{"id":100,"date":"2025-01-12T12:42:03","date_gmt":"2025-01-12T11:42:03","guid":{"rendered":"https:\/\/allgeier-se.seowerk.net\/?page_id=100"},"modified":"2025-06-06T15:19:48","modified_gmt":"2025-06-06T13:19:48","slug":"information-security","status":"publish","type":"page","link":"https:\/\/allgeier-se.seowerk.net\/de\/loesungen\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5vmax;--awb-padding-top-medium:60px;--awb-padding-bottom-medium:60px;--awb-padding-top-small:50px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:var(--awb-color8);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-space-between fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:40px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.5\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-aspect-ratio: 100 \/ 107;--awb-object-position:40% 46%;--awb-mask-url: url(https:\/\/allgeier-se.seowerk.net\/wp-content\/plugins\/fusion-builder\/\/assets\/images\/masks\/mask-16.svg);--awb-mask-size: cover;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none has-mask has-aspect-ratio\"><img decoding=\"async\" width=\"1200\" height=\"800\" title=\"Empowering Privacy and Data Protection with Secure Encryption Technology\" src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560.jpg\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-1200x800.jpg\" class=\"lazyload img-responsive wp-image-2701 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" alt srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272560%27%20height%3D%271707%27%20viewBox%3D%270%200%202560%201707%27%3E%3Crect%20width%3D%272560%27%20height%3D%271707%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-200x133.jpg 200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-400x267.jpg 400w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-600x400.jpg 600w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-800x533.jpg 800w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-1200x800.jpg 1200w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 768px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:7.68%;--awb-width-medium:60%;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.5\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"--fontSize:60;line-height:var(--awb-typography1-line-height);\">Information Security &#8211; Umfassende Cyber-Sicherheitsl\u00f6sungen f\u00fcr<br \/>Ihre IT<\/h1><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:var(--awb-typography3-font-size);--awb-line-height:var(--awb-typography3-line-height);--awb-letter-spacing:var(--awb-typography3-letter-spacing);--awb-text-transform:var(--awb-typography3-text-transform);--awb-text-font-family:var(--awb-typography3-font-family);--awb-text-font-weight:var(--awb-typography3-font-weight);--awb-text-font-style:var(--awb-typography3-font-style);\"><p>Informationssicherheit f\u00fcr Ihr Unternehmen mit unseren Cyber Security-L\u00f6sungen<\/p>\n<\/div><div class=\"fusion-separator fusion-no-large-visibility fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:3%;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2\"><p>Unsere Information Security-L\u00f6sungen sorgen f\u00fcr einen umfassenden Schutz Ihrer IT-Systeme in einer sich stetig ver\u00e4ndernden Bedrohungslandschaft. Mit proaktiven Sicherheitsma\u00dfnahmen und innovativen Technologien stellen wir sicher, dass Ihre Daten wirksam vor Gefahren (Threats) und Cyber-Angriffen gesch\u00fctzt sind. Unsere spezialisierte Informationssicherheits-Einheit Allgeier CyRis bietet Ihnen ganzheitliche und ma\u00dfgeschneiderte IT-Sicherheitsl\u00f6sungen und IT Security Services, die speziell auf die Herausforderungen moderner IT-Landschaften zugeschnitten sind.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:3%;width:100%;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color7);--awb-background-image:linear-gradient(45deg, var(--awb-color5) 0%,var(--awb-color6) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"--fontSize:42;line-height:var(--awb-typography1-line-height);\">Information Security \u2013 Leistungen &amp; Produkte<\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-7 fusion-content-boxes-1 content-boxes-icon-with-title content-left has-flex-alignment content-box-center fusion-delayed-animation\" style=\"--awb-alignment:stretch;--awb-item-margin-bottom:30px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color1);--awb-circle-hover-accent-color:var(--awb-color1);--awb-box-shadow:0px 0px 15px 0px hsla(var(--awb-color5-h),var(--awb-color5-s),var(--awb-color5-l),calc(var(--awb-color5-a) - 90%));;\" data-animation-delay=\"100\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-history fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Managed Detection and Response (MDR)<\/p><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Rund-um-die-Uhr \u00dcberwachung und Schutz Ihrer IT-Systeme durch fr\u00fchzeitige Erkennung und Abwehr potenzieller Angriffe.