-icon-box-description\">Mit unserer hochentwickelten Verschl\u00fcsselungs-Software Passw\u00f6rter sicher verwalten.<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6ba69088\" data-id=\"6ba69088\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-376dc365 elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"376dc365\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-xl\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/it-betreuung.eu\/\">\n                            <i aria-hidden=\"true\" class=\"fas fa-building\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h4 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/it-betreuung.eu\/\">Infrastruktur<\/a>\n                    <\/h4>\n                    <p class=\"elementor-icon-box-description\">Geh\u00e4rtete IT-Infrastrukturen sind die unerl\u00e4ssliche Basis zur Minimierung von Informationssicherheitsrisiken. <\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f34b64e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f34b64e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;mountains&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" opacity=\"0.33\" d=\"M473,67.3c-203.9,88.3-263.1-34-320.3,0C66,119.1,0,59.7,0,59.7V0h1000v59.7 c0,0-62.1,26.1-94.9,29.3c-32.8,3.3-62.8-12.3-75.8-22.1C806,49.6,745.3,8.7,694.9,4.7S492.4,59,473,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" opacity=\"0.66\" d=\"M734,67.3c-45.5,0-77.2-23.2-129.1-39.1c-28.6-8.7-150.3-10.1-254,39.1 s-91.7-34.4-149.2,0C115.7,118.3,0,39.8,0,39.8V0h1000v36.5c0,0-28.2-18.5-92.1-18.5C810.2,18.1,775.7,67.3,734,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M766.1,28.9c-200-57.5-266,65.5-395.1,19.5C242,1.8,242,5.4,184.8,20.6C128,35.8,132.3,44.9,89.9,52.5C28.6,63.7,0,0,0,0 h1000c0,0-9.9,40.9-83.6,48.1S829.6,47,766.1,28.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f3dbcb6\" data-id=\"1f3dbcb6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f2b14b4 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2f2b14b4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"300\" src=\"https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense.jpg\" class=\"attachment-full size-full\" alt=\"Cyber-Defense schaffen mit Access Rights Management und der IT-xPerts.GmbH\" srcset=\"https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense.jpg 1000w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-300x90.jpg 300w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-768x230.jpg 768w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-333x100.jpg 333w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-267x80.jpg 267w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-394x118.jpg 394w, https:\/\/it-xperts.gmbh\/wp-content\/uploads\/2022\/09\/cyberdefense-915x275.jpg 915w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d07f5ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d07f5ee\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-25585aa3\" data-id=\"25585aa3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ff045f1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2ff045f1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unsere Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49184f61 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"49184f61\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">IT sollte auch in Ihrem Risikomanagement einen hohen Stellenwert besitzen. <br \/>\nWir unterst\u00fctzen verschiedene Sichtweisen und Anforderungen an die IT im Unternehmen, beginnend bei den Erwartungen der Gesch\u00e4ftsf\u00fchrung an den Beitrag der IT zur Gesch\u00e4ftsstrategie (IT-Strategie) \u00fcber die Einhaltung aller rechtlichen Vorgaben in der IT (IT-Compliance) bis hin zur Beratung zu allen Fragen des Datenschutzes (Data Privacy).<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4ee3d532\" data-id=\"4ee3d532\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5be6b1b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5be6b1b9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e8ab9bf\" data-id=\"7e8ab9bf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f5fa50b elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"4f5fa50b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/berechtigungsmanagement.blog\/\">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-basic-elaboration-folder-noaccess\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/berechtigungsmanagement.blog\/\">Rechteanalyse von Usern<\/a>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">auf Fileservern\/Exchange\/<br \/>SharePoint\/OneDrive<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34c85534 elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"34c85534\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/berechtigungsmanagement.blog\/\">\n                            <i aria-hidden=\"true\" class=\"fab fa-reacteurope\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/berechtigungsmanagement.blog\/\">Active Directory<\/a>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">Zustandsanalyse Replikation Tombstone u.s.w<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d46ed44 elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"4d46ed44\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <span class=\"elementor-icon \" >\n                            <i aria-hidden=\"true\" class=\"th-trip travelpack th-trip travelpack-safety-box\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <span >Begleitung der Prozesse als DSB<\/span>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">Datenschutz als Wettbewerbsvorteil. Datenschutzbeauftragter Dienstleistung<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-759a3289\" data-id=\"759a3289\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-540611eb elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"540611eb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/berechtigungsmanagement.blog\/\">\n                            <i aria-hidden=\"true\" class=\"far fa-file\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/berechtigungsmanagement.blog\/\">Migration von Fileservern<\/a>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">Geordneteter Umzug Ihrer Fileserver.  FS zu FS oder FS zu DFS .<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c7ba392 elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"6c7ba392\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/password-safe.eu\/\">\n                            <i aria-hidden=\"true\" class=\"fas fa-key\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/password-safe.eu\/\">Password Safe<\/a>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">Sichern Sie Ihre Umgebung vor Verlust von Passw\u00f6rtern bei Mitarb. Wechsel.<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73b82d0d elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-service-block\" data-id=\"73b82d0d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-sm\">\n                        <a class=\"elementor-icon \" href=\"https:\/\/it-betreuung.eu\/\">\n                            <i aria-hidden=\"true\" class=\"fas fa-microchip\"><\/i>                        <\/a>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        <a href=\"https:\/\/it-betreuung.eu\/\">Infrastruktur als Service<\/a>\n                    <\/h3>\n                    <p class=\"elementor-icon-box-description\">Nutzen Sie unsere \u00fcber 10 j\u00e4hrige Erfahrung als Cloud Dienstleister.