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-crosshairs fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Schwachstellen\u00admanagement<\/p><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Identifikation und Beseitigung von Sicherheitsl\u00fccken, bevor sie zu einem Risiko werden.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-network-wired fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Netzwerksicherheit<\/p><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Absicherung Ihrer Netzwerke vor internen und externen Bedrohungen mit innovativen Technologien wie Zero-Trust-Architekturen.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/www.allgeier-cyris.de\/de\/loesungen\/julia-mailoffice.html\" target=\"_blank\" rel=\"noopener noreferrer\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-envelope fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">E-Mail-Sicherheit<\/p><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Mit <a href=\"https:\/\/www.allgeier-cyris.de\/de\/loesungen\/julia-mailoffice.html\" target=\"_blank\" rel=\"noopener\">Julia MailOffice<\/a> sch\u00fctzen Sie Ihre E-Mail-Kommunikation effektiv vor Cybergefahren. Die L\u00f6sung bietet umfassenden Schutz durch Verschl\u00fcsselung, digitale Signaturen und zentrale Verwaltung \u2013 unsere IT-Sicherheitsl\u00f6sung wird von zahlreichen Beh\u00f6rden eingesetzt und ist ideal f\u00fcr Unternehmen, die h\u00f6chsten Wert auf Sicherheit und Datenschutz legen. <a href=\"https:\/\/www.allgeier-cyris.de\/de\/loesungen\/julia-mailoffice.html\" target=\"_blank\" rel=\"noopener\">Mehr Informationen zu Julia MailOffice<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\"fusion-read-more-button fusion-content-box-button fusion-button button-default fusion-button-default-size button- button-flat\" style=\"float:left;\" href=\"https:\/\/www.allgeier-cyris.de\/de\/loesungen\/julia-mailoffice.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"fusion-button-text\">Mehr dazu<\/span><\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/www.mgm-sp.com\" target=\"_blank\" rel=\"noopener noreferrer\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-shield-virus fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Application Security<\/p><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Umfassende Software-Sicherheitsl\u00f6sungen, einschlie\u00dflich Security Testing, Application Security Reviews und Schulungen, um sichere Softwareentwicklung und -bereitstellung zu gew\u00e4hrleisten. <a href=\"https:\/\/www.mgm-sp.com\" target=\"_blank\" rel=\"noopener\">Mehr Informationen zu unseren Software Security-L\u00f6sungen<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\"fusion-read-more-button fusion-content-box-button fusion-button button-default fusion-button-default-size button- button-flat\" style=\"float:left;\" href=\"https:\/\/www.mgm-sp.com\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"fusion-button-text\">Mehr dazu<\/span><\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/www.allgeier-its.com\/loesungen\/security-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-user-secret fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Security Operations Center (SOC)<\/p><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>24\/7-Sicherheits\u00fcberwachung mit proaktiver Bedrohungserkennung (Risk Detection), Vorfallsmanagement (Incident Management) und professionellem Security Information and Event Management (SIEM). <a href=\"https:\/\/www.allgeier-its.com\/loesungen\/security-operations-center\/\" target=\"_blank\" rel=\"noopener\">Mehr Informationen zu unserem Security Operations Center<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\"fusion-read-more-button fusion-content-box-button fusion-button button-default fusion-button-default-size button- button-flat\" style=\"float:left;\" href=\"https:\/\/www.allgeier-its.com\/loesungen\/security-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"fusion-button-text\">Mehr dazu<\/span><\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 60%));\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row content-box-column-last\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.4\" data-animationOffset=\"top-into-view\" style=\"--awb-animation-color:var(--awb-color6);\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 100ms;animation-duration: 100ms;\"><i style=\"border-color:var(--awb-color1);border-width:0px;background-color:var(--awb-custom_color_2);box-sizing:content-box;height:60px;width:60px;line-height:60px;border-radius:50%;font-size:30px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-gavel fas circle-yes\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography4-line-height);\">Compliance-Checks<\/p><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Sicherstellung der Einhaltung gesetzlicher Vorschriften, um Risiken durch Nichteinhaltung zu minimieren.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"--fontSize:42;line-height:var(--awb-typography1-line-height);\">Anwendungsbereiche<\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color5);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Kontinuierliche \u00dcberwachung und Abwehr von Cyber-Bedrohungen durch umfassendes Sicherheitsmonitoring<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Cyber Threat Angriffsfr\u00fcherkennung<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Schutz kritischer Infrastrukturen vor Cyberangriffen f\u00fcr umfassende Informationssicherheit<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Schutz sensibler Kundendaten durch Echtzeit-Bedrohungserkennung und schnelle Reaktionszeiten<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Schutz und Sicherung gesch\u00e4ftskritischer IT-Systeme<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Aufbau und Optimierung zukunftssicherer IT-Architekturen<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-aspect-ratio:3 \/ 2;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none has-aspect-ratio\"><img decoding=\"async\" width=\"1200\" height=\"647\" title=\"Concept of cybersecurity, protection of the user&#8217;s private data, files and documents. Security screen on the Internet.\" src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560.jpg\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-1200x647.jpg\" class=\"lazyload img-responsive wp-image-2700 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" alt srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272560%27%20height%3D%271381%27%20viewBox%3D%270%200%202560%201381%27%3E%3Crect%20width%3D%272560%27%20height%3D%271381%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-200x108.jpg 200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-400x216.jpg 400w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-600x324.jpg 600w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-800x432.jpg 800w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/cybersecurity-protection-of-the-user-s-private-da@2560-1200x647.jpg 1200w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 768px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-fixed nonhundred-percent-fullwidth non-hundred-percent-height-scrolling lazyload\" style=\"--awb-background-position:right bottom;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color2);--awb-background-image:linear-gradient(45deg, hsla(var(--awb-color1-h),var(--awb-color1-s),var(--awb-color1-l),calc(var(--awb-color1-a) - 5%)) 0%,hsla(var(--awb-custom_color_2-h),var(--awb-custom_color_2-s),var(--awb-custom_color_2-l),calc(var(--awb-custom_color_2-a) - 10%)) 100%);;--awb-background-size:contain;--awb-flex-wrap:wrap;background-attachment:fixed;\" data-bg=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/01\/Shape-A.svg\" data-bg-gradient=\"linear-gradient(45deg, hsla(var(--awb-color1-h),var(--awb-color1-s),var(--awb-color1-l),calc(var(--awb-color1-a) - 5%)) 0%,hsla(var(--awb-custom_color_2-h),var(--awb-custom_color_2-s),var(--awb-custom_color_2-l),calc(var(--awb-custom_color_2-a) - 10%)) 100%)\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color7);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"--fontSize:42;line-height:var(--awb-typography1-line-height);\">Unsere