<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4aecf415 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4aecf415\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11dae8c3\" data-id=\"11dae8c3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-53a6aaf3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53a6aaf3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-73181d10\" data-id=\"73181d10\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42beb381 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"42beb381\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wie bauen Sie eine nachhaltig wirksame Cyber-Resilienz auf?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-459befe7 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"459befe7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Diese strukturellen und technologischen Voraussetzungen sollten Sie ber\u00fccksichtigen: <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1e722850 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e722850\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-697b2aeb\" data-id=\"697b2aeb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73c9e287 elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"73c9e287\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/berechtigungsmanagement.blog\/\" >\n\t\t\t\t\t\tIdentity & Access Management (IAM)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDas Access Management verwaltet die Rechte und den Zugang autorisierter Anwender zur Nutzung eines Service. Gleichzeitig unterbindet es den unautorisierten Zugriff.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1df6e1 elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"1f1df6e1\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/solarwindspro.de\/\" >\n\t\t\t\t\t\tInformation Security Management System (ISMS)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tZiel des Informationssicherheitsmanagements ist es, die Informationssicherheit nachpr\u00fcfbar zu gew\u00e4hrleisten und zu optimieren.\n\nDas ISMS ist damit ein wertvolles Werkzeug \u2013 sowohl zur Nachweisbarkeit einer guten IT Governance und Compliance als auch zur Verbesserung des eigenen Schutzniveaus gegen ausgefeilte Angriffe. Aufgrund der Komplexit\u00e4t der eingesetzten Standards, Mechanismen und Technologien zahlt sich bei Aufbau und Aktualisierung eines ISMS die Einbeziehung erfahrener Spezialisten aus.\n\n \t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f3a6474 elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"5f3a6474\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/password-safe.eu\/\" >\n\t\t\t\t\t\tPassword Management\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPassword Safe sch\u00fctzt, verschl\u00fcsselt und verwaltet Passw\u00f6rter und kritische Informationen plattform\u00fcbergreifend.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5375e812\" data-id=\"5375e812\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424032e7 elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"424032e7\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/berechtigungsmanagement.blog\/\" >\n\t\t\t\t\t\tPrivileged User Management (PUM)\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPersonen mit besonderer Verantwortung und Funktion ben\u00f6tigen in der Regel auch besondere Zugriffs- und Nutzungsrechte in IT-Systemen und Software. Das Privileged User Management steuert die Rechte und den Zugang dieser \u201eprivilegierten Benutzer\u201c auf digitale Ressourcen. So sch\u00fctzt es Organisationen vor vors\u00e4tzlichem aber auch unbewusstem Missbrauch privilegierter Berechtigungen.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2835493d elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"2835493d\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/berechtigungsmanagement.blog\/\" >\n\t\t\t\t\t\tIT Governance, Risk Management & IT Compliance\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSoftware-L\u00f6sungen und Technologien k\u00f6nnen bei der Sicherstellung aller Aspekte der IT Governance unterst\u00fctzen. So k\u00f6nnen Spezialanwendungen wie eine Access-Governance-L\u00f6sung dazu beitragen, die Auflagen der Datenschutz-Grundverordnung (EU-DSGVO) einzuhalten. Sie gew\u00e4hrleistet und dokumentiert etwa, dass nur autorisierte Mitarbeiter auf personenbezogene Daten zugreifen.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16c94a37 elementor-view-default elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"16c94a37\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<a href=\"https:\/\/it-betreuung.eu\/\" >\n\t\t\t\t\t\tSystem Hardening\t\t\t\t\t<\/a>\n\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUnsere Spezialisten h\u00e4rten Ihre Systeme (System Hardening). Eine sichere Infrastruktur verhindert die Ausbreitung von Viren und sch\u00fctzt Ihre Mitarbeiter.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-465b47c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"465b47c0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a48344c\" data-id=\"3a48344c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49bef6b0 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"49bef6b0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Buchen Sie einen Termin mit unseren Cyber Security Spezialisten<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1422f549 elementor-align-right elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-button\" data-id=\"1422f549\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/outlook.office365.com\/owa\/calendar\/ITxPertsGmbH1@it-xperts.gmbh\/bookings\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Termin buchen<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c000503 elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-button\" data-id=\"1c000503\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/it-xperts.gmbh\/home\/kontakt\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontakt<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT-xPerts.GmbH Compliance Build In Demo Termin vereinbaren Audit AD Tiering Kontakt Governance, Risk, Compliance &amp; Technology wie Access Right Manager \/ Berechtigungsmanagent und ARM Der Schutz des Unternehmens vor unternehmerischen Risiken, vor der Verletzung von Rechtsvorschriften und vor Sch\u00e4digungen durch &hellip; <a href=\"https:\/\/it-xperts.gmbh\/home\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-185","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/pages\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":10,"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/pages\/185\/revisions"}],"predecessor-version":[{"id":884,"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/pages\/185\/revisions\/884"}],"wp:attachment":[{"href":"https:\/\/it-xperts.gmbh\/home\/wp-json\/wp\/v2\/media?parent=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}