Information Security-L\u00f6sungen in der Praxis<\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-post-cards fusion-post-cards-1 awb-carousel awb-swiper awb-swiper-slider awb-swiper-dots-position-below\" style=\"--awb-arrow-color:var(--awb-color4);--awb-dots-color:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 80%));--awb-dots-active-color:var(--awb-color3);--awb-dots-size:16px;--awb-dots-active-size:16px;--awb-dots-spacing:8px;--awb-dots-margin-top:2em;--awb-dots-align:center;--awb-columns:1;--awb-active-filter-border-size:3px;--awb-filters-height:36px;--awb-margin-bottom:2em;\" data-post-type-label=\"case studies\" data-autoplay=\"no\" data-autoplayspeed=\"7000\" data-autoplaypause=\"no\" data-loop=\"yes\" data-columns=\"1\" data-columnsmedium=\"0\" data-columnssmall=\"0\" data-itemmargin=\"40\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"auto\" data-scrollitems=\"0\" data-mousepointer=\"default\" data-layout=\"slider\" data-centeredslides=\"no\" data-shadow=\"no\" data-speed=\"500\" data-rotationangle=\"50\" data-depth=\"100\" data-slide-effect=\"slide\"><div class=\"swiper-wrapper\"><div class=\"fusion_builder_column fusion-builder-column-8 fusion-flex-column post-card swiper-slide\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-column-inner-bg-wrapper all-height-100\" style=\"--awb-inner-bg-position:center center;--awb-inner-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/express-migration-in-die-cloud-fuer-kadewe\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-classic-product-image-wrapper fusion-woo-product-image fusion-post-card-image fusion-post-card-image-1 has-aspect-ratio\" data-layout=\"static\" style=\"--awb-aspect-ratio:4 \/ 3;\"><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/express-migration-in-die-cloud-fuer-kadewe\/\" aria-label=\"Express-Migration in die Cloud f\u00fcr KaDeWe\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272560%27%20height%3D%271707%27%20viewBox%3D%270%200%202560%201707%27%3E%3Crect%20width%3D%272560%27%20height%3D%271707%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560.jpg\" data-srcset=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560-200x133.jpg 200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560-400x267.jpg 400w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560-600x400.jpg 600w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560-800x533.jpg 800w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560-1200x800.jpg 1200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/diverse-team-of-engineers-in-data-center-looking-f-2025-02@2560.jpg 2560w\" data-sizes=\"auto\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-meta-tb fusion-meta-tb-1 floated\" style=\"--awb-border-bottom:0px;--awb-border-top:0px;--awb-border-left:0px;--awb-border-right:0px;--awb-height:36px;--awb-margin-bottom:0px;--awb-text-color:var(--awb-color8);--awb-link-color:var(--awb-color5);--awb-alignment-medium:flex-start;--awb-alignment-small:flex-start;\"><span class=\"fusion-tb-categories\"><a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-study-kategorie\/cloud\/\" rel=\"tag\">Cloud<\/a>, <a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-study-kategorie\/information-security\/\" rel=\"tag\">Information Security<\/a><\/span><span class=\"fusion-meta-tb-sep\">|<\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two break-word\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-link-color:var(--awb-custom_color_1);--awb-link-hover-color:var(--awb-color5);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:42;line-height:var(--awb-typography1-line-height);\"><a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/express-migration-in-die-cloud-fuer-kadewe\/\" class=\"awb-custom-text-color awb-custom-text-hover-color\" target=\"_self\">Express-Migration in die Cloud f\u00fcr KaDeWe<\/a><\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<div class=\"fusion-content-tb fusion-content-tb-1\" style=\"--awb-text-color:var(--awb-color8);\"><p><span class=\"fusion-dropcap dropcap fusion-content-tb-dropcap\">D<\/span>ie Express-Migration in die Cloud f\u00fcr KaDeWe, umgesetzt nach einem folgenschweren Cyberangriff, gew\u00e4hrleistet einen schnellen und sicheren \u00dcbergang in eine moderne IT-Infrastruktur. Mit innovativen Cloud-Technologien und agilen Methoden wurde der Wechsel in k\u00fcrzester Zeit vollzogen, um Ausfallzeiten zu minimieren. Die neue L\u00f6sung bietet h\u00f6here Skalierbarkeit und verbesserte Performance. Durch diese strategische Umstellung konnte KaDeWe operative Risiken reduzieren und die Wettbewerbsf\u00e4higkeit im digitalen Zeitalter nachhaltig st\u00e4rken.<\/p><\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" data-hover=\"bg_slide_right\" href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/express-migration-in-die-cloud-fuer-kadewe\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Mehr erfahren<\/span><i class=\"fa-angle-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion_builder_column fusion-builder-column-9 fusion-flex-column post-card swiper-slide\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-column-inner-bg-wrapper all-height-100\" style=\"--awb-inner-bg-position:center center;--awb-inner-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/allgeier-cyris-active-cyber-defense-service\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-classic-product-image-wrapper fusion-woo-product-image fusion-post-card-image fusion-post-card-image-1 has-aspect-ratio\" data-layout=\"static\" style=\"--awb-aspect-ratio:4 \/ 3;\"><div  class=\"fusion-image-wrapper\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/allgeier-cyris-active-cyber-defense-service\/\" aria-label=\"Allgeier CyRis: Active Cyber Defense Service\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560.jpg\" class=\"attachment-full size-full lazyload wp-post-image\" alt=\"\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272560%27%20height%3D%271707%27%20viewBox%3D%270%200%202560%201707%27%3E%3Crect%20width%3D%272560%27%20height%3D%271707%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560.jpg\" data-srcset=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-200x133.jpg 200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-400x267.jpg 400w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-600x400.jpg 600w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-800x533.jpg 800w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560-1200x800.jpg 1200w, https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/empowering-privacy-and-data-protection-with-secure@2560.jpg 2560w\" data-sizes=\"auto\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-meta-tb fusion-meta-tb-2 floated\" style=\"--awb-border-bottom:0px;--awb-border-top:0px;--awb-border-left:0px;--awb-border-right:0px;--awb-height:36px;--awb-margin-bottom:0px;--awb-text-color:var(--awb-color8);--awb-link-color:var(--awb-color5);--awb-alignment-medium:flex-start;--awb-alignment-small:flex-start;\"><span class=\"fusion-tb-categories\"><a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-study-kategorie\/information-security\/\" rel=\"tag\">Information Security<\/a><\/span><span class=\"fusion-meta-tb-sep\">|<\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two break-word\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-link-color:var(--awb-custom_color_1);--awb-link-hover-color:var(--awb-color5);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:42;line-height:var(--awb-typography1-line-height);\"><a href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/allgeier-cyris-active-cyber-defense-service\/\" class=\"awb-custom-text-color awb-custom-text-hover-color\" target=\"_self\">Allgeier CyRis: Active Cyber Defense Service<\/a><\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: flex-start;margin-right:auto;margin-top:1.31rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div>\n<div class=\"fusion-content-tb fusion-content-tb-2\" style=\"--awb-text-color:var(--awb-color8);\"><p><span class=\"fusion-dropcap dropcap fusion-content-tb-dropcap\">M<\/span>it dem Allgeier Cyris Active Cyber Defense Service erhalten Unternehmen und Beh\u00f6rden eine ganzheitliche L\u00f6sung zur proaktiven Abwehr von Cyberangriffen. Durch kontinuierliche \u00dcberwachung und den Einsatz modernster Sicherheitsmechanismen werden potenzielle Bedrohungen fr\u00fchzeitig erkannt und automatisch neutralisiert. Die L\u00f6sung integriert intelligente Analysen und automatisierte Prozesse, um Sicherheitsrisiken zu minimieren und den IT-Betrieb zu stabilisieren. Kunden profitieren von einem umfassenden Schutz, der ihre digitale Infrastruktur nachhaltig absichert.<\/p><\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" data-hover=\"bg_slide_right\" href=\"https:\/\/allgeier-se.seowerk.net\/de\/case-studies\/allgeier-cyris-active-cyber-defense-service\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Mehr erfahren<\/span><i class=\"fa-angle-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><div class=\"swiper-pagination\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-testimonials clean awb-speech-bubble-show fusion-testimonials-1\" style=\"--awb-textcolor:var(--awb-color8);--awb-testimonial-text-font-size:var(--awb-typography3-font-size);--awb-testimonial-text-line-height:var(--awb-typography3-line-height);--awb-testimonial-text-letter-spacing:var(--awb-typography3-letter-spacing);--awb-testimonial-text-text-transform:var(--awb-typography3-text-transform);--awb-backgroundcolor:hsla(var(--awb-color1-h),var(--awb-color1-s),var(--awb-color1-l),calc(var(--awb-color1-a) - 30%));--awb-margin-bottom:3rem;--awb-testimonial-border-style:solid;--awb-testimonial-border-color:var(--awb-color6);--awb-navigation-size:12px;--awb-border-top-left-radius:0px;--awb-border-top-right-radius:0px;--awb-border-bottom-left-radius:0px;--awb-border-bottom-right-radius:0px;--testimonial-border-width-top:0px;--testimonial-border-width-right:0px;--testimonial-border-width-bottom:0px;--testimonial-border-width-left:0px;--awb-testimonial-text-font-family:var(--awb-typography3-font-family);--awb-testimonial-text-font-weight:var(--awb-typography3-font-weight);--awb-testimonial-text-font-style:var(--awb-typography3-font-style);\" data-random=\"0\" data-speed=\"4000\"><div class=\"reviews\"><div class=\"review active-testimonial avatar-above no-avatar\"><blockquote class=\"testimonials-shortcode-blockquote\"><div class=\"awb-quote\"><div class=\"awb-quote-content\">\n<p>Active Cyber Defense von Allgeier erm\u00f6glicht uns die \u00dcberwachung unseres gesamten Netzwerks, einschlie\u00dflich aller Desktops, Laptops, Tablets oder Server \u2026<\/p>\n<\/div><\/div><\/blockquote><div class=\"author\"><span class=\"company-name\"><strong>Martin Sacher<\/strong><\/span><\/div><\/div><div class=\"review avatar-above no-avatar\"><blockquote class=\"testimonials-shortcode-blockquote\"><div class=\"awb-quote\"><div class=\"awb-quote-content\">\n<p>Der Betrieb der Allgeier L\u00f6sung nimmt f\u00fcr unser IT-Security-Team nur wenige Stunden pro Monat in Anspruch.<\/p>\n<\/div><\/div><\/blockquote><div class=\"author\"><span class=\"company-name\"><strong>Claus K\u00fcpper<\/strong><\/span><\/div><\/div><div class=\"review avatar-above no-avatar\"><blockquote class=\"testimonials-shortcode-blockquote\"><div class=\"awb-quote\"><div class=\"awb-quote-content\">\n<p>Dass die Cybersecurity-Spezialisten von Allgeier unsere Netzwerke rund um die Uhr \u00fcberwachen und uns bei Ereignissen mit Handlungsbedarf informieren, entlastet unser Team gewaltig.<\/p>\n<\/div><\/div><\/blockquote><div class=\"author\"><span class=\"company-name\"><strong>Manfred Herbst<\/strong><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-reading-box-container reading-box-container-1\" style=\"--awb-title-color:var(--awb-color1);--awb-title-font-size:var(--awb-typography2-font-size);--awb-title-line-height:var(--awb-typography2-line-height);--awb-title-letter-spacing:var(--awb-typography2-letter-spacing);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-title-text-transform:var(--awb-typography2-text-transform);--awb-title-font-family:&quot;Heebo&quot;;--awb-title-font-style:normal;--awb-title-font-weight:400;\"><div class=\"reading-box\" style=\"background-color:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 20%));border-width:1px;border-color:rgba(226,226,226,0);border-left-width:3px;border-left-color:var(--primary_color);border-style:solid;\"><div class=\"fusion-reading-box-flex\"><h2>Erfahren Sie, wie wir Ihre IT wirkungsvoll vor Cyber Threats und Angriffen sch\u00fctzen.<\/h2><a class=\"button fusion-button button-default fusion-button-default-size button-default-size button-flat fusion-desktop-button fusion-tagline-button continue continue-right\" style=\"-webkit-box-shadow:none;-moz-box-shadow:none;box-shadow:none;border-radius:0px 0px 0px 0px\" href=\"#awb-oc__76\" target=\"_self\"><span>Jetzt beraten lassen!<\/span><\/a><\/div><a class=\"button fusion-button button-default fusion-button-default-size button-default-size button-flat fusion-mobile-button continue-right\" style=\"-webkit-box-shadow:none;-moz-box-shadow:none;box-shadow:none;border-radius:0px 0px 0px 0px\" href=\"#awb-oc__76\" target=\"_self\"><span>Jetzt beraten lassen!<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:1.5rem;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"--fontSize:42;line-height:var(--awb-typography1-line-height);\">Mehr erfahren: Das Cyber Security-Portfolio der Allgeier Gruppe<\/h2><\/div><div class=\"fusion-separator separator-gradient\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:1.3rem;margin-bottom:2rem;width:100%;max-width:70px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color3);border-color:var(--awb-color3);border-top-width:5px;\"><\/div><\/div><div class=\"fusion-flip-boxes flip-boxes row fusion-columns-3 flip-effect-3d equal-heights flip-box-center\"><div class=\"fusion-flip-box-wrapper fusion-column col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flip-box flip-left fusion-animated\" tabindex=\"0\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.3\" data-animationOffset=\"top-into-view\"><div class=\"flip-box-inner-wrapper\"><div class=\"flip-box-front\"><div class=\"flip-box-front-inner\"><div class=\"flip-box-grafix flip-box-image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%271024%27%20viewBox%3D%270%200%201024%201024%27%3E%3Crect%20width%3D%271024%27%20height%3D%271024%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/logo__allgeier_cyris.png\" width=\"256\" height=\"256\" alt=\"\" \/><\/div>Cyber Security- und Informationssicherheitskonzepte &amp; IT Security-L\u00f6sungen<\/div><\/div><div class=\"flip-box-back\" style=\"--awb-background-color-back:hsla(var(--awb-custom_color_1-h),var(--awb-custom_color_1-s),var(--awb-custom_color_1-l),calc(var(--awb-custom_color_1-a) - 50%));--awb-background-image-back:url(&#039;https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/abstract-background-with-lights-in-blue-colors-1200x900.jpg&#039;);--awb-background-back-blend-mode:overlay;\"><div class=\"flip-box-back-inner\"><h6 class=\"flip-box-heading-back\" style=\"--h6_typography-font-family:var(--awb-typography3-font-family);--h6_typography-font-weight:var(--awb-typography3-font-weight);--h6_typography-font-style:var(--awb-typography3-font-style);--h6_typography-font-size:var(--awb-typography3-font-size);--h6_typography-letter-spacing:var(--awb-typography3-letter-spacing);--h6_typography-line-height:var(--awb-typography3-line-height);--h6_typography-text-transform:var(--awb-typography3-text-transform);\">Allgeier CyRis Prevent &amp; Defend<\/h6>\n<p><a href=\"https:\/\/www.allgeier-cyris.de\/\" target=\"_blank\" rel=\"noopener\">Ma\u00dfgeschneiderte Cyber Security-Konzepte und IT-Sicherheitsl\u00f6sungen, um Sie in einer zunehmend vernetzten Welt gegen die Cyberrisiken von morgen zu sch\u00fctzen<\/a><\/p>\n<div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"zur Webseite\" aria-label=\"zur Webseite\" role=\"button\" href=\"https:\/\/www.allgeier-cyris.de\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">zur Webseite<\/span><\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-flip-box-wrapper fusion-column col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flip-box flip-left fusion-animated\" tabindex=\"0\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.3\" data-animationDelay=\"0.1\" data-animationOffset=\"top-into-view\"><div class=\"flip-box-inner-wrapper\"><div class=\"flip-box-front\"><div class=\"flip-box-front-inner\"><div class=\"flip-box-grafix flip-box-image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%271024%27%20viewBox%3D%270%200%201024%201024%27%3E%3Crect%20width%3D%271024%27%20height%3D%271024%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/allgeier-logo__mgm.png\" width=\"256\" height=\"256\" alt=\"\" \/><\/div>Full Service-Dienstleistungen f\u00fcr Application Security, Testing und Security Training<\/div><\/div><div class=\"flip-box-back\" style=\"--awb-background-color-back:hsla(var(--awb-custom_color_1-h),var(--awb-custom_color_1-s),var(--awb-custom_color_1-l),calc(var(--awb-custom_color_1-a) - 50%));--awb-background-image-back:url(&#039;https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/abstract-background-with-lights-in-blue-colors-1200x900.jpg&#039;);--awb-background-back-blend-mode:overlay;\"><div class=\"flip-box-back-inner\"><h6 class=\"flip-box-heading-back\" style=\"--h6_typography-font-family:var(--awb-typography3-font-family);--h6_typography-font-weight:var(--awb-typography3-font-weight);--h6_typography-font-style:var(--awb-typography3-font-style);--h6_typography-font-size:var(--awb-typography3-font-size);--h6_typography-letter-spacing:var(--awb-typography3-letter-spacing);--h6_typography-line-height:var(--awb-typography3-line-height);--h6_typography-text-transform:var(--awb-typography3-text-transform);\">mgm security partners Application Security<\/h6>\n<p><a href=\"https:\/\/www.mgm-sp.com\/\" target=\"_blank\" rel=\"noopener\">Komplettes Dienstleistungsspektrum f\u00fcr Unternehmen rund um Application Security, Security Testing und Schulungen, um Software sicher zu entwickeln und bereitzustellen<\/a><\/p>\n<div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"zur Webseite\" aria-label=\"zur Webseite\" role=\"button\" href=\"https:\/\/www.mgm-sp.com\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">zur Webseite<\/span><\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-flip-box-wrapper fusion-column col-lg-4 col-md-4 col-sm-4\"><div class=\"fusion-flip-box flip-left fusion-animated\" tabindex=\"0\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.3\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\"><div class=\"flip-box-inner-wrapper\"><div class=\"flip-box-front\"><div class=\"flip-box-front-inner\"><div class=\"flip-box-grafix flip-box-image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271024%27%20height%3D%271024%27%20viewBox%3D%270%200%201024%201024%27%3E%3Crect%20width%3D%271024%27%20height%3D%271024%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/allgeier-logo__allgeier-its.png\" width=\"256\" height=\"256\" alt=\"\" \/><\/div>IT Security Services und Security Information &amp; Event Management<\/div><\/div><div class=\"flip-box-back\" style=\"--awb-background-color-back:hsla(var(--awb-custom_color_1-h),var(--awb-custom_color_1-s),var(--awb-custom_color_1-l),calc(var(--awb-custom_color_1-a) - 50%));--awb-background-image-back:url(&#039;https:\/\/allgeier-se.seowerk.net\/wp-content\/uploads\/2025\/02\/abstract-background-with-lights-in-blue-colors-1200x900.jpg&#039;);--awb-background-back-blend-mode:overlay;\"><div class=\"flip-box-back-inner\"><h6 class=\"flip-box-heading-back\" style=\"--h6_typography-font-family:var(--awb-typography3-font-family);--h6_typography-font-weight:var(--awb-typography3-font-weight);--h6_typography-font-style:var(--awb-typography3-font-style);--h6_typography-font-size:var(--awb-typography3-font-size);--h6_typography-letter-spacing:var(--awb-typography3-letter-spacing);--h6_typography-line-height:var(--awb-typography3-line-height);--h6_typography-text-transform:var(--awb-typography3-text-transform);\">Security Operations Center (SOC)<\/h6>\n<p><a href=\"https:\/\/www.allgeier-its.com\/loesungen\/security-operations-center\/\" target=\"_blank\" rel=\"noopener\">Mit unseren IT Security Services sorgen wir f\u00fcr proaktiven Schutz vor Cyberattacken und Ransomware und bieten Ihnen ein professionelles Security Information and Event Management (SIEM)<\/a><\/p>\n<div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-5 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"zur Webseite\" aria-label=\"zur Webseite\" role=\"button\" href=\"https:\/\/www.allgeier-its.com\/loesungen\/security-operations-center\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">zur Webseite<\/span><\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":81,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"categories":[87],"tags":[],"class_list":["post-100","page","type-page","status-publish","hentry","category-loesungsseite"],"_links":{"self":[{"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/pages\/100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":10,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/pages\/100\/revisions"}],"predecessor-version":[{"id":8625,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/pages\/100\/revisions\/8625"}],"up":[{"embeddable":true,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/pages\/81"}],"wp:attachment":[{"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/allgeier-se.seowerk.net\/de\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}